Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting - - PowerPoint PPT Presentation

florida sbdc at ucf s
SMART_READER_LITE
LIVE PREVIEW

Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting - - PowerPoint PPT Presentation

Helping Businesses Grow & Succeed Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting Your Digital Assets in 2018 BYTE-SIZE: The Small Business Cybersecurity Program of the FSBDC Network This presentation is a companion to


slide-1
SLIDE 1

Helping Businesses Grow & Succeed

Florida SBDC at UCF's Cybersecurity for Small Businesses: Protecting Your Digital Assets in 2018

BYTE-SIZE: The Small Business Cybersecurity Program of the FSBDC Network

slide-2
SLIDE 2

NOTE: These materials are intended to provide information to assist small businesses consider key cybersecurity concepts, to share ideas for reducing cyber risk, and to identify helpful resources from multiple public and private organizations. However, no single technology or program can eliminate all cyber risk nor can they guarantee protection from constantly evolving digital attacks. It is always best to consult IT security and legal professionals to understand your responsibilities and to manage the specific cyber risks associated with your business. This presentation is a companion to the publication entitled The Florida SBDC Network Byte-Size Program: Cybersecurity Basics for Small Business. For more information, visit floridasbdc.org/cybersecurity

slide-3
SLIDE 3

Helping Businesses Grow & Succeed

Lee V. Mangold

@LeeMangold Lee.Mangold@GoldSkySecurity.com (CISSP, CEH, GLSC, ITIL...)

Co-Founder & CEO GoldSky Security Co-Founder & Vice President Florida Cyber Alliance President Information Systems Security Association (CFL Chapter) Board Director Security BSides Orlando Adjunct Professor University of Central Florida

slide-4
SLIDE 4

CYBERSECURITY BASICS

Section 1

slide-5
SLIDE 5

Helping Businesses Grow & Succeed

Trends (2009-2016)

slide-6
SLIDE 6

Helping Businesses Grow & Succeed

Who are the attackers?

  • Organized Crime Organizations

– Large syndicates of attackers – Hierarchical organizations; Mafia

  • State-Sponsored Attackers

– Government organizations – Russia, China, Iran, North Korea, etc...

  • Script Kiddies

– Use downloaded tools and scripts – Motivated by fame

  • Other Professionals

– Usually experimenting, learning, or shaming

  • Hacktivists

– All-the-above – Motivated by a social cause

slide-7
SLIDE 7

Helping Businesses Grow & Succeed

Top Threats & Targets

  • Top Threats
  • Malware

– Specifically Ransomware

  • Social Engineering

– Phishing emails – Extortion attempts

  • 3rd Party Data Theft

– Stolen Credentials – 3rd Party breaches

  • Top Targets
  • Medical Industry

– Compromising PHI – Compromising PHI – Potentially more...

  • Legal Industry

– Compromising PII – Compromising PHI

  • Financial & Administrative Services

– Compromising PII – Fraud and monetary theft

  • Retail

– Monetary theft (PCI)

slide-8
SLIDE 8

Helping Businesses Grow & Succeed

slide-9
SLIDE 9

Helping Businesses Grow & Succeed

slide-10
SLIDE 10

Helping Businesses Grow & Succeed

Three Foundational Cybersecurity Principles

Know what your critical data/assets are

What

Know where your critical data/assets are

Where

Know how they are protected

How

slide-11
SLIDE 11

Helping Businesses Grow & Succeed

CLOUD!! IaaS PaaS SaaS

slide-12
SLIDE 12
slide-13
SLIDE 13

Helping Businesses Grow & Succeed

Types of Attacks

slide-14
SLIDE 14

Helping Businesses Grow & Succeed

MALWARE

  • Malicious software

– Steal credentials or other information – Steal money – Ransomware – Botnets – Sabotage – Denial of service

slide-15
SLIDE 15

Helping Businesses Grow & Succeed

PHISHING

  • Email designed to lure you in to

doing something ill-advised

– Execute an attachment – Click on a link – Unwittingly give away sensitive information

  • Some are really good at exploiting

human gullibility

slide-16
SLIDE 16

Helping Businesses Grow & Succeed

slide-17
SLIDE 17

Helping Businesses Grow & Succeed

INTERNET OF THINGS (IoT)

  • Increasingly, tech devices are being

targeted

– Eavesdropping – Steal data – Botnet agents – DDoS attacks

slide-18
SLIDE 18

Helping Businesses Grow & Succeed

APPLICATION ATTACKS

  • Maliciously manipulate application

software

– Steal data from database server – Run attack scripts on other users’ PCs – Steal user credentials

slide-19
SLIDE 19

Helping Businesses Grow & Succeed

Remediation Activities

slide-20
SLIDE 20

Helping Businesses Grow & Succeed

Employee Education

  • Technology is great, but

your most important assets are your employees

– First line of defense – Train them on the tools you use – Encourage them to report strange computer activity

slide-21
SLIDE 21

Helping Businesses Grow & Succeed

Passwords & MFA

  • Use Strong Passwords or

Passphrases

  • NEVER share your

passwords

  • Don’t re-use passwords
  • Enable Multi-Factor

Authentication where possible!

slide-22
SLIDE 22

Helping Businesses Grow & Succeed

PROTECTIONS

  • Policies and policy

management

  • Software updates
  • Configurations
  • Security products
  • Application software

controls

slide-23
SLIDE 23

Helping Businesses Grow & Succeed

DETECTION MEASURES

  • Event monitoring
  • Intrusion detection and

prevention systems

  • Threat monitoring
  • User reports
slide-24
SLIDE 24

Helping Businesses Grow & Succeed

RESPONSES

  • Incident response

– Advocates for the business – Reduce the losses – Get back in businesses as quickly as possible – Support investigations – Decision support during incident – Crisis communications

slide-25
SLIDE 25

Helping Businesses Grow & Succeed

INSURANCE

  • Is cybersecurity

insurance right for you?

– It depends – Policies exist – Read the fine print and comply with their requirements – Answer their questions candidly – Understand what is and is not covered

slide-26
SLIDE 26

Helping Businesses Grow & Succeed

INSURANCE 101

Key questions:

  • Bundled vs. Stand

alone?

  • What are the

policy exclusions?

  • How much

coverage should I purchase?

  • Who is the breach

response firm?

Bundled

  • Bundled cyber

policies often

  • ffer limited

coverage, not broad protection

  • Have gaps
  • and more

exclusions.

  • Usually are an

endorse- ment to other liability policies.

  • Can result in

greater exposure

Electronic Data Processing (EDP)

  • EDP policies

are not cyber coverage.

  • They usually
  • cover:
  • Data

processing equipment.

  • Hardware

replacement.

  • Property

coverage.

Stand-Alone

  • Stand alone

cyber policies

  • ffer the most

protection.

  • Normally
  • cover:
  • Third party

liability.

  • Breach

Response.

  • Notification.
  • Restoration.
  • Business

interruption.

  • Reputation

risk.

Stop-Loss (DIC)

  • DIC plans are

for larger

  • rganizations

with greater risk profiles.

  • They provide:
  • Catastrophic

backstop

  • Covers gaps
  • Meant for

large Losses when underlying coverage is exhausted.

Danger Zone Safe(r) Zone

slide-27
SLIDE 27

CASE STUDIES IN CYBERSECURITY

Section 2

slide-28
SLIDE 28

Helping Businesses Grow & Succeed

Breach Case Studies

  • Insurance Company

– COO’s Email Account Credentials Phished – Account Data stolen from Email & Storage – Data exfiltrated to unknown destinations in Russia – Had to notify 3600+ individuals, pay for credit monitoring, etc...

  • Healthcare Practice

– Hard Drive Stolen during A/C Maintenance – Owners extorted, police involved – Had to notify 37,000+ individuals

  • CPA & Patent Firm

– User sent a fake Docusign link, logged in, downloaded malware – Forwarded the email to colleagues – Data exfiltrated to unknown destinations in Russia

slide-29
SLIDE 29

Helping Businesses Grow & Succeed

Breach Case Studies

  • TerraCom and YourTel America (2014)

– Failed to protect PII of customers – 300,000 identities at risk – Settled with FCC for $3.5M

  • Verizon (2017)

– Failed to protect PII of customers – 3rd party IT contractor left data unprotected in AWS

  • Undisclosed Carrier

– Hackers gained unauthorized access to SIP trunks – Hundreds of thousands in fraudulent charges billed to customers – Company had no idea how to track or prevent the attacks

slide-30
SLIDE 30

Helping Businesses Grow & Succeed

Case Study: Mossack Fonseca

slide-31
SLIDE 31

Helping Businesses Grow & Succeed

Case Study: Mossack Fonseca

WordPress Website Plugin: Revolution Slider Plugin: WP-SMTP plugin Plugin: ALO EasyMail Exploited Email Passwords Email Passwords Email Server Log In Get Mail! Drupal Web Portal https://Portal.Mossfon.com Outdated; Several Critical Vulnerabilities Exploited Get Data!

slide-32
SLIDE 32

Helping Businesses Grow & Succeed

Misconfiguration

Configuration Management

– Are all your systems provisioned to a baseline standard? – Are all your systems audited REGULARLY? – Could you audit your systems if you had to? – Who has access to what data and how is it protected?

slide-33
SLIDE 33

Helping Businesses Grow & Succeed

3rd Party Problems

  • How do you know your 3rd parties are secure?
  • What data do you share with them? Do you

know?

  • How often have you (or can you) audit 3rd

parties?

  • Have THEY been breached already?
slide-34
SLIDE 34

Helping Businesses Grow & Succeed

Mismanagement

  • Have you formed a security team or a formal

security effort?

  • Do you have procedures in place to help prevent

breaches?

  • What do you do when you HAVE a breach? Would

you know?

  • Are you practicing risk management in IT and

Security?

slide-35
SLIDE 35

Helping Businesses Grow & Succeed

Seek out best practices!

Begin practicing security risk management

1

Work across IT (and all domains) to identify the “what, where, how”

2

Establish baseline security standards

3

Have a plan and seek help where you need it!

4

slide-36
SLIDE 36

CYBERSECURITY COMPLIANCE

(AND RISK MANAGEMENT)

Section 3

slide-37
SLIDE 37

Helping Businesses Grow & Succeed

Cybersecurity Management IS Risk Management

slide-38
SLIDE 38

Helping Businesses Grow & Succeed

NIST Cyber Security Framework

NOT A STEP-BY-STEP PROCESS

slide-39
SLIDE 39

Helping Businesses Grow & Succeed

Cyber Risk Management Objectives

  • What are my BIGGEST areas of risk?
  • What are my potential mitigation strategies?
  • What is the cost-benefit of implementing various

mitigation strategies?

  • What is the cost of doing nothing?
slide-40
SLIDE 40

Helping Businesses Grow & Succeed

NIST 800-30 – Security Risk Assessment

slide-41
SLIDE 41

Helping Businesses Grow & Succeed

Security - vs - Compliance

Security Protecting what’s important

  • Confidentiality
  • Data Integrity
  • Availability

Compliance Following the rules

  • 800-151
  • HIPAA
  • FIPA and other PII regs
  • PCI
  • GLBA, etc...
slide-42
SLIDE 42

Helping Businesses Grow & Succeed

Three Foundational Cybersecurity Principles

Know what your critical data/assets are

What

Know where your critical data/assets are

Where

Know how they are protected

How

slide-43
SLIDE 43

Helping Businesses Grow & Succeed

Legal Frameworks (Federal)

  • Government Contractors

– 800-151 Compliance (and more...)

  • Healthcare

– Health Insurance Portability and Accountability Act (HIPAA)

  • Financial Institutions

– Gramm-Leach-Bliley Act (GLBA)

  • Credit Unions

– Various FFIEC / NCUA Regulations

  • Federal Agencies

– Homeland Security Act (FISMA)

  • Public Companies

– Sarbanes-Oxley Act (SOX, Section 302 & 404)

  • International

– General Data Protection Regulation (GDPR) – EU-PrivacyShield

slide-44
SLIDE 44

Helping Businesses Grow & Succeed

Florida Information Protection Act

  • Each covered entity shall take reasonable measures to protect and

secure data in electronic form containing personal information.

  • A covered entity shall provide notice to the department of any breach of

security affecting 500 or more individuals in this state What is PII

  • First & Last Name and one of:

– SSN – Financial Account Number – Government ID number – Health Information or Insurance ID

  • Username or Email Address, including password or security questions

– Encrypted passwords are not considered PII!

slide-45
SLIDE 45

Helping Businesses Grow & Succeed

Other States

  • 48 States with Data Breach and/or Data

Privacy Laws

– Excludes Alabama and South Dakota

  • District of Columbia
  • Puerto Rico
  • US Virgin Islands
  • Guam
slide-46
SLIDE 46

Helping Businesses Grow & Succeed

NIST SP 800-171 Compliance

  • Describes information protection requirements

for:

– Non-Federal Organizations holding Controlled Unclassified Information (CUI) – 22 Categories of CUI Data

slide-47
SLIDE 47

Helping Businesses Grow & Succeed

What is CUI?

22 Categories of Controlled CUI

  • Agriculture
  • Controlled Technical Info
  • Critical Infrastructure
  • Emergency Management
  • Export Control Research
  • Financial Data
  • Geodetic Information
  • Immigration
  • Information Systems Vulns
  • Intelligence Data or Records
  • International Agreements
  • Compulsory Tax Information
  • Law Enforcement Data
  • Legal Data
  • Natural and Cultural Resources
  • NATO-Related Data
  • Nuclear Data
  • Patent Information
  • Privacy Information
  • Procurement and Acquisition
  • Proprietary Business Data
  • SAFETY Act Information
  • Statistical/Census Data
  • Some Transportation Data
slide-48
SLIDE 48

Helping Businesses Grow & Succeed

Controlled Technical Info

  • Research and engineering data
  • Engineering drawings and associated lists
  • Specifications, standards, process sheets
  • Manuals
  • Technical reports
  • Technical orders
  • Data sets
  • Studies and analyses and related information
  • Computer software executable code and source code
  • etc...
slide-49
SLIDE 49

Helping Businesses Grow & Succeed

800-151 Requirements

  • 14 Families of Controls

– Access Control – Media Protection – Awareness and Training – Personnel Security – Audit and Accountability – Physical Protection – Configuration Management – Risk Assessment – Identification and Authentication – Security Assessment – Incident Response – System and Communications Protection – Maintenance – System Information Integrity

slide-50
SLIDE 50

Helping Businesses Grow & Succeed

Control Example

From NIST SP 800-53

slide-51
SLIDE 51

Helping Businesses Grow & Succeed

Control Example

From NIST SP 800-53

slide-52
SLIDE 52

Helping Businesses Grow & Succeed

Next Steps...

  • Download & Read NIST SP 800-171

– https://nvlpubs.nist.gov/nistpubs/SpecialPublicati

  • ns/NIST.SP.800-171.pdF
  • Plan for Implementation of Controls

– Assess for applicability and impact

  • Implement controls like a project
  • Continually assess your security!
slide-53
SLIDE 53

CYBERSECURITY RESOURCES

Section 4

slide-54
SLIDE 54

Helping Businesses Grow & Succeed

RESOURCES AND PLANNING

Information:

  • Florida Small Business Development

Center Network:

http://floridasbdc.org/cybersecurity

  • US Chamber of Commerce

https://www.uschamber.com/cyber

Threat Reporting & Alerts:

  • FBI IC3: https://www.ic3.gov
  • Secure Florida: http://secureflorida.org

Note: Additional resources may be found in the Florida SBDC Network’s Byte-Size program publication: Cybersecurity Basics For Small Business

Planning Materials:

  • US Small Business Administration (SBA):

https://www.sba.gov/business- guide/manage/prepareemergencies-disaster- assistance

  • SBA Learning Center

at:https://www.sba.gov/tools/sba-learning-

center/training/cybersecurity-small-businesses

  • National Institutes for Standards &

Technology (NIST):

http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.76 21r1.pdf

slide-55
SLIDE 55

Helping Businesses Grow & Succeed

RELATED TIPS

  • Get to know your law

enforcement

– Who are they, what resources do they have? – Meet them in person (prior to needing to) – Consider FBI’s Infragard