Cyber Security and Incident Response

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
David A. Brown Chief Information Security Officer State of Ohio
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Securing Information Systems
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
1 Secure Telework Connectivity Peggy Ward Chief Information Security Officer July 22,
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Security Nevada Businesses Overview June, 2014.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Desktop Security: Making Sure Your Office Environment is Secure.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Scott Charney Cybercrime and Risk Management PwC.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Regional Cyber Crime Unit
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Information Security and Technology Overview Presented By: Enterprise Risk Management (ERM) Division Jill Martucci, CISA, SSCP, Senior Allison Hall, Experienced.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Market Intelligence You Can Act On Secure Remote Support for CJIS Compliance December 11, 2014.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Securing Information Systems
Law Firm Data Security: What In-house Counsel Need to Know
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Comprehensive Security and Compliance at an Affordable Price.
Public Facilities and Cyber Security
Responding to Intrusions
Data Compromises: A Tax Practitioners “Nightmare”
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Securing Information Systems
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
5G Security Training
I have many checklists: how do I get started with cyber security?
Securing the Threats of Tomorrow, Today.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Security week 1 Introductions Class website Syllabus review
Presentation transcript:

Cyber Security and Incident Response Find out how hackers wreak havoc and learn what you can do to protect yourself. Brett Dearman – Digital Forensic Examiner Marc Miller - General Council Seth Waldman – Internet Security Analyst

Cyber Security Team Brett Dearman Digital forensics examiner - 200 internal investigations of varying complexity from 2002 to present Numerous e-discovery initiatives including probable cause for reasonable termination. COE AccessData Certified Examiner – Forensic Toolkit MCSE Microsoft Certified Systems Engineer EnCE (x2) Certified Information Systems Security Professional CISSP (International Security Certification Consortium) Certified Ethical Hacker Certified Penetration Tester Marc Miller Assistant District Attorney in Harris County (Houston), Texas United States Department of Justice – Assistant Deputy Chief Computer Crime Section Assistant United States Attorney - Organized Crime Task Force section - complex money-laundering, conspiracy, wire-tap and narcotics cases Nintendo – Vice President – Global IP protection Motion Picture Association of America – Senior Vice President – IP protection Management liaison for U.S. Justice Department with IP “czar” and other senior White House officials relating to IP policy, strategic goals and budgeting Seth Waldman Cyber security analyst and systems administrator MCSE CompTIA Network +

Small to Medium Sized Businesses (SMBs) In 2014, small firms with annual revenues less than $100 million cut security spending by 20%, while large companies increased security investments by 5%. The 2014 Target breach reportedly occurred when attackers stole network credentials from Target’s HVAC provider. SMBs typically spend less time and money on network security than larger firms. That means they are easy targets for cyber criminals. 60% of small businesses hit by a cyber attack go out of business within 6 months of the attack! Nearly 90% of SMBs in the U.S. do not use data protection for company and customer information, and less than half have secured company email to prevent phishing scams. In 2013, the cost of medical identity theft to consumers was estimated at $12 billion. In 2014, more than 2 million patients were victim to medical identity theft globally, a half million more than were recorded in 2013. Too small to be on radar Automated hacks Supply chain

How Do Hackers Get Data? The receptionist for a small municipal court found a box of branded USB drives left on her desk. In hopes of figuring out who they are for, she plugged one into her computer. The drive was blank, so she gave away the free storage. By then, she had already infected the court‘s office network— and spread the malware to each of the drive recipients. Phishing attacks Shoulder surfing Malware Social engineering

Office Threat Reduction Unified Threat Management (UTM)/Next Generation Firewall (NGFW) Encrypted VPN connection between offices and between remote users Security policies Monitoring

Home/Travel Threat Reduction Most home offices do not use secure VPN to connect to the corporate office Monitored/managed firewall with secure VPN capability Password protected devices Security policies

Layered Approach Perimeter – Firewall Physical Security – Access controls Control Network – Security policies and controls Device Security – Anti-virus

Assessment and Monitoring Meet with customer to discuss needs Develop and implement a plan to meet the needs and budget of the company Proactively monitor the network for security changes or breaches Quarterly reporting of health of network

Incident Response Plan: The Key Elements Prepare – Risk assessment, security architecture, and response plan Reporting – Detect the problem, incident reporting, who receives the reports, assess the damage Incident countermeasures – How do you protect yourself and get your business back up and running quickly, efficiently, and safely? Identifying corrective actions – How do we get back to “normal?” Monitoring corrective actions – Did we fix the problem? Are we doing everything we can to prevent future problems?

Incident Response Plan: Preservation of Evidence Legal action is anticipated - Integrity of the evidence can be the win/lose factor Criminal or civil action - Perpetrator, current employee, former employee, or someone else Law enforcement - Involve? IT staff - Must stay out! Chain of custody - Documentation is critical

Cyber-Security Quarterly – 1st Quarter 2016 Regulatory Updates - What is required for your business to be in compliance? Does your business handle financial information or medical records? Insurance Coverage - Does your business have an insurance policy covering a cyber security incident? Will you be able to make a successful claim? Best Practices for SMBs – Do you have the appropriate training measures in place for your employees? Are there technological measures that you should be taking?

About McCann Security TO GET STARTED CONTACT MCCANN TOTAL SECURITY Every day McCann Security helps business decision-makers and stakeholders solve cyber- security issues and protect their critical data and infrastructure. Visibility and analytics tools such as WatchGuard Dimension™ translate millions of lines of logs into the thimbleful of intelligence you need to recognize and address problems in your network. TO GET STARTED CONTACT MCCANN TOTAL SECURITY HOUSTON NATIONAL DISPATCH CENTER 800.713.7670 Take control of your organization’s cyber-security by putting McCann Security’s dedicated team and three decades of proven experience on the front line! Our operations began during the mass adoption of electronic devices and digitally stored information, and we have continued to lead the cyber-security industry through the evolution of mainframes, desktops and laptops, and now mobile devices and cloud storage. All along the way, our veteran team has been armed with the latest technology, and backed by decades of professional experience in both public law enforcement and private security. MCCANN SECURITY SYSTEMS 10375 Richmond, Suite 260 | Houston, TX 77042 mccann-security.com