DATA THEFT: WHAT CAN BE DONE TO LIMIT RISK?
IT Audit and Security O’Connor & Drew, P.C. www.ocd.com @ocdcpa
March 2014
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
1
DATA THEFT: WHAT CAN BE DONE TO LIMIT RISK? IT Audit and Security - - PowerPoint PPT Presentation
O'Connor & Drew, P.C. www.ocd.com @ocdcpa 1 DATA THEFT: WHAT CAN BE DONE TO LIMIT RISK? IT Audit and Security OConnor & Drew, P.C. www.ocd.com @ocdcpa March 2014 O'Connor & Drew, P.C. www.ocd.com @ocdcpa
IT Audit and Security O’Connor & Drew, P.C. www.ocd.com @ocdcpa
March 2014
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
1
jmcaleer@ocd.com
Professional Profile
Industry Expertise
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
2
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
3
Target
University of Maryland
students dating back to 1998 were compromised in a data breach
Oregon Secretary of State’s website
password
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
4
discover.
http://adage.com/article/datadriven-marketing/nrf-offensive-data-breaches/291476/
the affected organization.
http://adage.com/article/datadriven-marketing/nrf-offensive-data-breaches/291476/
breaches ($199 and $188 per record, respectively)
https://www4.symantec.com/mktginfo/whitepaper/053013 GL NA WP Ponemon-2013-Cost-of-a-Data-Breach- Report daiNA cta72382.pdf O'Connor & Drew, P.C. www.ocd.com @ocdcpa
5
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
6
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
7
Customer Data
Numbers, Routing Numbers, License Numbers, etc
Business Data
Employee Data
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
8
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
9
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
10
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
11
accounts, etc)
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
12
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
13
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
14
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
21
CD/DVD Thumb Drive Public WIFI E-Mail Attachments
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
22
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
23
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
24
gain access to other information or account details (SSN, CC #).
to pick them up and plug them into work computers.
working on “a special project for them” or pretending to be tech support calling to troubleshoot an issue, but needs your password first.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
25
here”
delivery person, or law enforcement
password so I can get this done and head out for the weekend?”
source or known entity (posing as bank website, Facebook, etc)
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
26
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
27
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
29
SomeGuy @someguy Rofl this was posted by you? tinyurl.com/sfsjkl23jk$
It was a rather generic message. Notice 5 similar tweets from the same person to different people all within 1 minute.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
31
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
32
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
33
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
34
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
35
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
36
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
37
hackers had sought and gained unauthorized access to some of our customers' data.” 2
reported in December.” 1
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
38
1 - http://seekingalpha.com/news/1592713-target-navigates-choppy-water-in-q4 2 - http://www.theinquirer.net/inquirer/news/2329171/kickstarter-breach-blags-users-details-encrypted-passwords
hackers had sought and gained unauthorized access to some of our customers' data.” 2
reported in December.” 1
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
39
1 - http://seekingalpha.com/news/1592713-target-navigates-choppy-water-in-q4 2 - http://www.theinquirer.net/inquirer/news/2329171/kickstarter-breach-blags-users-details-encrypted-passwords
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
40
Frameworks help design a program that facilitates CIA There are many different frameworks and standards
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
43
Controls are defined by the SEC as: "...a specific set of policies, procedures, and activities designed to meet an objective.”
Every business has some form of this in place, even if it’s informal.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
44
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
45
Example: Car crashes into office building and causes gas leak.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
48
agreed upon and outlined, taking risk into consideration.
and private organizations
technologies to implement
http://www.sans.org/critical-security-controls
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
50
Inventory of Authorized and Unauthorized Devices Actively manage (inventory, track, and correct) all hardware devices on the network so that
given access, and unauthorized and unmanaged devices are found and prevented from gaining access.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
51 https://www.sans.org/media/critical-security-controls/spring-2013-poster.pdf
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
52
Every organization is different. Every security plan is different. SANS 20 Critical Security Controls is a great place to start.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
54
something other than Internet Explorer (IE)
zero-days.
http://www2.fireeye.com/rs/fireye/images/fireeye-advanced-threat-report-2013.pdf
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
55
smartphones, etc) and ensure they have a password/PIN enabled
unencrypted desktop computers that contained some personal and health information.”1
WIFI to limit access to key resources such as file shares
appropriately, and generate an inventory of what’s on your network
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
56
1 https://www.ucsf.edu/news/2014/03/112556/computer-theft-uc-san-francisco
Example Template:
http://www.sans.org/security-resources/policies/Acceptable Use Policy.pdf
More information and examples:
http://www.giac.org/paper/gsec/736/data-classification/101635 http://www.sans.org/reading-room/whitepapers/auditing/information-classification-who-846
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
57
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
58
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
59
information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.”
http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
60
more of the following data elements that relate to such resident: (a) Social Security number; (b) driver's license number or state-issued identification card number; or (c) financial account number, or credit or debit card number, with or without any required security code, access code, personal identification number or password, that would permit access to a resident’s financial account; provided, however, that “Personal information” shall not include information that is lawfully obtained from publicly available information, or from federal, state or local government records lawfully made available to the general public.”
http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
61
about a resident of the Commonwealth shall develop, implement, and maintain a comprehensive information security program. [Every person…] shall include in its written, comprehensive information security program the establishment and maintenance of a security system covering its computers, including any wireless system.
http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf
http://www.mass.gov/ocabr/docs/idtheft/compliance-checklist.pdf
http://www.mass.gov/ocabr/data-privacy-and-security/data/requirements-for-security- breach-notifications.html
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
62
“Partners bought the policy in 2007 and made a claim two years after an employee left the records of 192 Massachusetts General Hospital patients on an MBTA train. The hospital paid a $1 million fine to the US Department of Health and Human Services, which was covered by the cyber insurance.”
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
63
https://www.bostonglobe.com/business/2014/02/17/more-companies-buying-insurance-against-hackers-and-privacy-breaches/9qYrvlhskcoPEs5b4ch3PP/story.html
reports a potential issue or concern to your business?
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
65
“[During the Boston Marathon bombings…] Boston Police Department tweets in effect became the official source of information for everyone, including the media, especially after numerous reports by the press turned out to be false.”
http://www.emergencymgmt.com/training/Bostons-Experience-Social-Media.html
external to your organization? Are they available in an emergency?
It’s important to realize that some companies block social media such as Twitter and Facebook.
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
66
Jake McAleer jmcaleer@ocd.com Senior IT Security and Audit Manager O’Connor & Drew, P.C. @ocdcpa
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
67
the presentation:
O'Connor & Drew, P.C. www.ocd.com @ocdcpa
68