Legislative Audit Workshop Cybersecurity in the Year 2020 Jim Edman - - PowerPoint PPT Presentation

legislative audit workshop cybersecurity in the year 2020
SMART_READER_LITE
LIVE PREVIEW

Legislative Audit Workshop Cybersecurity in the Year 2020 Jim Edman - - PowerPoint PPT Presentation

Legislative Audit Workshop Cybersecurity in the Year 2020 Jim Edman Chief Information Security Officer Miguel Penaranda Deputy CISO 5/19/2020 Critical Cyber Security Recommendations Backup Your Data Apply Automatic Updates & Patches


slide-1
SLIDE 1

Jim Edman Chief Information Security Officer Miguel Penaranda Deputy CISO

5/19/2020

Legislative Audit Workshop Cybersecurity in the Year 2020

slide-2
SLIDE 2

Critical Cyber Security Recommendations

Backup Your Data

  • Decouple from live

system after backup

  • Test Restoring It

Apply Automatic Updates & Patches

  • Windows, Adobe, Java,

Business Apps

Education & Training

  • Cybersecurity class
  • Business Email

Compromise

  • Remote Work

User Level privileges

slide-3
SLIDE 3

CYBERSECURITY COMPROMISE EXAMPLES

  • Texas School District $2.3M (Vendor Impersonation)
  • City of Baltimore, MD (3) $18.2M ($76K ask - Ransomware)
  • City of Atlanta, GA $17M ($25K ask - Ransomware)
  • 22 Texas Counties $12M ($2.5M ask - Ransomware)
  • City of Sioux Falls $??? (Vendor Impersonation)
  • Yankton, SD School District (Malicious)
  • SD School Teacher (Direct Deposit)
  • Iowa Retirement Benefits Fraud (Direct Deposit)
slide-4
SLIDE 4

Not all security is social engineering or complicated software hacks.

slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

CYBERSECURITY STATS

28 9 36 16 88 114 18 310 107 549

100 200 300 400 500 600

Inbound Email Outbound Email Quarantined Email Blocked Email Total Processed

Millions of Email Messages K-12 State

slide-8
SLIDE 8

CYBERSECURITY STATS

A denial-of-service attack is a cyber-attack in which the cyber threat actor seeks to make an Internet server or website unavailable to its users by temporarily or indefinitely disrupting services. A digital “traffic jam”.

slide-9
SLIDE 9

CYBERSECURITY STATS

slide-10
SLIDE 10
slide-11
SLIDE 11

Types of Threat Actors

  • Nation State funded threat actors. China, Iran, North Korea,

Russia

Advanced Persistence Threat

  • Groups and individuals that either target or utilize opportunistic

methods based on system vulnerabilities

Cybercriminals

  • Hackers for hire; typically motivated by financial gain
  • Identity theft and healthcare fraud are their main targets

Criminal Hackers

  • Politically driven groups and individuals
  • Utilize target or opportunistic methods with system vulnerabilities

Terrorists

  • Malcontents
  • Spies

Employees

slide-12
SLIDE 12

Types of Attacks

Phishing Social Engineering Physical Security Supply Chain

Credential Harvesting

Application Attacks Denial of Service Attacks Ransomware Destruction Virus & Malware Resource Usage

Insider Threat

slide-13
SLIDE 13

RANSOMWARE

A type of malicious software designed to block access to a computer system until a sum of money is paid. Common names of ransomware: Bad Rabbit CryptoLocker CrytpoWall Ryuk WannaCry

slide-14
SLIDE 14

Cybersecurity Infrastructure

slide-15
SLIDE 15

Average amount time hackers are in a network before being discovered:

206 Days

slide-16
SLIDE 16

……………………………………

Business Email Compromise Scams

Vendor Impersonation Payroll Direct Deposit Account Credentials (Username & password) Wire Transfer Request Vendor Purchase Order request Real Estate/Escrow Fund Transfer Malware Delivery Gift Cards

slide-17
SLIDE 17

RECONNAISSANCE

➢Open.SD.Gov: Vendors, $$$, Dates, Contracts, Contacts ➢Internet: Employer Identification Number (EIN), SSNs ➢Identify State employees: Online phone book, news, web sites

ENGAGEMENT

➢ Email exchanges ➢ “Can you help me?”

ACTION

➢ Update Systems ➢ Process Invoices, Payroll, etc. ➢ Divert Payments, Direct Deposits, etc.

Could this happen in SD?

slide-18
SLIDE 18

5.4% Statewide Average

5.4% Statewide Average

slide-19
SLIDE 19

Email Assessment

slide-20
SLIDE 20

CRITICAL EMAIL STEPS

  • 1. Reading is Fundamental
  • 2. Look at the From: Name
  • 3. Look at the From: Email Address. Name AND Address.
  • 4. Subject: Familiar?
  • 5. Message
  • a. Spelling, Grammar & Content
  • b. Don’t be swayed by branding
  • c. Hover over links
  • d. Attachments
  • 5. Computer vs Mobile
  • 6. Junk Mail Options
slide-21
SLIDE 21

K-12 Cybersecurity Risk Assessment

  • Based on industry standard

CIS Top 20 Controls

slide-22
SLIDE 22

SCHOOL ASSESSMENT PERFORMANCE

3 8 8 6 3

1 2 3 4 5 6 7 8 9

A B C D F

slide-23
SLIDE 23

K-12 Cybersecurity Incidents: 840 (2016)

slide-24
SLIDE 24
slide-25
SLIDE 25
slide-26
SLIDE 26

Critical Cyber Security Recommendations

Backup Your Data

  • Decouple from live

system after backup

  • Test Restoring It

Apply Automatic Updates & Patches

  • Windows, Adobe, Java,

Business Apps

Education & Training

  • Cybersecurity class
  • Business Email

Compromise

  • Remote Work

User Level privileges

slide-27
SLIDE 27