SlideShare a Scribd company logo
1 of 38
ERP in the Time of Breaches
Protect Yourself with the Right
Governance, Risk and Compliance
• The Role of Information
Security
• IT Security Conundrums
• Best Practices for Security
• How Providers can Alleviate
Concerns
• Q&A
Today’s Presenter
Greg Pierce
• Chief Cloud Officer, Concerto Cloud
Services
• Pioneer in Enterprise Cloud Computing
• Veteran business leader and entrepreneur
with over 20 years experience
• Helps businesses transform through the use
of disruptive technologies
The Role of Information Security
Goal of Information Security
Administrative, Technical and
Physical Controls work
together to ensure the
confidentiality, integrity
and availability (CIA) of
critical systems and
confidential information
Information
Security is a goal
- we must
continually strive for
it with no guarantee
of achievement.
IT Security Conundrum One
Regulatory
compliance
and/or
certification
ONLY serves as a
guideline.
IT Security Conundrum Two
IT Security Conundrum
Three
Spending
more (without
other security
processes) can
deliver a false
sense of security.
IT Security Conundrum Three
IT Security Conundrum Four
YOU are the
target -
regardless of
your industry
vertical or
company size.
IT Security Conundrum Five
It is easy to
drive the
wrong behavior
from your
users.
Education is key
and policies
can’t be too
restrictive.
Information Security Domains
1. Access Control
2. Application Security
3. Business Continuity and Disaster Recovery
Planning
4. Cryptography
5. Information Security and Risk Management
6. Legal, Regulations, Compliance and
Investigations
7. Operations Security
8. Physical (Environmental) Security
9. Security Architecture and Design
10. Telecommunications and Network Security
Security – A Year In Review
Security Has Everyone’s Attention
APR SEPTMAY JUN JUL AUG OCT NOV DEC JAN FEB MAR APR SEPTMAY JUN JUL AUG
$70MM Records
Stolen
$40MM Credit & Debit
Nov 15 – Dec 15, 2013$56MM Credit &
Debit
Apr - Sept, 2013
$76MM of $83MM
Accounts Stolen
July14 – Sept 2014
2013 2014
$9000
Credit & Debit
The Target Breach – How did they do it?
• Compromised HVAC contractor likely via a phishing email
– Used free version of anti-malware that lacked real-time protection
– Malware stole credentials to Target supplier portal
• Portal
– Not properly segmented on the network from other critical systems
– Lacked two-factor authentication
– Supplier/Vendor info was public, so attackers used this info for social
engineering attack (HVAC contractor)
– Supplier/Vendor ecosystem lacked security awareness training( best
practice, etc…)
• Took advantage of Monitoring system’s default username and password
– Installed “RAM Scrapping” Malware on POS System
– Disguised communications as legitimate monitoring traffic
– Exfiltration of data was sent to an FTP server in Russia of the course of two
days
Target Breach - By the numbers
• 70 million – # of records stolen
• 40 million - # of Credit/Debit
cards stolen
• 100 million - $ they will spend
upgrading payment terminals
• 46% - percentage drop in profits
at Target in the fourth quarter of
2013, compared with the year
before
• 53.7 million - The income that
hackers likely generated from the
sale of 2 million cards stolen from
Target and sold at the mid-range
price of $26.85
• ZERO – Chief Information
Security Officer (CISO) or Chief
Security Officer (CSO) jobs at
Target
The Target Breach – Why they got away
“Target was certified as meeting the
standard for the payment card industry (PCI)
in September 2013. Nonetheless, we
suffered a data breach. As a result, we are
conducting an end-to-end review of our
people, processes and technology to
understand our opportunities to improve
data security”
Gregg Steinhafel, CEO
The Target Breach – Why they got away
• Failure or lack of established process and procedure
– Security systems rapidly detected the security event but
there was no response by IT
• Weakness in the architecture of the Supplier portal
– Insufficient oversight during the planning and implement
phase allowed logical connectivity to sensitive systems
and data– Architectural review board?
– Infrequent assessment against systems to understand
their impact on Information Security?
• Lack of security awareness training
Users are the Common Link
• Trojans – software
downloads - Kaaza
• Viruses – Emails
• Zombies or Botnets
• Phishing (Identity Theft)
• Spywaresource
http://www.pcworld.com/article/2010527/f
orrester-report-finds-most-data-breaches-
are-caused-by-employees.html
“Application users are
most often the
determining factor in
whether or not a
security breach occurs”
What can we learn?
A breach can
happen to any
company of
any size and
any industry –
learning from
others is
critical.
Best Practices to Secure Your
ERP Solution and Organization
Best Practice One: Holistic Planning
Security is a Holistic Program
– Process (not a project)
 Never 100%
– Risk Management
 Improve Security Posture
– Changing Security Landscape
 Threats (motives)
 Countermeasures
Best Practice Two: Building Awareness
• Security awareness is the knowledge, skill and attitude an individual possesses
regarding the protection of information assets.
• Being Security Aware means you understand
that there is the potential for some people to
deliberately or accidentally steal, damage,
or misuse your account, computer or the
data stored on your computer.
• Awareness of the risks and available
safeguards is the first line of defense
for the security of information,
systems and networks.
“Application users are
most often the determining
factor in whether or not a
security breach occurs”
– source
http://www.pcworld.com/article/2010527/forrester-
report-finds-most-data-breaches-are-caused-by-
employees.html
Security Awareness Includes
• Information about how to
 Protect
 Detect
 React
• Knowledge, Skill and Attitude
 The What
 The How
 The Why
• Culture Change
Best Practice Three: Encryption
Data in Use, Data in Motion, and Data at
Rest - Ensure encryption for ALL classes of data
Best Practice Four: Layered Structure
A High Level Summary of Security Layers include:
• Centralized and automated anti-malware and OS patching
• Identity management
• True network segmentation and isolation from ingress to egress at layer 2
and 3
• Data in-motion encryption by default
• Multiple firewall segments operating at layer 1-7 of the OSI stack
• State-of-the-art IDPS solution monitored and managed 24x7 by a dedicated
security operations center (SOC)
• Reverse Proxy services
• “Other” confidential and proprietary security mechanisms and practices
• Intelligent, multi-point syslog solution
Best Practice Five: Triangulate
Process, Process, Process
Best Practice Six: Compliance Blueprint
FIPS
How Providers Can Alleviate
Concerns
The Market Has Gone to the Clouds
• 45% of companies
plan to move ERP
to the cloud in the
next 5 years
• Other studies state
that market is
moving even faster
than predicted here
The Cloud Changes Everything
…Except
Security
Ensure hosting/cloud solution
is subject to IT audit with your
IT security team.
Is your hosting/cloud solution subject to
internal IT audit with your IT security team?
Not All Clouds Are Equal
• ISC2 and CSA have partnered to offer a new
Cloud Security Certification
– SecurityWeek: ISC and CSA Partner for
Certification offering
• Amazon S3 Poor Configuration Puts Sensitive
Data at Risk
– SecurityWeek: Amazon Puts S3 Data At Risk
• Web Application Attack Challenge Cloud and On-
Premise Infrastructures
– SecurityWeek: Web Application Attacks Increase
• Trust in the Cloud?
– SecurityWeek: Lieberman: IT Doesn't Trust the
Cloud
What’s So Troubling About Cloud Security?
How Cloud Providers Can Address Concerns
• Transparency/Control Over Datacenter/Data Locality/Security Audibility
• Verifiable End-to-end Encryption – Data in Transit
• Industry/Government Regulation Compliance
• Proven Tools and Control with Restricted Access
• Control Over Security/Encryption
• Dedicated Resources/Data Isolation
• Provide Proven References
• Industry Standards for Data Privacy and Security
• Explicit Contractual Responsibilities for Service Levels/Security
• Provider Certification Standards
• Region/Country Specific Datacenter Locations
Things to Remember
Ensure the security and
privacy of your Cloud
application with:
 The Right Cloud for the Right
Application
 Compliance
 IDS/IPS
 Protection for Data at Rest
• Simplicity for Complex Applications. Concerto was designed to
meet the toughest regulatory challenges and the most complex
demands – and has earned an industry leading customer
retention rate as a result.
• Comprehensive Channel Enablement Services. Innovative private
and hybrid cloud and business transformation services help
channel partners go to market quickly.
• Recognized Cloud Provider for Microsoft Applications. Concerto
Cloud is the go-to cloud provider for Microsoft applications and
is recognized as Microsoft’s ISV of the Year for Cloud Services.
The Cloud That’s Up to Your Challenge
Cloud Services Quick Facts
FOR MORE INFORMATION:
(844) 760-1842
www.concertocloud.com
info@concertocloud.com

More Related Content

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

ERP in the Time of Breaches - Best Practices for Data Security

  • 1. ERP in the Time of Breaches Protect Yourself with the Right Governance, Risk and Compliance
  • 2. • The Role of Information Security • IT Security Conundrums • Best Practices for Security • How Providers can Alleviate Concerns • Q&A
  • 3. Today’s Presenter Greg Pierce • Chief Cloud Officer, Concerto Cloud Services • Pioneer in Enterprise Cloud Computing • Veteran business leader and entrepreneur with over 20 years experience • Helps businesses transform through the use of disruptive technologies
  • 4. The Role of Information Security
  • 5. Goal of Information Security Administrative, Technical and Physical Controls work together to ensure the confidentiality, integrity and availability (CIA) of critical systems and confidential information
  • 6. Information Security is a goal - we must continually strive for it with no guarantee of achievement. IT Security Conundrum One
  • 7. Regulatory compliance and/or certification ONLY serves as a guideline. IT Security Conundrum Two
  • 8. IT Security Conundrum Three Spending more (without other security processes) can deliver a false sense of security. IT Security Conundrum Three
  • 9. IT Security Conundrum Four YOU are the target - regardless of your industry vertical or company size.
  • 10. IT Security Conundrum Five It is easy to drive the wrong behavior from your users. Education is key and policies can’t be too restrictive.
  • 11. Information Security Domains 1. Access Control 2. Application Security 3. Business Continuity and Disaster Recovery Planning 4. Cryptography 5. Information Security and Risk Management 6. Legal, Regulations, Compliance and Investigations 7. Operations Security 8. Physical (Environmental) Security 9. Security Architecture and Design 10. Telecommunications and Network Security
  • 12. Security – A Year In Review
  • 13. Security Has Everyone’s Attention APR SEPTMAY JUN JUL AUG OCT NOV DEC JAN FEB MAR APR SEPTMAY JUN JUL AUG $70MM Records Stolen $40MM Credit & Debit Nov 15 – Dec 15, 2013$56MM Credit & Debit Apr - Sept, 2013 $76MM of $83MM Accounts Stolen July14 – Sept 2014 2013 2014 $9000 Credit & Debit
  • 14. The Target Breach – How did they do it? • Compromised HVAC contractor likely via a phishing email – Used free version of anti-malware that lacked real-time protection – Malware stole credentials to Target supplier portal • Portal – Not properly segmented on the network from other critical systems – Lacked two-factor authentication – Supplier/Vendor info was public, so attackers used this info for social engineering attack (HVAC contractor) – Supplier/Vendor ecosystem lacked security awareness training( best practice, etc…) • Took advantage of Monitoring system’s default username and password – Installed “RAM Scrapping” Malware on POS System – Disguised communications as legitimate monitoring traffic – Exfiltration of data was sent to an FTP server in Russia of the course of two days
  • 15. Target Breach - By the numbers • 70 million – # of records stolen • 40 million - # of Credit/Debit cards stolen • 100 million - $ they will spend upgrading payment terminals • 46% - percentage drop in profits at Target in the fourth quarter of 2013, compared with the year before • 53.7 million - The income that hackers likely generated from the sale of 2 million cards stolen from Target and sold at the mid-range price of $26.85 • ZERO – Chief Information Security Officer (CISO) or Chief Security Officer (CSO) jobs at Target
  • 16. The Target Breach – Why they got away “Target was certified as meeting the standard for the payment card industry (PCI) in September 2013. Nonetheless, we suffered a data breach. As a result, we are conducting an end-to-end review of our people, processes and technology to understand our opportunities to improve data security” Gregg Steinhafel, CEO
  • 17. The Target Breach – Why they got away • Failure or lack of established process and procedure – Security systems rapidly detected the security event but there was no response by IT • Weakness in the architecture of the Supplier portal – Insufficient oversight during the planning and implement phase allowed logical connectivity to sensitive systems and data– Architectural review board? – Infrequent assessment against systems to understand their impact on Information Security? • Lack of security awareness training
  • 18. Users are the Common Link • Trojans – software downloads - Kaaza • Viruses – Emails • Zombies or Botnets • Phishing (Identity Theft) • Spywaresource http://www.pcworld.com/article/2010527/f orrester-report-finds-most-data-breaches- are-caused-by-employees.html “Application users are most often the determining factor in whether or not a security breach occurs”
  • 19. What can we learn? A breach can happen to any company of any size and any industry – learning from others is critical.
  • 20. Best Practices to Secure Your ERP Solution and Organization
  • 21. Best Practice One: Holistic Planning Security is a Holistic Program – Process (not a project)  Never 100% – Risk Management  Improve Security Posture – Changing Security Landscape  Threats (motives)  Countermeasures
  • 22. Best Practice Two: Building Awareness • Security awareness is the knowledge, skill and attitude an individual possesses regarding the protection of information assets. • Being Security Aware means you understand that there is the potential for some people to deliberately or accidentally steal, damage, or misuse your account, computer or the data stored on your computer. • Awareness of the risks and available safeguards is the first line of defense for the security of information, systems and networks. “Application users are most often the determining factor in whether or not a security breach occurs” – source http://www.pcworld.com/article/2010527/forrester- report-finds-most-data-breaches-are-caused-by- employees.html
  • 23. Security Awareness Includes • Information about how to  Protect  Detect  React • Knowledge, Skill and Attitude  The What  The How  The Why • Culture Change
  • 24. Best Practice Three: Encryption Data in Use, Data in Motion, and Data at Rest - Ensure encryption for ALL classes of data
  • 25. Best Practice Four: Layered Structure A High Level Summary of Security Layers include: • Centralized and automated anti-malware and OS patching • Identity management • True network segmentation and isolation from ingress to egress at layer 2 and 3 • Data in-motion encryption by default • Multiple firewall segments operating at layer 1-7 of the OSI stack • State-of-the-art IDPS solution monitored and managed 24x7 by a dedicated security operations center (SOC) • Reverse Proxy services • “Other” confidential and proprietary security mechanisms and practices • Intelligent, multi-point syslog solution
  • 26. Best Practice Five: Triangulate
  • 28. Best Practice Six: Compliance Blueprint FIPS
  • 29. How Providers Can Alleviate Concerns
  • 30. The Market Has Gone to the Clouds • 45% of companies plan to move ERP to the cloud in the next 5 years • Other studies state that market is moving even faster than predicted here
  • 31. The Cloud Changes Everything …Except Security Ensure hosting/cloud solution is subject to IT audit with your IT security team. Is your hosting/cloud solution subject to internal IT audit with your IT security team?
  • 32. Not All Clouds Are Equal • ISC2 and CSA have partnered to offer a new Cloud Security Certification – SecurityWeek: ISC and CSA Partner for Certification offering • Amazon S3 Poor Configuration Puts Sensitive Data at Risk – SecurityWeek: Amazon Puts S3 Data At Risk • Web Application Attack Challenge Cloud and On- Premise Infrastructures – SecurityWeek: Web Application Attacks Increase • Trust in the Cloud? – SecurityWeek: Lieberman: IT Doesn't Trust the Cloud
  • 33. What’s So Troubling About Cloud Security?
  • 34. How Cloud Providers Can Address Concerns • Transparency/Control Over Datacenter/Data Locality/Security Audibility • Verifiable End-to-end Encryption – Data in Transit • Industry/Government Regulation Compliance • Proven Tools and Control with Restricted Access • Control Over Security/Encryption • Dedicated Resources/Data Isolation • Provide Proven References • Industry Standards for Data Privacy and Security • Explicit Contractual Responsibilities for Service Levels/Security • Provider Certification Standards • Region/Country Specific Datacenter Locations
  • 35. Things to Remember Ensure the security and privacy of your Cloud application with:  The Right Cloud for the Right Application  Compliance  IDS/IPS  Protection for Data at Rest
  • 36. • Simplicity for Complex Applications. Concerto was designed to meet the toughest regulatory challenges and the most complex demands – and has earned an industry leading customer retention rate as a result. • Comprehensive Channel Enablement Services. Innovative private and hybrid cloud and business transformation services help channel partners go to market quickly. • Recognized Cloud Provider for Microsoft Applications. Concerto Cloud is the go-to cloud provider for Microsoft applications and is recognized as Microsoft’s ISV of the Year for Cloud Services. The Cloud That’s Up to Your Challenge
  • 38. FOR MORE INFORMATION: (844) 760-1842 www.concertocloud.com info@concertocloud.com

Editor's Notes

  1. Controls can be administrative, technical or physical
  2. Thoughts on title – the current, or something like demystifying Information Security, or The Information Security Conundrum Tanya lets put some good graphics here on setting expectation or maybe the light at the end of the tunnel never being attainable.
  3. Thoughts on title – the current, or something like demystifying Information Security, or The Information Security Conundrum Tanya lets put some good graphics here on setting expectation or maybe the light at the end of the tunnel never being attainable.
  4. Thoughts on title – the current, or something like demystifying Information Security, or The Information Security Conundrum Tanya lets put some good graphics here on setting expectation or maybe the light at the end of the tunnel never being attainable.
  5. Thoughts on title – the current, or something like demystifying Information Security, or The Information Security Conundrum Tanya lets put some good graphics here on setting expectation or maybe the light at the end of the tunnel never being attainable.
  6. Thoughts on title – the current, or something like demystifying Information Security, or The Information Security Conundrum Tanya lets put some good graphics here on setting expectation or maybe the light at the end of the tunnel never being attainable.
  7. Tanya? Thoughts on title?
  8. Home Depot 56MM Credit and Debit cards between April and Sept Target 70MM records stolen of which 40MM were credit and debit cards – Nov 27th 2013 – Dec 15th 2013 JMC 76MM of 83MM estimated 83MM accounts July – Sept 2014 (they knew about it in July but disclosed in Sept) Chick-Fil-A Dec 2013-Sept 2014 – 9,000 Credit/Debit Cards.
  9. This is a good opportunity to pause and drive home a point – ask the audience to be honest and by a show of hands, how many of them see these numbers and think this would never happen to their firm because they are not Target. Then ask how many of them think the HVAC firm felt the same way.
  10. Tanya add a blob that says “Application users are most often the determining factor in whether or not a security breach occurs” – source http://www.pcworld.com/article/2010527/forrester-report-finds-most-data-breaches-are-caused-by-employees.html Trojans – software downloads - Kaaza Viruses – Emails Zombies or Botnets Phishing (Identity Theft) Spyware Most incidents are unintentional and can be avoided.
  11. Kim – do something here that represents that people, process and procedure form a strong triangle of security, or complete circle, etc.
  12. Hoping Pete can use these and change/alter them
  13. Like the circles. Would like to save them out separately so we can easily plug and play when there are changes. - DONE