clicking here.

advertisement
A PM’s Guide to Surviving A Data Breach
We Are Cyber Risk Managers
• Compliance:
• PCI QSA and PCI Gap Analysis
• FISMA
• HIPAA
• SSAE 16
• GLBA, Red Flags
• Response
• Incident Response and Disaster Recovery
• Electronic Litigation Support and Forensic Recovery
• Penetration Testing
• Business Continuity Planning
• Network Architecture Design
• Crisis Communications
• Insurance and Liability Planning
The first rule of survival:
Don’t Cross the Street Blindfolded
In cyberspace, you have to be
right 100% of the time. A hacker
only has to be right ONCE.
How does it happen?
•
•
•
•
•
•
•
User Credentials
Phishing
User Errors
Malware
Misuse
Unpatched Systems
Web App Attacks
Companies spend money on the
wrong things.
How much businesses*
spend on physical security
Global losses to physical
theft**:
How much businesses spend
on cybersecurity
Global losses to cyber
attacks**:
2% of Revenue
$112 Billion
.4% of Revenue
$300 Billion
* $10M - $100M in revenue (Bloomberg)
** 2013 (Ponemon Institute)
Consider…
•
•
•
•
•
•
US credit card fraud in 2013 equaled $7.1B
• The entire rest of the world totaled $6.8B
71% of cyber attacks happen to businesses with less than 100
employees
The forecasted average loss for a breach of 1,000 records is between
$52,000 and $87,000
60% of SMB that experience a data breach are out of business within 6
months
Extremely effective hacking tools are cheap or free and are easy to
obtain and use
Social engineering and employee error are common causes of a breach,
followed by application vulnerability
Technology does not equal
security...
Defense-In-Depth: Technology
• 99% of exploited
vulnerabilities had an
available patch
• More than half of
vulnerabilities have an
exploit available within 30
days
• 70-90% of malware is
unique to an organization
…neither does compliance.
SSAE
16
SOC
Red
Flags
PCI
GLBA
ISO 27000
SOX
HIPAA
NIST
We trade convenience for security
every day.
•
•
•
•
•
•
•
Convenient:
Online Banking
E-Commerce
Medical Portals
Cloud Storage/Access
Anywhere
Vendor Access
Remote Management
Single Sign-On Across
Platforms
•
•
•
•
•
•
•
Commonly Stolen:
Personal Information
Credit Information
Medical Records
Intellectual Property
Customer/Partner Data
Network Credentials
Email
Addresses/Passwords
The second rule of survival:
Diamonds vs. Toothbrush
Risk Mitigation: Pre-Planning
•
•
•
•
•
•
•
Identify critical information and map it
Determine data retention requirements
Know compliance and legal requirements
Identify vendors
Conduct a risk analysis
Determine your threshold
Identify gaps
What’s Most Important?
• Banking Credentials
• Intellectual Property
• Cloud Storage
• Customer Data
• Vendor Access
• Supply Chain Data
• Remote Management
• Network Credentials
• Employee PII
• Email Addresses
• Credit Information
• Legal Data
• Medical Records
• Financial Records
• Social Media Presence
• Payroll and Accounting Data
The third rule of survival:
Don’t Go to Costco the Day of the
Storm
Risk Mitigation: Response
•
•
•
•
•
Breach response begins before a breach
IR planning is critical
Know your networks and devices
Train employees to recognize and respond
Success is measured in hours
Risk Mitigation: Response
• Your team:
• Legal Counsel
• Network and Security Administrators
• Insurance Agents
• PR/Crisis Communications
• Forensics and Recovery
• Decision Makers (CIO, COO, CEO)
• HR
• Breach Resolution Service
Risk Mitigation: Compliance
• Guidelines and standards for protecting
critical information
• Most standards allow flexibility based on
risk
• Prioritizes spending and drives response
criteria
• May require technology solutions
• Best defense against fines, fees, litigation
• Compliance does NOT make a company
Risk Mitigation: Insurance
• The policy must meet the needs of the
business
• Forensics, legal, PR, notification and lost
revenue are all insurable events with the
right policy
• More information is better when calculating
need
• Watch for exclusions
• Catastrophic protection vs. Cyber HMO
The fourth rule of survival:
Exercise is good for you.
Risk Mitigation: Exercise
•
•
•
•
•
•
•
Training, training, training
Tabletop or Simulation
Walk-through responsibility
Evaluate for currency
Allow enough time
Debrief
Repeat at least annually
The fifth rule of survival:
It’s best to solve the problem
with the simplest method.
Data Breach: When it’s not a drill
•
•
•
•
•
•
•
•
•
Remove affected devices from the network, don’t turn it off!
Call your lawyer
Activate the IRP
Interview and document
Determine the extent of the breach
Engage your forensic team
Identify legal obligations
Manage communications
Remediate and recover
Final Thoughts:
• By 2020, the global Cyber Security market is expected to
skyrocket to more than $140 billion
• It isn’t possible to manage risk through technology and
hardware alone
• Cyber is a component of risk management
• Vendors are an important part of cyber risk
• People make mistakes
• Companies must re-think insurance, compliance, liability, and
training to include cyber
www.sera-brynn.com | info@sera-brynn.com | 757-243-1257
“There are two kinds of companies in
America: those who’ve been breached
and those who don’t know they’ve been
breached.”
FBI Director James Comey
Helping Your Company or Client:
Ask them simple questions about compliance and risk
management…
• Have you thought about what you would do in a data
breach situation?
• What critical information do you have?
• Is your legal team ready to handle your data breach?
• Do you know if you are compliant?
• Does your cyber insurance product meet your needs?
www.sera-brynn.com | info@sera-brynn.com | 757-243-1257
Protect Yourself:
• Take Personal Responsibility
• Consider a credit freeze if you’ve been breached
• Secure your home network, use separate networks for
sensitive information
• Backup your data
• Avoid coffee shop Wi-Fi
• Evaluate the convenience vs. privacy tradeoff
• Vary your passwords
Questions?
Heather Engel
heather.engel@sera-brynn.com
www.sera-brynn.com | info@sera-brynn.com | 757-243-1257
Download