aitp-verizon data breach 2009

39
A study conducted by Verizon Business Brief by Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT 2009 DATA BREACH INVESTIGATIONS REPORT 2009 DATA BREACH INVESTIGATIONS REPORT

Upload: hosam-el-dakhakhni

Post on 24-May-2015

217 views

Category:

Business


3 download

DESCRIPTION

Verizon Business 2009 Data Breach Study Finds Significant Rise in Targeted Attacks, Organized Crime InvolvementNearly nine out of 10 breaches were considered avoidable if security basics had been followed. Most of the breaches investigated did not require difficult or expensive preventive controls. The 2009 report concluded that mistakes and oversight failures hindered security efforts more than a lack of resources at the time of the breach. During the presentation we will discuss key findings and simple actions, when done diligently and continually, can reap big benefits. Based on the combined findings of nearly 600 breaches involving more than a half-billion compromised records from 2004 to 2008.

TRANSCRIPT

Page 1: AITP-Verizon Data Breach 2009

A study conducted by Verizon Business

Brief by Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT

2009 DATA BREACH INVESTIGATIONS REPORT2009 DATA BREACH INVESTIGATIONS REPORT

Page 2: AITP-Verizon Data Breach 2009

This brief will cover thefollowing:

• My Conclusions• Quick Facts• Key Highlights• Findings, Conclusions,

and Countermeasures• TVM-Doing More For

Less• Summary of

Recommendations• Q & A

This brief will cover thefollowing:

• My Conclusions• Quick Facts• Key Highlights• Findings, Conclusions,

and Countermeasures• TVM-Doing More For

Less• Summary of

Recommendations• Q & A

Page 3: AITP-Verizon Data Breach 2009
Page 4: AITP-Verizon Data Breach 2009

QUICK FACTSQUICK FACTS

Page 5: AITP-Verizon Data Breach 2009

All results are based on firsthand evidence collectedduring 90 data breach investigations occurring in 2008conducted by Verizon Business.

Only confirmed breaches are included. (not “data-at-risk”)

Most of the statistics presented refer to the percentageof cases, the percentage of records breached, or simplythe number of cases.

The authors make no claim that the findings of thisreport are representative of all data breaches in allorganizations at all times.

All results are based on firsthand evidence collectedduring 90 data breach investigations occurring in 2008conducted by Verizon Business.

Only confirmed breaches are included. (not “data-at-risk”)

Most of the statistics presented refer to the percentageof cases, the percentage of records breached, or simplythe number of cases.

The authors make no claim that the findings of thisreport are representative of all data breaches in allorganizations at all times.

Page 6: AITP-Verizon Data Breach 2009

Roughly 20 percent of cases involved more than onebreach

Nearly half of the caseload had distinct patterns andcommonalities

A little over 1/3 of the cases were made public (so far)

Roughly 20 percent of cases involved more than onebreach

Nearly half of the caseload had distinct patterns andcommonalities

A little over 1/3 of the cases were made public (so far)

Page 7: AITP-Verizon Data Breach 2009

KEY HIGHLIGHTSKEY HIGHLIGHTS

Page 8: AITP-Verizon Data Breach 2009
Page 9: AITP-Verizon Data Breach 2009
Page 10: AITP-Verizon Data Breach 2009
Page 11: AITP-Verizon Data Breach 2009

FINDINGS, CONCLUSIONS, ANDFINDINGS, CONCLUSIONS, ANDCOUNTERMEASURESCOUNTERMEASURES

Page 12: AITP-Verizon Data Breach 2009
Page 13: AITP-Verizon Data Breach 2009
Page 14: AITP-Verizon Data Breach 2009
Page 15: AITP-Verizon Data Breach 2009
Page 16: AITP-Verizon Data Breach 2009
Page 17: AITP-Verizon Data Breach 2009
Page 18: AITP-Verizon Data Breach 2009
Page 19: AITP-Verizon Data Breach 2009
Page 20: AITP-Verizon Data Breach 2009
Page 21: AITP-Verizon Data Breach 2009
Page 22: AITP-Verizon Data Breach 2009
Page 23: AITP-Verizon Data Breach 2009
Page 24: AITP-Verizon Data Breach 2009
Page 25: AITP-Verizon Data Breach 2009
Page 26: AITP-Verizon Data Breach 2009
Page 27: AITP-Verizon Data Breach 2009
Page 28: AITP-Verizon Data Breach 2009
Page 29: AITP-Verizon Data Breach 2009
Page 30: AITP-Verizon Data Breach 2009
Page 31: AITP-Verizon Data Breach 2009
Page 32: AITP-Verizon Data Breach 2009
Page 33: AITP-Verizon Data Breach 2009
Page 34: AITP-Verizon Data Breach 2009
Page 35: AITP-Verizon Data Breach 2009
Page 36: AITP-Verizon Data Breach 2009

Align process with policyAchieve “Essential” then worry about “Excellent”Secure Business Partner ConnectionsCreate a Data Retention PlanControl data with transaction zonesMonitor event logsCreate an Incident Response PlanIncrease awarenessEngage in mock incident testingChanging default credentials is keyAvoid shared credentialsUser Account ReviewApplication Testing and Code ReviewSmarter Patch Management StrategiesHuman Resources Termination ProceduresEnable Application Logs and Monitor

Align process with policyAchieve “Essential” then worry about “Excellent”Secure Business Partner ConnectionsCreate a Data Retention PlanControl data with transaction zonesMonitor event logsCreate an Incident Response PlanIncrease awarenessEngage in mock incident testingChanging default credentials is keyAvoid shared credentialsUser Account ReviewApplication Testing and Code ReviewSmarter Patch Management StrategiesHuman Resources Termination ProceduresEnable Application Logs and Monitor

Page 37: AITP-Verizon Data Breach 2009
Page 38: AITP-Verizon Data Breach 2009
Page 39: AITP-Verizon Data Breach 2009

Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEITPrincipal - R!SC

Visit us at www.it-risc.comContact us at [email protected]