masstlc opening slides and simulation session

16
MassTLC Security Conference COMPREHENSIVE SECURITY – A 360 0 VIEW OF YOUR SECURITY PROGRAM Tweet it out @MassTLC #MTLCsecurity

Upload: masstlc

Post on 07-Jan-2017

114 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: MassTLC Opening Slides and Simulation Session

MassTLC Security ConferenceCOMPREHENSIVE SECURITY –

A 3600 VIEW OF YOUR SECURITY PROGRAM

Tweet it out@MassTLC #MTLCsecurity

Page 2: MassTLC Opening Slides and Simulation Session

The MA Tech Ecosystem

@MassTLC #MTLCSecurity

Page 3: MassTLC Opening Slides and Simulation Session

Thank You to Our Platinum Sponsor

3

Thank You to Our Gold Sponsors

@MassTLC #MTLCSecurity

Thank You to Our Silver Sponsors

Page 4: MassTLC Opening Slides and Simulation Session

Thanks to Our Global Sponsors

@MassTLC #MTLCSecurity

Page 5: MassTLC Opening Slides and Simulation Session

Save the Date!

September 14: MassTLC Leadership Awards Gala

October 6: Software Development Conference: Data, Development, & Drive

November 18: Transform

@MassTLC #MTLCSecurity

Page 6: MassTLC Opening Slides and Simulation Session

WelcomeKeynote: Dave Mahon, VP & Chief Security Officer, CenturyLinkSimulated BreachBreakout Sessions #1– Harnessing the 3rd Party Ecosystem– Building Your Incident Response Plan

Breakout Sessions #2– User Entity Behavior Analytics– Security Operations Analytics and Reporting– Application Security

Networking and Career Fair

Today’s Agenda

@MassTLC #MTLCSecurity

Page 7: MassTLC Opening Slides and Simulation Session

Keynote Address

Dave MahonCenturyLink

@MassTLC #MTLCSecurity

Page 8: MassTLC Opening Slides and Simulation Session

Data Breach Simulation PanelMASSTLC AUGUST 2016

Page 9: MassTLC Opening Slides and Simulation Session

AgendaIntroductionsSimulation–More details are learnedLessons learned

Page 10: MassTLC Opening Slides and Simulation Session

SimulationWe will discuss important topics such as legal disclosure, cyber insurance, incident response plans, communication and working with law enforcement

this simulation is ficticous and ……

Page 11: MassTLC Opening Slides and Simulation Session

Our Victim - WindResourcesWindResources is the global leading manufacturer for wind turbines.Everyone want this technology and some are willing to get it any way possible.WindResources products are network devices.WindResources customers include the government, states and consumers.

Page 12: MassTLC Opening Slides and Simulation Session

How the incident unfolded -WIPA Sales Director, John Doe, has called the WindResources helpdesk to report that his machine is acting sluggishly and that possibly this might be due to a malware infection. He has received an email regarding Nuclear Radiation and has tried unsuccessfully to open the Excel attachment.Triage is performed on John’s computer and it was observed that there are suspicious files in a TEMP folder as well as suspicious processes running.The WindResources SOC Forensics team was engaged to analyze the computer and conclude that it has been compromised. They examine web access (proxy) logs for this computer

Page 13: MassTLC Opening Slides and Simulation Session

ProcessSteady State •Where you want to be

Validation •Validation – Is the event real?•What do I do?

It is Real •What is the impact?•Who needs to be involved?•What are the next steps?

Page 14: MassTLC Opening Slides and Simulation Session

Day – 2 thru 5While the Forensics team was doing their analysis the CERT Incident Coordinator examined email logs. The Incident Coordinator identifies other user from the list affected as well. The coordinator now engages the Forensics team to examine other computers.The forensic analysis of the other computers shows that they are infected by the same malware as was found on first computer.The web access logs obtained earlier also seem to indicate that something may have been uploaded from a machine.One of the files recovered from a computer appears to contain customer login credentials, so the coordinator obtains logs from the system.This showed many customer accounts logging in from Russia. The incident coordinator then escalated to the SOC manager as a critical incident.

Page 15: MassTLC Opening Slides and Simulation Session

Day 5+One of the company security providers contacted the Cybersecurity team reporting that data has been recovered from a Russian hacker web site.A customer who performed a google search on his own name has found his personal details in a hacker forum.

Page 16: MassTLC Opening Slides and Simulation Session

Lessons LearnedHave an incident response planWhen to engage LegalBe prepared to communicateEngage in Threat-SharingSelect Points of ContactWhen to engage Law EnforcementDevelop swift messagingPractice!