Download presentation
Presentation is loading. Please wait.
Published byValentine Homer Mathews Modified over 6 years ago
1
Cyber Security in the Mortgage Industry
… and What YOU Can Do About It April 3, 2018 Page 1
2
Who Am I? Chief Information Security Officer for Pulte Financial Services Pulte Mortgage PGP Title Pulte Insurance Agency Over 18 year in Information Security IT Managed Services, Telecom, Energy, Healthcare, and Financial Services Former Denver Chapter and International Board member for the Information Systems Security Association (ISSA) Co-host of the Colorado = Security Podcast Page 2
3
Cyber Security Goals Protect Confidentiality Integrity Availability
Limit impact to usability and speed Limit impact to user bad choices Page 3
4
Recent Security Events
5
Equifax Breach 143 Million consumers affected
Unpatched Application (Apache Struts) Poor incident response What we can learn from this: Vulnerability management isn’t “one guy’s job” Incident response must be practiced Page 5
6
Facebook Data Leakage 87 Million users affected
Not actually a data breach Lack of control processes What we can learn from this: Understand data flows Legal agreements don’t prevent incidents Communication needs to be part of incident response Page 6
7
DeepRoot Analytics Breach
198M US citizens’ data PII but not SSNs Amazon cloud storage left unprotected What we can learn from this: You are responsible for security in the cloud Correlated public data can be dangerous Page 7
8
SEC EDGAR DB Breach EDGAR DB breached in 2016
Access to non-public financial information Information led to stock trading gains What we can learn from this: Attackers follow the money Financial gain not limited to PII or credit card numbers Page 8
9
Security Trends
10
Ransomware Ransomware ~60% malware payloads ransomware WannaCry
Ransomware-as-a-service Healthcare especially hard hit What we can learn from this: Don’t allow SMB from the Internet Upgrade malware defenses Take away admin rights Page 10
11
Availability Attacks NotPetya caused significant damage
BickerBot “bricked” over 10 million devices IoT used in DDoS networks What we can learn from this: Availability attacks rising Incident response IoT security Page 11
12
Wire Fraud Phishing is easy Over $1B in real estate wire fraud
Realtors are big targets What we can learn from this: Path of least resistance Very little data needed Make attackers work harder Page 12
13
Blockchain Blockchain is going to save the world Cryptomining malware
Attackers follow the money What we can learn from this: Account for attacks using resources Secure blockchain technologies Secure digital wallets Page 13
14
Takeaways Basics are important and we still don’t do them well
Proper incident response can make or break you Your data is everywhere Attackers will follow the money Page 14
15
How Do We Solve These Problems?
Page 15
16
Security Program NIST Cybersecurity Framework
MBA’s “The Basic Components of an Information Security Program” Risk Based Metrics 3rd party oversight Dedicated Security Personnel Page 16
17
Incident Response Plan
What do you do when you suspect a problem? Who do you involve? What do you do when you know you have a problem? Who do you contact and how fast? Practice, practice, practice Page 17
18
Multi-Factor Authentication
A single secret isn’t good enough for most cases Makes account compromise much more difficult Use a modern MFA (or even risk based) product NIST Digital Identity Guidelines Page 18
19
Attack Surface Reduction
Threat Modeling Only collect and share the data you need Least privilege access Segmentation DMARC Page 19
20
Data Security Know where your data is stored Know your data flows
Encryption Know what 3rd parties you share data with Page 20
21
Questions? Contact Email: alex.wood@pulte.com Twitter: @abwoodrow
Website: Page 21
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.