Is Your Small Business Online Smart? Jonathan Rajewski, MS, CCE, - - PowerPoint PPT Presentation

is your small business online smart
SMART_READER_LITE
LIVE PREVIEW

Is Your Small Business Online Smart? Jonathan Rajewski, MS, CCE, - - PowerPoint PPT Presentation

Is Your Small Business Online Smart? Jonathan Rajewski, MS, CCE, CFE, CISSP, ENCE Director - Senator Leahy Center for Digital Investigation Associate Professor - Digital Forensics | Cyber Security Digital Forensic Examiner - Vermont Internet


slide-1
SLIDE 1

Jonathan Rajewski, MS, CCE, CFE, CISSP, ENCE

Director - Senator Leahy Center for Digital Investigation Associate Professor - Digital Forensics | Cyber Security Digital Forensic Examiner - Vermont Internet Crimes Against Children Task Force

@jtrajewski rajewski@champlain.edu | 802-318-4804

Is Your Small Business Online Smart?

slide-2
SLIDE 2

Jonathan Rajewski, MS, CCE, CFE, CISSP, ENCE

Director - Senator Leahy Center for Digital Investigation Associate Professor - Digital Forensics | Cyber Security Digital Forensic Examiner - Vermont Internet Crimes Against Children Task Force

@jtrajewski rajewski@champlain.edu

Professional Certifications

EnCe, CCE, CISSP , CFE

Professional Associations

Board Member - BTV Ignite, DFCB – Digital Forensic Certified Practitioner “Founder”, CDFS - Consortium of Digital Forensic Specialists, ISFCE – International Society of Forensic Computer Examiners, ACFE – Association of Certified Fraud Examiners, HTCC – High Tech Crime Consortium

Recent Awards/Recognition

2014 US Ignite Application Summit Best Public Safety Application 2014 Honored by FBI director James B. Comey 2013 4 under 40 - Hilbert College 2013 C. Bader Brouilette Alumni Leadership Award - Champlain College 2012 Top Digital Forensic Professor – Digital Forensics - Princeton Review 2012 Best 300 Professors in the United States - Princeton Review 2011 Digital Forensic Examiner of the Year - Forensic 4cast Awards

slide-3
SLIDE 3

s

"Behind this glass is incredible talent and this country in general and the FBI in particular needs those folks,"

  • FBI Director James Comey
slide-4
SLIDE 4

Do you think your data is safe?

databases email spreadsheets documents pictures videos

laptops | tablets computers removable devices servers cloud

Personal Identifiable Information

Protected Health Information Private / Sensitive Information

What Where Specifically

slide-5
SLIDE 5

What makes most sense for your organization

slide-6
SLIDE 6

Why do we have security & privacy issues with technology?

Security Usability

Security

Usability

slide-7
SLIDE 7

If you have an IT staff, ask them to questions…

When was the last time they experienced a data breach? Are they currently breached?

slide-8
SLIDE 8
  • wns

Cyber Security in ..your organization? Who

slide-9
SLIDE 9

Cyber Security in your Organization? is accountable for Who

slide-10
SLIDE 10

Employees Our job is to do work Security is both a legal and IT problem Legal Our job is to shift liability Security is a technical problem Human Resources Our job is to avoid trouble Security is trouble Information Technology Our job is to make it work Employee behavior is not our problem

slide-11
SLIDE 11

Employees Legal Human Resources Information Technology Effective/Clear/Accountable Policy

slide-12
SLIDE 12
slide-13
SLIDE 13

11

slide-14
SLIDE 14

Reactive Proactive Baseball is back!

slide-15
SLIDE 15

So how do we do “proactive security”? We hunt. We educate. We test. We design. We prioritize.

slide-16
SLIDE 16

Ask your IT staff the following but be wary of number three

slide-17
SLIDE 17

Security Operations Centers (SOC) Buzzword central Can’t we just buy “X” and be secure?

slide-18
SLIDE 18

Data Breach

Imagine that you just received a phone call that said all of your personal information was posted on pastebin 300,000 identities were just stolen from your customer database 75,000 health records were just stolen from your wearable devices What Would You Do?

slide-19
SLIDE 19

Data Breach

So you’re a company that has “big data” Someone just stole all of your data Congratulations - You have customers from all 50 States

slide-20
SLIDE 20

Unauthorized release of personal data

  • SSN
  • Taxpayer ID
  • Passport number
  • Bank numbers
  • Credit card numbers
  • PIN
  • Digital Signature
  • Biometric data
  • Fingerprints
  • Name/Email/Password
slide-21
SLIDE 21

Full album & lyrics: http://goo.gl/S6rxCv Music by Renald Francoeur, Drawing by Craighton Berman, Video by Don Markus, Video Editor Brad Taylor.

Data Breach

slide-22
SLIDE 22

Aftermath of a data breach

Notification obligations

The trigger for notification Who to notify Timing of notification Contents of notice Methods for providing notice Impacted) individuals) Government) Authori5es) Credit) repor5ng) agencies) Contractual) Partners) Press)

Adopted from Sheryl Falk sfalk@winston.com

slide-23
SLIDE 23

What should breach notices look like?

Describe(incident( Categories(of(informa2on(involved( Consequences(of(breach/nature(of(risk( Protec2on(measures(put(in(place( Advice(about(how(to(protect(self(

Adopted from Sheryl Falk sfalk@winston.com

slide-24
SLIDE 24

PR strategy?

What happened? When did it happen? What information was compromised? Was my information compromised? How many people’s information was impacted? Was the information encrypted? Was my social security number compromised? Did anyone misuse this information? What should I do? What are you doing to protect me? Will this happen again? Who should I contact if I have more questions?

Have a Breach Communications Plan Communicate breach facts accurately and quickly Understand and follow breach notification timetables Stay focused and concise Be prepared to update with new information What you might offer: Information about security freezes and credit monitoring Contact information for credit reporting agencies, FTC or state authorities Central “ombudsman” for all questions Credit monitoring or identity restoration services Coupons or gift certificates

Adopted from Sheryl Falk sfalk@winston.com

slide-25
SLIDE 25

Some action items to consider

Understand your Data Evaluate your Data Security Fully Plan your Data Incident Response Identify your Data Security Response Team Identify your Response Partners Check for Cyberliability Insurance coverage Assess your Information Security Representations

Adopted from Sheryl Falk sfalk@winston.com

slide-26
SLIDE 26

Case Studies (time permitting)