SlideShare a Scribd company logo
1 of 32
YOU WILL BE BREACHED
ARE YOU PREPARED?
MIKE SAUNDERS – CISSP, GCIH, GWAPT, GPEN
HARDWATER INFORMATION SECURITY, LLC
About Mike
In IT full-time since 1998
Entered IT Security in 2007
Agenda
Definition of a breach
Background statistics on breaches
Preparing your response plan
Putting your plan into action
Links to resources
Key Assumptions
Small to medium-sized business (SMB)
◦ Typically fewer than 500 employees
Few IT resources, few or none dedicated to IT security
Incident Response IS NOT about tools!
What Is a Breach?
Breach means an intrusion into a computer system, i.e. hacking, or
exposure of sensitive data
Causes of a breach:
◦ crimes of opportunity
◦ targeted attacks
◦ viruses
◦ web-delivered malware
◦ malicious insiders
◦ mistakes / unintentional disclosure
◦ Loss/theft of laptop or media
Lots of Breaches
Anthem BCBS Premera CareFirst
OPM Target Home Depot
Staples eBAY Snapchat
SendGrid White Lodging (2x) Dairy Queen
Jimmy Johns Goodwill SUPERVALU
California DMV Sony Did I mention Sony?
The list goes on, and on, and on…
We’re Too Small to be a Target
Verizon 2015 DBIR – 2,122 incidents of confirmed data loss
◦ 573 in small business
2015 Symantec ISTR – 34% of spear phishing attacks directed at
companies with fewer than 250 employees
60% of all attacks targeted small and medium businesses
◦ 2015 Symantec ISTR
44% of small businesses reported a breach
◦ 2013 National Small Business Association Technology Survey
Costs of a Breach
Verizon estimates between $52k -
$87k costs for 1000 records lost
Fines
Possible jail terms under HIPAA
Loss of customer and business
partner confidence
Incident Response Framework
P – Preparation
I – Identification
C – Containment
E – Eradication
R – Recovery
L – Lessons Learned
Preparation
There are no secrets to success. It is the result of preparation, hard
work, and learning from failure. – Colin Powell
Preparation: Getting Started
Get management support and executive sponsor!
Define your incident handling team members
◦ Not just IT! IT, Security, Legal, HR, PR, Management, external IT vendor
◦ Designate an incident leader. This person needs to be calm under fire
Preparation: The Crown Jewels
Need to define what’s important to your organization to guide
protection / monitoring
◦ Email
◦ Online sales
◦ Data
◦ Proprietary information / trade secrets
Preparation: Basics
Charter
◦ Executive level authorization to perform IR duties
Policies
◦ Strong policies help enforce compliance and define roles and responsibilities
◦ Incident Handling policies provide legal authority to investigate, “sniff”
network traffic, monitor activities
Procedures
◦ Clear, thorough, tested procedures help reduce confusion when tensions are
high
◦ Checklists
◦ Notification procedures – legal, PR, law enforcement
Preparation: Communications
Define a communications plan
◦ Email and phone may be down or compromised; make sure you have cell
numbers
◦ Identify alternate contacts
◦ Don’t forget to include IT vendor, network provider, etc.
◦ Law enforcement
◦ Test your calling tree at least annually
◦ Keep paper copies and keep them up to date
Preparation: Testing and
Practice
Perform incident handling
tabletop exercises
◦ When problems are identified,
be sure to update procedures
Perform live response exercise annually
Identification: Sources
Logs / SIEM
◦ When in doubt, err on excessive logging
◦ NSA – Spotting the adversary document
◦ Firewalls
◦ Authentication success & fail
◦ AV / IDS
◦ DHCP
◦ DNS
◦ Web servers
Helpdesk
3rd parties & business partners
Identification: Assessment
First priority is to determine if a security incident occurred
Document the following
◦ Affected machine(s)
◦ Logged on users
◦ Open network connections
◦ Running processes
◦ How incident was identified
◦ Who reported it
◦ When it was reported
◦ What was happening
Containment
Focus is stopping the spread
Follow documented containment procedures
Isolate affected host(s)
◦ Pull network cable / power down / firewall off
◦ Use attack signatures to build rules
◦ email / web filtering / IPS
Image affected machines, store offline
◦ Tested forensics procedures are essential
Continue documenting all activities
tumblr
Containment: Notification
Now is the time to activate the incident response team
Follow communications plan, notify internal parties as appropriate
If you’re going to contact law enforcement, now is the time
Contact legal counsel
Eradication
Focus is removal and restoration of affected systems
Wipe / Rebuild / Restore
Apply missing patches
Scan for indicators of compromise
Apply mitigations – firewall / WAF / IDS / update AV
Change passwords
Recovery
Goal is to bring systems back online without causing another incident
Verify issue is resolved
Increase monitoring
◦ Determine duration of increased monitoring
Mistakes Happen
Success does not consist in never making mistakes, but in never making
the same one a second time.
– George Bernard Shaw
Lessons Learned
Be sure to hold a lessons learned session after breach
◦ Hold within two weeks
◦ Identify what failed and why
◦ Implement fixes and update documentation
Execution
Document all steps in a notebook
◦ Helps to have one person working, another keeping notes
Measure twice, cut once… First, do no harm…
◦ In other words, don’t be too hasty
Step back to see the forest
for the trees
Summary
All sizes of organizations are being attacked
Effective incident response is about preparation and practice, not about
tools!
Incident response plans are key to recovery and limiting lossses
There is a vast array of resources available to help you build your plan
Resources
Local law enforcement, including FBI
Professional Security Organizations
◦ ISSA
◦ InfraGard
SANS
◦ https://www.sans.org/
NOREX
◦ https://www.norex.net/
Resources
Creating a Computer Security Incident Response Team (CSIRT)
◦ http://www.cert.org/csirts/Creating-A-CSIRT.html
NIST SP800-61 Rev. 2: Computer Security Incident Handling Guide
◦ http://crsc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf
SANS Incident Handling Forms
◦ http://www.sans.org/score/incidentforms/
Incident Handler’s Handbook
◦ https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-
handbook-33901
Incident Handling Annual Testing and Training
◦ https://www.sans.org/reading-room/whitepapers/incident/incident-handling-
annual-testing-training-34565
Resources
SANS Policy Templates
◦ https://www.sans.org/security-resources/policies/
SANS Reading Room
◦ http://www.sans.org/reading_room/
An Incident Handling Process for Small and Medium Businesses
◦ http://www.sans.org/reading_room/whitepapers/incident/incident-handling-
process-small-medium-businesses_1791
Blue Team Handbook: Incident Response Edition
◦ ISBN-13: 978-1500734756
◦ http://www.amazon.com/Blue-Team-Handbook-condensed-
Responder/dp/1500734756/
Resources
NSA – Spotting the Adversary With Windows Event Log Monitoring
◦ https://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Lo
g_Monitoring.pdf
U.S. D.O.J Best Practices for Victim Response and Reporting
◦ http://www.justice.gov/sites/default/files/opa/speeches/attachments/2015/04/29/cri
minal_division_guidance_on_best_practices_for_victim_response_and_reporting_cyb
er_incidents.pdf
Table Top Exercises for Incident Response
◦ http://seanmason.com/2015/04/20/table-top-exercises-ttx/
When Breaches Happen: Top Five Questions to Prepare For
◦ https://www.sans.org/reading-room/whitepapers/analyst/breaches-happen-top-
questions-prepare-35220
Corporate Incident Response – Why You Can’t Afford to Ignore It
◦ http://www.mcafee.com/us/resources/white-papers/foundstone/wp-corp-incident-
response.pdf
References
Verizon 2015 Data Breach Investigations Report
◦ http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigation-
report-2015_en_xg.pdf
Symantec 2015 Internet Security Threat Report
◦ https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-
security-threat-report-volume-20-2015-social_v2.pdf
2013 National Small Business Association Technology Survey
◦ http://www.nsba.biz/wp-content/uploads/2013/09/Technology-Survey-2013.pdf
Contact Me
mike.saunders@hardwaterinformationsecurity.com
@hardwaterhacker
http://hardwatersec.blogspot.com/
Questions?

More Related Content

What's hot

Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramResilient Systems
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsAndrew S. Baker (ASB)
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...Eric Vanderburg
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 

What's hot (20)

Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Personal Digital Hygiene
Personal Digital HygienePersonal Digital Hygiene
Personal Digital Hygiene
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
Window of Compromise
Window of CompromiseWindow of Compromise
Window of Compromise
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Ht t17
Ht t17Ht t17
Ht t17
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 

Viewers also liked

The language of algebra
The language of algebraThe language of algebra
The language of algebrajrbt2014
 
A high voltage power supply operating under a magnetic field
A high voltage power supply operating under a magnetic fieldA high voltage power supply operating under a magnetic field
A high voltage power supply operating under a magnetic fieldLove Kiss
 
VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...
VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...
VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...Doing Something Good
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
Lesson plan
Lesson planLesson plan
Lesson plangeenadon
 
Designing an SAL package using Active Learning Strategies
Designing an SAL package using Active Learning StrategiesDesigning an SAL package using Active Learning Strategies
Designing an SAL package using Active Learning StrategiesShanthi Nadarajan
 
2012 alamin dow-micro and nano letters-al n-nanodiamond saw
2012 alamin dow-micro and nano letters-al n-nanodiamond saw2012 alamin dow-micro and nano letters-al n-nanodiamond saw
2012 alamin dow-micro and nano letters-al n-nanodiamond sawAnna Rusu
 
Development services by goigi
Development services by goigiDevelopment services by goigi
Development services by goigigoiginivedita
 
Seminario biologia molecular
Seminario biologia molecularSeminario biologia molecular
Seminario biologia molecularsaracardona1208
 

Viewers also liked (16)

Web design by goigi
Web design by goigiWeb design by goigi
Web design by goigi
 
Amber Hernandez Photo Deck
Amber Hernandez Photo DeckAmber Hernandez Photo Deck
Amber Hernandez Photo Deck
 
The language of algebra
The language of algebraThe language of algebra
The language of algebra
 
A high voltage power supply operating under a magnetic field
A high voltage power supply operating under a magnetic fieldA high voltage power supply operating under a magnetic field
A high voltage power supply operating under a magnetic field
 
VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...
VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...
VicHealth Physical Activity Futures Jam Presentation: Mike Halligan, BodyWise...
 
Works
WorksWorks
Works
 
Actividad nro 1
Actividad nro 1Actividad nro 1
Actividad nro 1
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
Lesson plan
Lesson planLesson plan
Lesson plan
 
Designing an SAL package using Active Learning Strategies
Designing an SAL package using Active Learning StrategiesDesigning an SAL package using Active Learning Strategies
Designing an SAL package using Active Learning Strategies
 
Blended Learning status in Greece Today
Blended Learning status in Greece TodayBlended Learning status in Greece Today
Blended Learning status in Greece Today
 
2012 alamin dow-micro and nano letters-al n-nanodiamond saw
2012 alamin dow-micro and nano letters-al n-nanodiamond saw2012 alamin dow-micro and nano letters-al n-nanodiamond saw
2012 alamin dow-micro and nano letters-al n-nanodiamond saw
 
Seabreeze-August
Seabreeze-AugustSeabreeze-August
Seabreeze-August
 
Development services by goigi
Development services by goigiDevelopment services by goigi
Development services by goigi
 
Seminario biologia molecular
Seminario biologia molecularSeminario biologia molecular
Seminario biologia molecular
 
14 daniel lópez álvarez ortega blearning15_v4
14 daniel lópez álvarez  ortega blearning15_v414 daniel lópez álvarez  ortega blearning15_v4
14 daniel lópez álvarez ortega blearning15_v4
 

Similar to You Will Be Breached

You will be breached
You will be breachedYou will be breached
You will be breachedMike Saunders
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...Financial Poise
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachFinancial Poise
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersJack Nichelson
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ EnterprisesNigel Hanson
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat KeynoteJohn D. Johnson
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them Donald E. Hester
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsPhil Huggins FBCS CITP
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 

Similar to You Will Be Breached (20)

You will be breached
You will be breachedYou will be breached
You will be breached
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 

More from Mike Saunders

I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101Mike Saunders
 
BSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopBSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopMike Saunders
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017Mike Saunders
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distroMike Saunders
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 
DetectingSpearPhishingAttacks
DetectingSpearPhishingAttacksDetectingSpearPhishingAttacks
DetectingSpearPhishingAttacksMike Saunders
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Mike Saunders
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationMike Saunders
 
Problems with parameters b sides-msp
Problems with parameters b sides-mspProblems with parameters b sides-msp
Problems with parameters b sides-mspMike Saunders
 

More from Mike Saunders (10)

I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101I Want My EIP - Buffer Overflow 101
I Want My EIP - Buffer Overflow 101
 
BSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshopBSidesMSP 2017 - SDR101 workshop
BSidesMSP 2017 - SDR101 workshop
 
SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017SDR 101 - NDSU CyberSecurity 2017
SDR 101 - NDSU CyberSecurity 2017
 
SDR101-presentation-distro
SDR101-presentation-distroSDR101-presentation-distro
SDR101-presentation-distro
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
DetectingSpearPhishingAttacks
DetectingSpearPhishingAttacksDetectingSpearPhishingAttacks
DetectingSpearPhishingAttacks
 
Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
Problems with parameters b sides-msp
Problems with parameters b sides-mspProblems with parameters b sides-msp
Problems with parameters b sides-msp
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

You Will Be Breached

  • 1. YOU WILL BE BREACHED ARE YOU PREPARED? MIKE SAUNDERS – CISSP, GCIH, GWAPT, GPEN HARDWATER INFORMATION SECURITY, LLC
  • 2. About Mike In IT full-time since 1998 Entered IT Security in 2007
  • 3. Agenda Definition of a breach Background statistics on breaches Preparing your response plan Putting your plan into action Links to resources
  • 4. Key Assumptions Small to medium-sized business (SMB) ◦ Typically fewer than 500 employees Few IT resources, few or none dedicated to IT security Incident Response IS NOT about tools!
  • 5. What Is a Breach? Breach means an intrusion into a computer system, i.e. hacking, or exposure of sensitive data Causes of a breach: ◦ crimes of opportunity ◦ targeted attacks ◦ viruses ◦ web-delivered malware ◦ malicious insiders ◦ mistakes / unintentional disclosure ◦ Loss/theft of laptop or media
  • 6. Lots of Breaches Anthem BCBS Premera CareFirst OPM Target Home Depot Staples eBAY Snapchat SendGrid White Lodging (2x) Dairy Queen Jimmy Johns Goodwill SUPERVALU California DMV Sony Did I mention Sony? The list goes on, and on, and on…
  • 7. We’re Too Small to be a Target Verizon 2015 DBIR – 2,122 incidents of confirmed data loss ◦ 573 in small business 2015 Symantec ISTR – 34% of spear phishing attacks directed at companies with fewer than 250 employees 60% of all attacks targeted small and medium businesses ◦ 2015 Symantec ISTR 44% of small businesses reported a breach ◦ 2013 National Small Business Association Technology Survey
  • 8. Costs of a Breach Verizon estimates between $52k - $87k costs for 1000 records lost Fines Possible jail terms under HIPAA Loss of customer and business partner confidence
  • 9. Incident Response Framework P – Preparation I – Identification C – Containment E – Eradication R – Recovery L – Lessons Learned
  • 10. Preparation There are no secrets to success. It is the result of preparation, hard work, and learning from failure. – Colin Powell
  • 11. Preparation: Getting Started Get management support and executive sponsor! Define your incident handling team members ◦ Not just IT! IT, Security, Legal, HR, PR, Management, external IT vendor ◦ Designate an incident leader. This person needs to be calm under fire
  • 12. Preparation: The Crown Jewels Need to define what’s important to your organization to guide protection / monitoring ◦ Email ◦ Online sales ◦ Data ◦ Proprietary information / trade secrets
  • 13. Preparation: Basics Charter ◦ Executive level authorization to perform IR duties Policies ◦ Strong policies help enforce compliance and define roles and responsibilities ◦ Incident Handling policies provide legal authority to investigate, “sniff” network traffic, monitor activities Procedures ◦ Clear, thorough, tested procedures help reduce confusion when tensions are high ◦ Checklists ◦ Notification procedures – legal, PR, law enforcement
  • 14. Preparation: Communications Define a communications plan ◦ Email and phone may be down or compromised; make sure you have cell numbers ◦ Identify alternate contacts ◦ Don’t forget to include IT vendor, network provider, etc. ◦ Law enforcement ◦ Test your calling tree at least annually ◦ Keep paper copies and keep them up to date
  • 15. Preparation: Testing and Practice Perform incident handling tabletop exercises ◦ When problems are identified, be sure to update procedures Perform live response exercise annually
  • 16. Identification: Sources Logs / SIEM ◦ When in doubt, err on excessive logging ◦ NSA – Spotting the adversary document ◦ Firewalls ◦ Authentication success & fail ◦ AV / IDS ◦ DHCP ◦ DNS ◦ Web servers Helpdesk 3rd parties & business partners
  • 17. Identification: Assessment First priority is to determine if a security incident occurred Document the following ◦ Affected machine(s) ◦ Logged on users ◦ Open network connections ◦ Running processes ◦ How incident was identified ◦ Who reported it ◦ When it was reported ◦ What was happening
  • 18. Containment Focus is stopping the spread Follow documented containment procedures Isolate affected host(s) ◦ Pull network cable / power down / firewall off ◦ Use attack signatures to build rules ◦ email / web filtering / IPS Image affected machines, store offline ◦ Tested forensics procedures are essential Continue documenting all activities tumblr
  • 19. Containment: Notification Now is the time to activate the incident response team Follow communications plan, notify internal parties as appropriate If you’re going to contact law enforcement, now is the time Contact legal counsel
  • 20. Eradication Focus is removal and restoration of affected systems Wipe / Rebuild / Restore Apply missing patches Scan for indicators of compromise Apply mitigations – firewall / WAF / IDS / update AV Change passwords
  • 21. Recovery Goal is to bring systems back online without causing another incident Verify issue is resolved Increase monitoring ◦ Determine duration of increased monitoring
  • 22. Mistakes Happen Success does not consist in never making mistakes, but in never making the same one a second time. – George Bernard Shaw
  • 23. Lessons Learned Be sure to hold a lessons learned session after breach ◦ Hold within two weeks ◦ Identify what failed and why ◦ Implement fixes and update documentation
  • 24. Execution Document all steps in a notebook ◦ Helps to have one person working, another keeping notes Measure twice, cut once… First, do no harm… ◦ In other words, don’t be too hasty Step back to see the forest for the trees
  • 25. Summary All sizes of organizations are being attacked Effective incident response is about preparation and practice, not about tools! Incident response plans are key to recovery and limiting lossses There is a vast array of resources available to help you build your plan
  • 26. Resources Local law enforcement, including FBI Professional Security Organizations ◦ ISSA ◦ InfraGard SANS ◦ https://www.sans.org/ NOREX ◦ https://www.norex.net/
  • 27. Resources Creating a Computer Security Incident Response Team (CSIRT) ◦ http://www.cert.org/csirts/Creating-A-CSIRT.html NIST SP800-61 Rev. 2: Computer Security Incident Handling Guide ◦ http://crsc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf SANS Incident Handling Forms ◦ http://www.sans.org/score/incidentforms/ Incident Handler’s Handbook ◦ https://www.sans.org/reading-room/whitepapers/incident/incident-handlers- handbook-33901 Incident Handling Annual Testing and Training ◦ https://www.sans.org/reading-room/whitepapers/incident/incident-handling- annual-testing-training-34565
  • 28. Resources SANS Policy Templates ◦ https://www.sans.org/security-resources/policies/ SANS Reading Room ◦ http://www.sans.org/reading_room/ An Incident Handling Process for Small and Medium Businesses ◦ http://www.sans.org/reading_room/whitepapers/incident/incident-handling- process-small-medium-businesses_1791 Blue Team Handbook: Incident Response Edition ◦ ISBN-13: 978-1500734756 ◦ http://www.amazon.com/Blue-Team-Handbook-condensed- Responder/dp/1500734756/
  • 29. Resources NSA – Spotting the Adversary With Windows Event Log Monitoring ◦ https://www.nsa.gov/ia/_files/app/Spotting_the_Adversary_with_Windows_Event_Lo g_Monitoring.pdf U.S. D.O.J Best Practices for Victim Response and Reporting ◦ http://www.justice.gov/sites/default/files/opa/speeches/attachments/2015/04/29/cri minal_division_guidance_on_best_practices_for_victim_response_and_reporting_cyb er_incidents.pdf Table Top Exercises for Incident Response ◦ http://seanmason.com/2015/04/20/table-top-exercises-ttx/ When Breaches Happen: Top Five Questions to Prepare For ◦ https://www.sans.org/reading-room/whitepapers/analyst/breaches-happen-top- questions-prepare-35220 Corporate Incident Response – Why You Can’t Afford to Ignore It ◦ http://www.mcafee.com/us/resources/white-papers/foundstone/wp-corp-incident- response.pdf
  • 30. References Verizon 2015 Data Breach Investigations Report ◦ http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigation- report-2015_en_xg.pdf Symantec 2015 Internet Security Threat Report ◦ https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet- security-threat-report-volume-20-2015-social_v2.pdf 2013 National Small Business Association Technology Survey ◦ http://www.nsba.biz/wp-content/uploads/2013/09/Technology-Survey-2013.pdf