introduction
play

INTRODUCTION Institute 12/10/2018 1 OBJECTIVES Current - PowerPoint PPT Presentation

Section 1 Dr. Bruce Burton California Cybersecurity INTRODUCTION Institute 12/10/2018 1 OBJECTIVES Current cybersecurity statistics and implications Learn from past attacks Understand the NIST Cybersecurity Framework (CSF) &


  1. Section 1 Dr. Bruce Burton California Cybersecurity INTRODUCTION Institute 12/10/2018 1

  2. OBJECTIVES • Current cybersecurity statistics and implications • Learn from past attacks • Understand the NIST Cybersecurity Framework (CSF) & potential quick hits 12/10/2018 2

  3. Section 2 YOUR ENTERPRISE IS UNDER ATTACK 12/10/2018 3

  4. LOSSES DUE TO INTERNET-RELATED CRIME CONTINUE TO GROW! * *FBI's Internet Crime Report 12/10/2018 4

  5. 2017 REPORT – SMALL BUSINESS TRENDS 12/10/2018 5

  6. 2017 Report – CA Breach Law California law requires a business or state agency to notify any California resident whose unencrypted personal information, as defined, was acquired, or reasonably believed to have been acquired, by an unauthorized person Any person or business that is required to issue a security breach notification to more than 500 California residents as a result of a single breach of the security system shall electronically submit a single sample copy of that security breach notification, excluding any personally identifiable information, to the Attorney General . 12/10/2018 6

  7. 2017 REPORT – SMALL BUSINESS TRENDS 12/10/2018 7

  8. 2017 REPORT – SMALL BUSINESS TRENDS 12/10/2018 8

  9. Section 3 PAST ATTACKS AND WHAT WE CAN LEARN FROM THEM 12/10/2018 9

  10. TARGET DATA BREACH 12/10/2018 10

  11. BACKGROUND – WHAT HAPPENED? • Hackers gained access to Target's networks • Compromised servers to allow exfiltration of customer data • Collected personal financial data from POS terminals on millions of customers 12/10/2018 11

  12. HOW DID IT HAPPEN? 12-15-13 Unkown Date 12-02-13 Target acknowledges a Target's HVAC vendor's Customer credit card data breach; computer systems information was 40,000,000 credit card were infected through transmitted out from records stolen a phishing attack Target's computer system ALL WARNINGS IGNORED BY TARGET 11-30-13 12-12-13 01-10-14 Target acknowledges Malicious software was Authorities notified 70,000,000 additional detected on Target Target of the data customer records were servers and Target's breach stolen security team was notified 12/10/2018 12

  13. IMPACT • Millions of impacted customers • Tarnished reputation • Drop in sales transactions resulted in a RIF • Data breach expenses > $100M • CEO Resigned 12/10/2018 13

  14. Personal Information is an Attractive Target 12/10/2018 14

  15. LESSONS TO BE LEARNED FROM THIS ATTACK • Personal financial info is an attractive target • Users play an important role in system security • Limiting employee/third party access to sensitive network assets is key • Importance of team training and oversight • Don't ignore the warning signs of a breach • Be extremely careful if you store sensitive personal data 12/10/2018 15

  16. COTTAGE HEALTH DATA BREACH 12/10/2018 16

  17. BACKGROUND – WHAT HAPPENED? • Cottage Health Systems, a medium sized health delivery organization in the Santa Barbara area learned of a data breach • In the course of investigating the first breach, a second breach was discovered • Both events exposed patients' medical information • Fortunately, Cottage Health had a cybersecurity insurance policy and it covered much of the expense of the data breach 12/10/2018 17

  18. HOW DID IT HAPPEN? • 3rd party supplier removed electronic security protections from one of Cottage Health's servers • Poor oversight over IT service suppliers • Violation of other basic security principles 12/10/2018 18

  19. IMPACT • Huge amount of bad publicity • Listed on the HHS "wall of shame" website • Numerous lawsuits on behalf of impacted patients • $2M fine from the state of CA • Requirement to significantly upgrade their security practices 12/10/2018 19

  20. IMPACT - CONTINUED • Insurer sues Cottage Health for $4.125 million plus attorneys' fees • Alleges that hospital failed to take reasonable steps to protect data • The devil is in the details 12/10/2018 20

  21. LESSONS TO BE LEARNED FROM THIS ATTACK • Ignorance is not bliss... know your state laws • Deliberate vs. accidental – self-inflicted wound • Ensure that your customer's data is protected in accordance with industry standard security practices • Importance of training and organizational response • Review and negotiate cybersecurity policy terms – the devil is in the details • Beware of broadly worded cybersecurity/data protection exclusions • Guard against a misrepresentation defense 12/10/2018 21

  22. PUPPY PALACE – CYBER ATTACK EXAMPLE 12/10/2018 22

  23. 12/10/2018 23

  24. THE HOW AND WHAT What Happened? • Appears that the business was attacked and customer/employee info was stolen How? • Through a phishing attack What Impact? • May trigger disclosure requirement • Future bad publicity • Potential negative business impacts 12/10/2018 24

  25. LESSONS TO BE LEARNED • Importance of training – employees are your first line of defense • Importance of good cyber hygiene • Value of encrypting sensitive information • Limitations of law enforcement help • Importance of cybersecurity insurance 60 percent of small companies are unable to sustain their businesses over six months after a cyber attack* * U.S. National Cyber Security Alliance 12/10/2018 25

  26. Section 4 COST-EFFECTIVE STEPS FOR CYBER RESILIENCY 12/10/2018 26

  27. ORGANIZE YOUR CYBERSECURITY DEFENSE IN LINE WITH THE NIST CS F The NIST Cybersecurity Framework (NIST CSF) provides a policy framework of computer security guidance for how private sector organizations in the United States can assess and improve their ability to prevent, detect, and respond to cyber attacks 12/10/2018 27

  28. NIST Cyber Security Framework (CSF) Identify Protect Detect Respond Recover • Asset • Access Control • Anomalies & • Response • Recovery management events planning Planning • Awareness and • Business training • Security • Communications • Improvements environment continuous • Data Security • Analysis • Communications monitoring • Governance • Information • Mitigation • Detection • Risk assessment protection and • Improvements process procedures • Risk management • Maintenance strategy • Protective technology 12/10/2018 28

  29. A Word of Caution about Email/Password Accounts • The practice of reusing passwords is common but risky! • The website https://haveibeenpwned.com/ provides insight into both data breaches and password capture 12/10/2018 29

  30. APPLYING THE NIST CSF https://www.nist.gov/cyberframework/small-and-medium-business-resources 12/10/2018 30

  31. IN CLOSING... Common sense and the right actions can significantly reduce your risk of attack! 12/10/2018 31

  32. Coming Soon… 12/10/2018 32

  33. QUESTIONS?? 12/10/2018 33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend