covering your information assets - wgfoa€¦ · covering your information assets: developing...

58
Covering Your Information Assets: Developing security in a constantly changing environment. Synercomm, Inc. Jeffrey T. Lemmermann, CPA, CITP, CISA, CEH [email protected] Wisconsin Government Finance Officers Association September 12, 2019 Green Bay, WI

Upload: others

Post on 26-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Covering Your Information Assets: Developing security in a constantly changing environment.

Synercomm, Inc.Jeffrey T. Lemmermann, CPA, CITP, CISA, [email protected]

Wisconsin Government Finance Officers Association

September 12, 2019 – Green Bay, WI

Page 2: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Who Am I

ID• Jeffrey T. Lemmermann

• Information Assurance Consultant – SynerComm• January 2018

EXP• 24 Years with CliftonLarsonAllen

• Risk Services Practice Manager• IT Audit / IT Security Specialist

• 5+ Years as CIO/CFO – Manufacturing Industry

CERT• CPA, CITP, CISA, CEH

• CITP – Wisconsin Champion (If you are a CPA )

“Security Assessment & Consulting, IT Audit, Compliance with IT Frameworks (NIST, COBIT) and continuing an ongoing crusade to

promote information security!”

Page 3: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Information Security

1. 5G Fixed to 5G Mobile (4)

2. Expanded Chatbot Use

3. Cloud Computing Evolution

4. Blockchain Understanding (5)

5. Data Analytics (2) / Machine Learning (6)

Topping The Charts Everywhere!Forbes 2019 Top 10 Digital Transformation Trends

6. General Data Protection Regulation

7. Augmented Reality (7)

8. Edge Computing (3) / Internet of Things (1)

9. Consumption IT [all as a service] (8)

10.Hiring for Digital Transformation (10)

Page 4: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Importance of Data Security

Regulations GDPR / CCPA HIPAA GLBA / SOX 404 Red Flag Rules PCI Standards

Publicity“No such thing is bad publicity

…except your own obituary.”- Brendan Behan, Irish Dramatist

Damage to reputation. Loss of consumer confidence. Redirection of resources

Target40M Credit/Debit Cards

Compromised

46% Dip In 2013 4Q Profits

Atlanta, GA$11M+ in costs so far. 1/3 of applications still affected. 70 computers lost along with data including dash cam footage.

Riviera Beach, Florida5/29/19 Infected email attachment took down all of the city’s online

systems, including email and some phones, as well as water utility pump stations.

6/4/19 Authorized $900,000 to recover/replace affected hardware. 6/17/19 Authorized payment of $600,000 to hackers.

Baltimore, MD5/7/19 RobinHood ransomware attack -city service outages ultimately cost $18 million (and counting) in recovery costs

and lost revenues.

Page 5: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Dark Web / Deep Web / Surface Web

Simple Definition: The part of the internet that isn't visible to search engines.

It requires the use of an anonymizing browser, like Tor, to be accessed.

What is done with that information?

Exchange on the DARK WEB…

Page 6: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Voting Machines!

Page 7: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Data Security 101

Where is our data now? Where should our data go? Where can our data go?

Who can access our data? Who needs to access our data?

Understanding the environment

Page 8: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Where does it start?

You can’t protect…

…what you don’t know about.

Page 9: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Where Is Your Data?

The ObviousNetwork File/Data Servers Laptop ComputersBackup Storage Media

The ObscureSmartphones / TabletsPortable Storage (USB Drives)E-Mail Attachments

The ForgottenDisposed Equipment – LEASED Equipment!

Page 10: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Proper Disposal Rules

“Disposal practices that are reasonable and appropriate to prevent unauthorized access to –or

use of- information in a consumer report.”

Burn, pulverize, or shred papers so they cannot be reconstructed. Destroy or erase electronic files or media so information cannot be

read or reconstructed. Conduct due diligence and hire a document destruction contractor.

Due diligence could include: Reviewing contractor’s independent audit Obtain information from several references Require certification by recognized trade association Review contractor’s information security policies or procedures

Page 11: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Hard Drive Data

Study of 2nd Hand DrivesO & O Company:

2004: 88% of Disks from EBay contained recoverable data. 2005: 71%

Edith Cowan University – Annual study of 2nd hand hard drives 2006: 48% 2009: 39% 2012: 47% 2007: 40% 2010: 2008: 38% 2011:

Type of recoverable data: Internal company memos Legal correspondence of governmental agency Credit ratings (Bank owned hard drive)

File erasing Utilities Eraser (Freeware - up to 35 overwrite passes) Steganos Security Suite (up to 100 passes)

Page 12: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Hard Drive Data Worries

What About Smartphones?Deleting Apps Might Not Delete DataSD Card StorageData Stored By Service Providers

Tablet Computers – Same Issues as Smartphones

Solid State Drives (SSDs) Traditional Disk Wiping Utilities Do Not Work “Nearly impossible to completely delete data from SSD’s”Physical Destruction Highly RecommendedNewer SSDs – Deletion Utilities with Drives

Page 13: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Smartphone / Tablet Drive Data

Study of 2nd Hand Smartphones AVAST purchased 20 Android smartphones from eBay Factory Data Reset was performed on the devices What was still found on the phones:

40,000 photos: 1,500 were family photos including children750 email and text messages250 names and associated email addresses Identifiable information from four owners1 completed loan application

Recommendation First encrypt device and SD card Then perform factory data reset

Page 14: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Data Security

How can we keep our data safe?

"The search for static security - in the law and elsewhere - is misguided. The fact is security can only be achieved through constant change, adapting old ideas that have outlived their usefulness to current facts."

- Canadian physician, William Osler

Page 15: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Case Study – Public School District

Case Study: Open Records

How “open” do you mean?

Page 16: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Security Points

Five Key Points of Data Security:Physical SecurityNetwork SecurityApplication SecurityExternal SecurityPlanning & Governance

Page 17: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Physical Security Fail

How to avoid this:

Page 18: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

(1) Physical Security

Access to Equipment Locked server room, mobile equipment logs

Theft Prevention Procedures Cameras, user policies on mobile equipment

Separation of Duties Ordering / Inventory separate from Installers

Hardware Inventory Serial numbers, internal configurations, assignments

Page 19: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

(2) Network Security

Password Policies Minimum characters, forced changes, complexity No sticky notes!

Unattended Terminal Protection Password protected screensavers, firm policies

Network File Structure Security User site of files, annual review process!

Auditing Logs Activate logging, review logs

Control of Backup Tapes Physical security, password protection

Page 20: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Top 3 Ways We Compromise Your Org

BadPasswords

Social Engineering

Permissions

Methods of Compromise

Page 21: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

21

Bad Pa$$words

Page 22: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

• Reusing your password across multiple systems and services?

• Using a predictable convention?

• Incrementing a number at the end?

• NOT using a password manager?

• Have you shared your password with anyone else?

• Is it written on a sticky note somewhere on your desk?

Predictable Management SharingReuse

Bad Passwords : Bad Practice

Page 23: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

02

Known Bad

03

Locally Bad

01

Seasonally Bad

Password1

P@$$word1!

QWERTY

Packers12

Packers19

$CompanyName19

$ChildName$BirthYear

Spring 2019

Spring19

Spring2019!

Spring19!

Bad Passwords : Insider Secrets

Page 24: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Password Complexity Demo

Importance of non-dictionary passwordsDictionaries now including numbers added to wordsAlternate spelling meth0ds 1nclud3d

Importance of lengthEase of brute-force attacks Flaw in some encryption methods

Importance of other charactersAdds to password possibilitiesHelps to beat dictionary cracks

Page 25: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Password Recommendations

Secure Password Techniques:Use modified pass phrases

4score&7yearsagoLet’sg0r3d

Connect words with modifier in middleMilwaukeejtl07BucksAries01thejtlram

Stick with constant formulasUse secure password database managers

PC / PocketPC – KeePass (http://keepass.sourceforge.net)Android – KeePass, LastPass, SplashId iPhone / iPad – DataVault Password Manager (iTunes store)

Page 26: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

(3) Application Security

Key Application Security Accounting, HR, or other sensitive data applications Follow password standards of network Segregation of duties / Reporting Controls

Anti-Virus Protection (Symantec, McAfee, etc.) Server based, automatic updates of workstations E-mail protection

Patch Maintenance Windows Update Services

Employee Training Dangerous Files, E-Mail Concerns, Web Surfing

Spyware Protection

Page 27: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Spyware – Detecting & Eliminating

Signs you have been infected: Random “Security” Pop-up windows appear when browsing. Drop in computer performance. Normal home page has been replaced / new search bars.

Removal help: Cleaning Programs: ComboFix, SpyBot Search & Destroy Monitoring & Prevention: SuperAntiSpyware, MS Defender

Other Tools: CCE – Comodo Cleaning Essentials www.processlibrary.com Online File Scans:

www.virustotal.com Malwr.com (will give screen shots of execution of file…)

Page 28: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

(4) External Access Security

Cannot have without other elements!Weakness in other areas can defeat the best external security.

Access method security (vpn, citrix, etc.) Data Encryption User Education

Activities to avoid Popular methods of capturing data:

Shoulder surfing Key logging / capturing programs Packet sniffingWireless worries

Page 29: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Wireless Security

Control AccessUPDATE FIRMWAREChange Defaults!

Administrator Password / Network SSID MAC Filtering

List of authorized wireless Ethernet cardsScan self for “rogue” access points

HeatmapperWiFi Analyzer (Android Tool)

Control own equipment’s accessCurrent Encryption (WPA2)

Page 30: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Real World Outdated Tech

Case Study: Wireless Risks

The “Cantenna” T.J. Maxx Breach

Page 31: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

(5) Planning & Governance

Align IT Goals with Business Goals Does the IT Department work for you or run you? Is IT Planning part of the overall strategic planning process? Steering committee: department head involvement!

Must-Have Plans: Disaster Recovery \ Business Continuity

Testing! Involvement of all departments – what are their needs?

System Security Plan Incident Response Plan

Data disclosure events Contact Requirements

Page 32: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Policies & Procedures

Policies in general: Signature requirements \ acknowledgement Redistribution of policy \ general availability Centralize & minimize total number Training opportunity on changes!

Important groupings: Computer Use Policy

Internet Use E-Mail Use

IT Security Policy Confidentiality statements Data handling and storage Data retention & destruction

Page 33: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Policies & Procedures – Updating

The importance of reviewing and updating policies:

What happens when two worlds collide? Can social media be used for public debate? What rules are in place for posting information by the elected? How can the use of social media be policed?

Sunshine Laws

Page 34: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Data Security

Updating our policies and procedures is a critical part of the circle.

Page 35: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

35

What is this hacking thing you speak of?

Computer Information Hacking

Page 36: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Attack Origins

Points of Origins of Network Attacks InternalHarder to protect against – productivity vs. securityMotivations:

Personal GainRevenge (Missed promotion, about to be fired)Job Security

ExternalHard to identify sourceMotivations:

Random AttackRevenge (Former employee, angry client, competitor) Industrial Espionage

Page 37: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

37

Close your eyes.

Imagine a “hacker”

Computer Information Hacking

Page 38: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

38

What Hackers Look Like

Page 39: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

39

What Hackers Look Like - 2

Page 40: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

40

Social Engineering Expert

• FBI Most Wanted List - 1994• Banned from the Internet on January 21, 2000• Current Chief Hacking Officer of KnowBe4• CEO of Mitnick Security

Kevin Mitnick

Page 41: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

“Any act that influences a person to take an action

that may or may not be in their best interest.”

Social Engineering

Social Engineering : what is it?

Social Engineering Defined

Page 42: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Social Engineering Tactics:

PhishingBanking Spoofs, E-Bay Accounts, etc.New Evolution: Pharming

“Poisoning” of DNS Record to redirect requestSite could be exact duplicate of intended site

MalwareKey-loggers & Screen Capture ProgramsBrowser Hi-jacksDrive-by Malware Infections

Friendliness / Naivety

Page 43: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

2019 Recent Attacks:

Business eMail FraudCity of Ottawa, Canada – urgent email to staffWire of $100,000 to scammer – procedures not followed

Payroll RedirectionCity of Tallahassee, FL - 3rd party vendor compromised $498,000 in payroll checks redirected to scam accounts Thomas County School System – Thwarted $2M attempt

RansomwareGreenville, NC – Stuart, FL – Augusta, MN, Imperial County, CA – Baltimore, MD – Albany, NYRiveria Beach, FL – Who is next???

Page 44: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

How does it start and spread?

Phishing Emails Attachments / Website Links

Compromised Websites Drive-By Downloads Social Media Post Links Remote Desktop Protocol

Free Software Removable Media (Thumb drives)

Page 45: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Social Engineering : Phishing Examples

Social Engineering Email

Page 46: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Social Engineering : Phishing Examples

Social Engineering Website

Page 47: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Social Engineering : Phishing Examples

Fake Invoice Scams• Compromise target email system• Send bogus invoices from email account

Real World - Phishing

Page 48: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Social Engineering : Phishing Examples

Fake Invoice Scams• Examine links closely• Account Payable Verification Procedures

Real World - Phishing

Page 49: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

49

“an electronic fraud tactic utilizing voice technologies in which individuals are tricked

into revealing critical financial or personal information to

unauthorized entities.”

Vishing

Security Awareness

Vishing: what is it?

Vishing Defined

Page 50: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Social Engineering : Vishing Examples

Jury Duty Scams• Missed jury duty – warrant issued• Must come down to location or call back• Buy payment cards

• Payment system is down

Real World - Vishing

Example!

Page 51: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

51Security Awareness

Social Engineering : Vishing Examples

Social Engineering Combined

Page 52: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Social Engineering : Vishing Examples

My Dad – Combined Computer Help / Call

Real World – Fish/Vish

Page 53: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

A Typical Classic IT Hack

Organization Data Store

Unethical Hacker

SS’s Information

SS’s Information

Employee

Customer

Vendor

HH Buys Information

Transfers Money

Opens Charge Account

UH Steals Information

Cracks Database

Wireless Sniff

Social Engineering

UH Posts Information

Page 54: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

A Ransomeware Attack

SS’s Computer Infected

Spread Infection

Lock Screen

Encrypt Files Local Stores

Network Shares

UH Receives Payment

Decrypt key is sent*

Backdoor left on machine

Will return for more!* most of the time

UH Demands Payment

Paycard or Bitcoin

Delay escalates amount

Can threaten to post files

Page 55: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Access

Attacker

Internal System 1

Internal System 3

Admin Wkst #1

Admin Wkst #2

Admin Server #1

Permissions : Admin Rights

Phished Machines Admin Rights

Internal System 2

Stepping Stones in Hacking

Page 56: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Defense - Scanning Yourself

Social Engineering / Online Searches Testing tools – KnowBe4 Areas of search

Have I Been pwned (https://haveibeenpwned.com) ARIN Records – DNS Stuff

Vulnerability Assessments Finding rabbit holes - weak points in your network Online Tools

Shields Up Nessus (www.nessus.org) OpenVAS (www.openvas.org)

Free Nessus vs. $1500 Version Windows & Linux Versions External & Internal Use

Penetration Testing How far down does the rabbit hole go? Care in performing exploits – not for amateurs! Metasploit

Page 57: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Understand Your Enemies

You have to understand their tactics to better stop them.Hacking for Dummies by Kevin Beaver, Stuart McClure

Certified Ethical Hacking – Training & Certification Vulnerability Assessments Penetration Testing

On-line Resources Krebs on Security - krebsonsecurity.com SANS – www.sans.org NIST – www.nist.gov

Page 58: Covering Your Information Assets - WGFOA€¦ · Covering Your Information Assets: Developing security in a constantly changing environment. ... computers lost along with data including

Questions & Answers

SynerComm’s goal is to be a Trusted Advisor and Preferred IT Solutions Provider by assisting our clients to achieve a goal, solve a problem, or satisfy a need.

Jeffrey T. Lemmermann, CPA, CITP, CISA, CEHInformation Assurance Consultant - SynerComm, Inc.

[email protected]