five-part cybersecurity webinar series how to minimize ......five-part cybersecurity webinar series...

18
How to Minimize Cyberattack Damage Presented by: Jeffrey Ziplow Partner David Nowacki - Manager Five-Part Cybersecurity Webinar Series

Upload: others

Post on 04-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

How to Minimize Cyberattack

DamagePresented by:

Jeffrey Ziplow – Partner

David Nowacki - Manager

Five-Part Cybersecurity Webinar Series

Page 2: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

2

Page 3: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

Click to add text

Page 4: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

WannaCry – spreads around the world!!

Equifax – Apache not Patched

Page 5: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not
Page 6: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

2005 2012 2013

Q1 Q2 Q3 Q4

2014

Q1 Q2 Q3 Q4

2015

Q1 Q2 Q3 Q4

2016

Q1

-

Gpcoder

Reveton

Kovter

Urausy

Nymaim

Cryptowall

Browlock

Linkup

Slocker

CTB-Locker/Citron

Synclocker

Onion

TorrentLocker

Zerolocker

Coinvault

TeslaCrypt

BandarChor

Cryptvault

Tox

Troldesh

Encryptor RaaS

CryptoApp

LockDroid

LowLevel404

CryptInfinite

Unix.Ransomcrypt

Radamant

VaultCrypt

XRTN

Cryptolocker2015

Simplocker

Pacman

Virlock

Pclock

Threat Finder

Hidden Tear

ORX-Locker

Dumb

Maboua OSX POC

Power Worm

DMA-Locker

Gomasom

Chimera Locker Ginx

Ransom32 73v3n

CryptoJocker

LeChiffre

Nanolocker

Magic

Locky

Vipasana

Hi Buddy

Job Cryptor

PayCrypt

KeRanger

Umbrecrypt

Hydracrypt

Page 7: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

» The World Economic Forum classifies cybercrime as a “Top Global Risk”.

» 85% of business assets are in digital form

» 68% of funds lost in a breach are declared unrecoverable

» Small businesses are a target.

» Easy target for cybercriminals.

» Systems as a secret doorway into their corporate partners’ networks.

» Experience a higher proportion of cybercrime costs

» Experience the disruptive effects of data breaches both immediately and in the long term

» Any device connected to the Internet can be hacked.

» Devices offer hackers quick access to businesses’ data through unsecured Wi-Fi networks

» Compromised IoT devices and turn them into “bots” to use in future attacks

» Adequate security protocols do not yet exist

» Over 75% of all cyberattacks target known vulnerabilities

Page 8: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

8

» Lack of updating (patching) software and O/S

» Lack of password length, rotation and/or complexity

» Missing anti-virus/spyware updates or software not working

» Inadvertent Actors Responding to Phishing emails

» Inability to identify ransomware before attack

» Lack of employee training and/or user education

» System alerts and logs are not monitored

Page 9: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

Remediate – Critical Security Controls

Page 10: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

• Conduct an data inventory assessment

• What kind of personal, confidential and/or restricted data does your business have?

• How is that data handled and protected? Who has access to that data?

• Is the data encrypted in transit and at rest?

• Confirm documented policies and procedures

• Do employees recognize importance of data security protocols?

• Control (and monitor) employee access to sensitive data

• Keep to a “least privilege” necessary method

• Evaluate your vendor contracts

• Validate their commitments to protecting your data

10

Page 11: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

11

• Confirm documented policies & procedures

• Written Information Security Program (WISP)

• Documents policies & procedures for securing and protecting the network

• Patching and Vulnerability Management

• Password and User Policies

• Configuration Management / Device & Software Hardening

• Perimeter Security, Incident Detection, Data Leakage Prevention

• Provides policies for accessing, collecting, storing, using, transmitting and protecting personal information

• New hire and Termination process/program

• Disaster Recovery/Business Continuity

• Bring Your Own Device (BYOD)

• Incident Response Plan

Page 12: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

NIST – National Cyber Security Framework – Self Assessment

Page 13: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

13

Access

Management

PERIMETER

APPLICATION

NETWORK

Host

DATA

Encryption

Access

Control

Input Validation

Host IDs

Vulnerability Assessment

Access Control

Virus ProtectionVulnerability AssessmentAccess Control

Intrusion DetectionIntrusion Prevention

Vulnerability AssessmentAccess Control

FirewallVPNEncryptionAccess Control

LAYERED

SECURITY

FRAMEWORK

Page 14: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

14

Core Objectives

• Develop and demonstrate foundational-level knowledge of cybersecurity

• Confirm understanding of policies and procedures

• Employ best practices to protect privacy and data

• Identify and report potential cybersecurity and privacy incidents promptly

• Recognize common threats:

• Phishing

• Business Email Compromise

• Insecure Browsing

• Data Leakage

Page 15: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

15

Preparation

Identification

Containment

Eradication

Recovery

Page 16: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

16

• Document security policy & incident handling procedures

• Build a team

• Confirm contact information & security channels

• Who needs to be contacted (Attorney, AG office)

• Proactive Monitoring

• Alert Log Retention

• Vulnerability Monitoring

• Incident prevention

• Perform risk assessment

• Patch management

Page 17: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

» Demonstrate proactive support for cybersecurity

» Roadmap to Improve Security Programs and Practices

» Create a culture of cyber security

» Emphasize its importance (tone at the top)

» Resource it appropriately (budget and people)

» Chat regularly with your CISO

» Discuss the organization’s current security posture, threats and risks, and needs

» Leverage Consultants and Advisors

» Follow processes and security safeguards

» Perform a vulnerability assessment

» Layer security protocols

» Train employees

Page 18: Five-Part Cybersecurity Webinar Series How to Minimize ......Five-Part Cybersecurity Webinar Series 2 Click to add text WannaCry –spreads around the world!! Equifax –Apache not

18

Jeffrey Ziplow – MBA, CISA, CGEIT

Partner

BlumShapiro

860.561.6815

[email protected]

David Nowacki–CISA, CIA

Manager

BlumShapiro

860.561.6811

[email protected]