Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com BYOD & Cyber Risks June 26, 2014 Presenter: Robert Listerman, CPA, CITRMS © Business Technology Resources, LLC Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Robert Listerman (Bob) is a licensed Certified Public Accountant, State of Michigan and has over 30 years of experience as a process improvement business consultant. He graduated from Michigan State University and became a CPA while employed at Touche Ross & Co., Detroit, now known as a member firm of Deloitte & Touche USA LLP Bob added the Certified Identity Theft Risk Management Specialist (CITRMS) designation issued by The Institute of Fraud Risk Management in 2007. The designation is in recognition of his knowledge and experience in identity theft risk management. Today Bob focuses his practice on data security compliance. Over 50% of identity theft can be traced back to unlawful or mishandling of non-public data within the workplace. Currently Bob serves his professional community as an active Board Member for the Institute of Management Accountants (IMA), Mid Atlantic Council “IMA-MAC.” He is currently servicing as President of IMA-MAC (2011-2013). He is a regular seminar presenter for the IMA, Pennsylvania Institute of CPAs (PICPA), and the Michigan Association of CPAs (MACPA). Bob serves on, and is a past chair of the MACPA’s Management Information & Business Show committee which enjoys serving over 1000 CPAs in attendance each year. He is Continuing Education Chair of the PICPA’s IT Assurance Committee. Bob serves his local community as a member of the Kennett Township, PA Planning Commission, Communications, Business Advisory, and Safety Committees. He is an active board member of the Longwood Rotary Club. He serves his Rotary District 7450 as their Interact Club Chair (Rotary in High School) since 2010. Past professional and civic duties include serving on the Board of Directors for the Michigan Association of Certified Public Accountants (1997-2000), past board member of the Delaware Chapter of the IMA and past Chapter president for the IMA Oakland County, Michigan (1994-1995). www.linkedin.com/in/boblistermanidriskmanager/ Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com 3 out 4 employees would rather use their own device to connect to work according to Forester Research. Convenience = Productivity Who wants to juggle more than one portable device? Who’s device are you going to know how to work better? Which device are you most likely to have with you when you need it? Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com It makes sense for the employer: 74 % of IT leaders believe “BYOD help our employees be more productive” 58 % of those surveyed cite employee satisfaction is a prime benefit of BYOD. Source: Intel Corporation Survey Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com The operating systems and form factors of consumer technology are rapidly changing The lines between “on the clock” and “off the clock” have been irrevocably blurred Having your device 24/7 allows balancing “work life” with “home life” Don’t need a company-issued device on top of the one they already own (which they really want to use in the first place) Nobody wants to be that person with two smartphones stuffed in his or her pocket. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com BYOD isn’t just coming, it’s already here. – Just as employers had to deal with the challenges of social media like Facebook, LinkedIn and Twitter, just to name a few in recent years now BYOD is also the reality that needs to be addressed. – Just saying “no” is not the best solution. When it’s enviable according to Gartner Research that “by 2018, 70% of mobile users will conduct all their work on personal smart devices.” ? How many here, in this room, use a personal device, whether it be a laptop or “smartphone” to connect to their work email, shared data files, or other internally available processes? Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com 10 Reasons BYOD May Be A Bad Fit 1. Staff resent paying for their own phones, laptops, or tablets 2. It won’t cut your costs after analysis of your requirements 3. It can make life harder for the IT department – i.e. bad fit 4. Corporate-issue IT makes sense for the same reason schools have uniforms 5. Too many security issues to manage Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com 10 Reasons BYOD May Be A Bad Fit 6. Data loss—yours and theirs 7. Short-term gain, long-term pain? 8. It’s a licensing—and legal—minefield 9. Consumer devices will hurt productivity 10. Your staff doesn’t care about gadgets Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Security Concerns Malware infects the network when employee logs in Employees unknowingly installing: Rogue applications or Unlicensed software, which can violate copyright compliance laws Using unsecured wireless connections to send and receive company data IT staff compromise employee’s personal security on device Unknown third-party accesses via mobile apps Stolen, lost mobile devices leak data Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Cyber Security Risks for BYOD “51 percent *of the organizations surveyed experienced data loss resulting from employee use of insecure mobile devices.” “58 percent* of organizations surveyed have experienced an increase in malware infections as a result of personally-owned mobile devices used in the workplace.” “56 percent* say that more confidential data has been lost as a result of these devices.” The challenge is managing numerous fragmented operating systems within the company network. Apart from general network configuration issues, this fact could pose a real exposure for companies using security software not designed with BYOD in mind. * Ponemon Institute Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Challenges In Supporting BYOD Managing numerous fragmented operating systems General network configuration issues Real exposure for companies using security software not designed with BYOD Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com BYOD Challenges Challenge Remarks Device Provisioning Need automated provisioning for device Device Management Network tools can see who’s on board Security Tied to defined user privileges Network Saturation Network tools allocate bandwidth resources Trouble Shooting Network monitoring alerts (example follows) User Privacy Opening Personal Doorway to IT Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com BYOD - Impact on Infrastructure Source: Cisco web lecture Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com BYOD Deployment Guidelines Plan for Implementing a BYOD Solution Develop, Write and Implement a BYOD Policy IT Capable of Provisioning Infrastructure and Devices Proactively Manage and Troubleshoot Mobile Devices Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Outlining a BYOD Policy Build an Internal Team – A good approach is to draw together an interdisciplinary team of a customer’s HR, finance, legal, security, privacy, and IT leaders Create a Customized Program – Create a robust BYOD Policy Statement, and an accompanying Employee Participation Agreement. The Agreement sets clear expectations with employees, and promotes their voluntary compliance with enterprise and security policies, while protecting employers. Implement a BYOD Program – With BYOD policies in place, organizations can improve the productivity of their mobile workforce as well as start saving money on phones, data plans, and IT labor costs spent on support. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Deliverable Complete Policy Statement Based On The Results Of A Workshop Conducted Onsite with the Cross-Functional Team Employee Participation Agreement Policy Statements Can Be Incorporated Into Provisioning Tools Used to Monitor Mobile Device Access Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Scope of BYOD Policy Regulatory Requirements and Constraints BYOD Program Eligibility Financial Parameters and Reimbursement Model Allowable Devices Carrier Plans Approved Uses Security and Enforcement End User Support Model Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Some BYOD Solution Vendors (many many more) Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Future of BYOD While security teams are getting a grip on smartphones and tablets through basic mobile device management (MDM), enterprise mobility requirements continue to evolve. To address these advanced needs, better integrated and more granular MDM tools are emerging. Like any other technology, it will constantly improve and change as devices change. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com a.k.a: the “CLOUD” Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com The Internet “Web” Topography Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Prize for first person who raises their hand AND can identify what these numbers are! Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com IP Tracer Source: http://www.ip-adress.com/ip_tracer/ Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com THE PROBLEM YOU DIDN’T KNOW YOU HAVE IT Administrators harden their networks by building walls with Anti-Virus software to keep out the bad guys The Problem The Problem is that 73% of online banking users reuse their passwords for nonfinancial websites is that 76,000 new malware strains are released into the wild every day The Result is that Anti-Virus software can’t keep up and the bad guys are already inside your walls Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com STOLEN CREDENTIALS EXPOSE YOU TO UNKNOWN RISK 30,000 The number of new malicious websites created every day 1 80% Of breaches that involved hackers used stolen credentials 14% Of data breaches were due to employees using personal email accounts 2 76% of network intrusions exploited weak or stolen credentials. 2 SOURCES: 1. Sophos, 2012; 2. Verizon Data Breach Investigations Report, 2013 Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com MALWARE EVADES TRADITIONAL ANTI-VIRUS SOFTWARE 200,000 – 300,000 The estimated number of new viruses discovered each day 1 52% Of malware in a recent study focused on evading security 2 24.5% Antivirus software’s average detection rate for e-mail based malware attacks 3 SOURCES: 1. Comodo Group, 2012; 2. Palo Alto Networks, 2013 3. Krebs on Security, 2012 40% Of malware samples in a recent study went undetected by leading antivirus software 2 Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com DO YOU KNOW WHAT THESE ARE? "automatedtest", "automatedtester", "bagle-cb", "c_conficker", "c_confickerab", "c_confickerc", "c_pushdo ", "c_trafficconverter", "c_zeroaccess", "childpredator", "citadel", "condo", "cutwail", "d_tdss", "darkmailer", "darkmailer2", "darkmailer3", "darkmailer4", "darkmailer5", "deai", "esxvaql", "fakesendsafe", "festi", "fraud", "gamut", "gheg", "grum", "hc", "kelihos", "lethic", "maazben", "malware", "manual", "mip", "misc", "netsky", "ogee", "pony", "relayspammer", "s_kelihos", "s_worm_dorkbot", "sendsafe", "sendsafespewage", "slenfbot", "snowshoe", "spamaslot", "spamlink", "spamsalot", "special", "spyeye", "ss", "synch", "w_commentspammer", "xxxx", "zapchast", "zeus" Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com ANATOMY OF A SPEARPHISHING ATTACK 1 Target Victim 5 Breach Event 2 Install Malware 4 Collect & Transmit Data Access Network 3 Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CASE STUDY: Target Corporation Nov. 27 – Dec. 15 2013 Dec. 18, 2013 • Hacker execute extended attach against Target’s point-of-sale system • News of the breach is reported by data and security blog KrebsOnSecurity Dec. 21, 2013 Dec. 20, 2013 • JP Morgan announces it is placing daily spending caps on affected customer debit cards • Target acknowledges the breach, saying it is under investigation Dec. 22, 2013 Jan. 10, 2014 • Customer traffic drops over the holiday season, resulting in a 3-4% drop in customer transactions • Target lowers its fourthquarter financial projections, saying sales were “meaningfully weaker-than-expected” Current estimates of the total financial impact to Target is $200 million Target provided affected individuals with 12 months of identity theft protection and insurance coverage 110M user accounts compromised , exposing credit and debit card numbers, CVN numbers, names, home addresses, email addresses and or phone numbers Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com “Ongoing forensic investigation has indicated that the intruder stole a vendor's credentials which were used to access our system.” Molly Snyder, Target Corporation January 2014 Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Email Attack on Vendor Set Up Breach at Target* The breach at Target Corp. that exposed credit card and personal data on more than 110 million consumers appears to have begun with a malwarelaced email phishing attack sent to employees at an HVAC firm that did business with the nationwide retailer, according to sources close to the investigation. Last week, KrebsOnSecurity reported that investigators believe the source of the Target intrusion traces back to network credentials that Target had issued to Fazio Mechanical, a heating, air conditioning and refrigeration firm in Sharpsburg, Pa. * Source: http://krebsonsecurity.com/ Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com THE PROFILE OF AN ATTACKER The malware used to hack Target’s POS system was written by a Ukrainian teen • Andrey Hodirevski from southwest Ukraine carried out the attack from his home • The card details that he stole were sold through his own forum as well as other communities • CyberID-Sleuth™ investigated the breach when it occurred and was able to verify various discussions and identifiers pointing to this suspect Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ PROVIDES MORE THAN AUTOMATED ALERTS Identifying email addresses from a corporate domain that have been hacked, phished, or breached Identifying devices in a corporate network connected to a known malware command and control server Hacks, exploits against networks, glitches, leaks, phishing/keylogging monitoring Credential Monitoring IP Address Scanning Identification of communities targeting brands, networks or IP addresses Doxing awareness and hacktivist activity monitoring Identification of individuals posing a risk to any IP address Identification of intellectual property distribution Locating the individuals and exchanges involved in intellectual property theft Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ IDENTIFIES PROVIDES EARLY WARNING AT TWO POINTS CyberID-Sleuth™ scours botnets, criminal chat rooms, blogs, websites and bulletin boards, Peer-to-Peer networks, forums, private networks, and other black market sites 24/7, 365 days a year CyberID-Sleuth™ harvests 1.4 million compromised credentials per month Dark Web CyberID-Sleuth™ identifies your data as it accesses criminal commandand-control servers from multiple geographies that national IP addresses cannot access CyberID-Sleuth™ harvests 7 million compromised IP addresses every two weeks Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists CyberID-Sleuth™ 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com REMEMBER WHAT THESE ARE? "automatedtest", "automatedtester", "bagle-cb", "c_conficker", "c_confickerab", "c_confickerc", "c_pushdo ", "c_trafficconverter", "c_zeroaccess", "childpredator", "citadel", "condo", "cutwail", "d_tdss", "darkmailer", "darkmailer2", "darkmailer3", "darkmailer4", "darkmailer5", "deai", "esxvaql", "fakesendsafe", "festi", "fraud", "gamut", "gheg", "grum", "hc", "kelihos", "lethic", "maazben", "malware", "manual", "mip", "misc", "netsky", "ogee", "pony", "relayspammer", "s_kelihos", "s_worm_dorkbot", "sendsafe", "sendsafespewage", "slenfbot", "snowshoe", "spamaslot", "spamlink", "spamsalot", "special", "spyeye", "ss", "synch", "w_commentspammer", "xxxx", "zapchast", "zeus" Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ CASE STUDY ACTUAL CREDENTIAL DATA Zeus Infection targeted towards multiple entities within the Hotel Industry within India CyberID-Sleuth™ identified a targeted Zeus campaign which appears to have been focused and distributed to Hotel chains, mainly within the India region. The attack in question caused active compromises against a number of systems. CyberID-Sleuth™ ’s main focus is the type of data often held within Reservation and other Hotel systems. Personal information such as credit card data, as well as passport scans or copies, are often held on Hospitality systems and the data identified next highlights that these same systems are compromised and under direct control of malicious actors. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ IDENTIFIES ACTUAL MALWARE VARIANT Infection Type: Zeus Infection - V2.1 Payload: Theft of all credentials, Key logging of all data, Remote access to devices Total Infection Count: 487 Total Credential Count: 12894 ( including duplicates ) Command and Control (C2) Domain: matphlamzy.com Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ IDENTIFIES ACTUAL CREDENTIAL DATA Date extracted and listed below is related to valid and legitimate accounts which are still active. These are not passwords taken from Breach events or other untrusted sources. They are taken directly from devices that are still infected/compromised! bwstarhotel.com - 111.68.31.202 ,('92', 'RSV1_E532648A3D69E5DE', '-- default --', '33619969', '', '', '1394590108', '7557047', '0', '±\0\0', '1033', 'C:\\Program Files\\Microsoft Office\\Office14\\OUTLOOK.EXE', 'RSV1\\owner', '101', 'pop3://reservation@bwstarhotel.com:starrsv1 *@116.251.209.92:110/', '111.68.31.202', 'ID', '1394590104') Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ IDENTIFIES ACTUAL CREDENTIAL DATA bwmegakuningan.com - 139.0.16.90 ('447', 'USER-PC_E532648A9824115F', '-- default --', '33619969', '', '', '1394593039', '162643491', '0', '±\0\0', '1033', 'C:\\Program Files\\Microsoft Office\\Office12\\OUTLOOK.EXE', 'user-PC\\user', '101', 'pop3://reservation@bwmegakuningan.com: 79r2mz5xrx@116.251.209.92:110/', '139.0.16.90', 'DE', '1394593037 ') Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ IDENTIFIES ACTUAL CREDENTIAL DATA townsquare.co.id - '180.250.172.36 ('453', 'RESERVATION_1F3D59E96522DF69', '-- default --', '33619969', '', '', '1394592970', '14267024', '0', '± \0', '1033', 'C:\\Program Files (x86)\\Microsoft Office\\Office12\\OUTLOOK.EXE', 'TSPDC\\vitha', '101', 'pop3://reservation.seminyak@townsquare.co.id:tsbali1234@ 103.31.232.210:110/', '180.250.172.36', 'ID', '1394593095') Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ CASE STUDY ANATOMY OF THE FINDINGS Q. How many credit cards were captured? Over 257 unique credit cards were stolen during the attack. CyberID-Sleuth™ identified the botnet, which was made up of infected devices. Q. Specifically what data did it steal and report back that you could see? CyberID-Sleuth™ could see EVERYTHING that was entered on a user’s device or saved as a password or credential. Q. How much did this breach cost the client? No “price” could be put on the damage caused to a victim after a fraudster has stolen their credentials. The data stolen would allow the fraudster access to internal systems, either via the stolen credentials or via backdoor access to affected systems. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ CASE STUDY ANATOMY OF THE FINDINGS Q. What data about the attacker were we able to find? Limited details. Any information about the attackers are not shared with clients unless a directed attack, and is only shared with US and UK Law Enforcement. Q. How did the authorities use the data to capture the intruders The individual responsible for running the botnet in question is so far still at large. Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists Tier I 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com CyberID-Sleuth™ Credential Monitoring Demo * * Let us see if your credentials are for sale, at no obligation Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 Remediation Efforts Assessment Efforts www.BTR-Security.com A STANDARD RESPONSE TIMELINE SHOULD BE FOLLOWED Initial Internal Reporting, notifications, and security triage of the “event” Plan Ahead By Forming a Breach Response Plan Activate technical / security focused breach response team processes and procedures based on Data Breach Plan Determine total scope of event, size of affected population, type of data lost or compromised, necessary legal and industry specific guidelines Determine Organization’s Public Response Plan (including notification type, verbiage, and remediation offering if any) Implement Breach Response Plan Prepare Internal and External Communication Plan & Copy Contact and or activate contract with Data Breach Remediation Vendor CyberID-Sleuth Tiers II & III Establish internal or third party communication channel to affected population Coordinate Breach Notification Copy and Distribution with Breach Remediation Vendor Notification Capabilities Go Live Internal and External Communication of Event, Reaction, and Remediation Incident Detection / Discovery Incident Notification & Resolution Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com RECOMMENDATIONS TO REDUCE DATA BREACH EXPOSURE & COSTs • Promote Employee Data Management Training & Education • Utilize and maintain available data loss prevention technologies such as CyberID-Sleuth™ • Require GC / CISO and their teams to understand industry, state, federal, and event specific data breach response guidelines and recommendations • Require advance encryption and authentication solutions be in place across the organization • Establish an internal data breach response plan and process flow • Prior to a data breach event contract with a data breach remediation, notification, and or forensics provider • Contractually require notification from vendors who manage data from your organization to alert you of they incur a breach of any data • Support enactment of legislation that clearly dictates rules and guidelines for organizations to follow in advance of, and following a data breach event Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com Take this 20 Question Assessment to Score Your Risk Level Data Security Compliance Advisors Certified Identity Theft Risk Management Specialists 873 East Baltimore Pike #501 Kennett Square, PA 19348 610-444-5295 www.BTR-Security.com 1. Remember to ask us to do a no-obligation credential search for you 2. Allow us to give you the 20 Question Assessment Score on your risk level