SlideShare a Scribd company logo
1 of 42
Download to read offline
SESSION ID:SESSION ID:
#RSAC
Daniel Soo
Deep Impact: Explore the Wide-
Reaching Impact of a Cyberattack
LAB4-R04
Principal
Deloitte & Touche LLP
Mary Galligan
Managing Director
Deloitte & Touche LLP
#RSAC
Cyber security needs are evolving
2
Business leaders are responsible for guiding response and recovery
from a risk perspective
Rehearsing builds threat awareness and creates “muscle memory” for
adaptive response
SECURE
Establish risk-prioritized controls
to protect against known and
emerging threats, and comply with
standards and regulations
VIGILANT
Establish situational risk and threat
awareness across the environment
to detect violations and anomalies
RESILIENT
Establish the ability to handle
critical incidents, quickly return to
normal operations, and repair
damage to the business
Organizations need to transform legacy IT security programs into cyber risk programs
#RSAC
Introduction to cyber wargaming
3
Cyber wargaming is an interactive technique that
immerses potential cyber-incident responders in
a simulated cyber scenario to help organizations evaluate
their cyber incident response preparedness
#RSAC
Cyber resilience
4
Cyber wargames drive improvements in cyber resilience, including:
Better identification of gaps in cyber incident
response people, processes, and tools
Broader consensus on the appropriate
strategies and activities to execute cyber
incident response
Stronger response capabilities aligned towards
mitigating the highest impact risks of a cyber
incident
Improved understanding of the people,
processes, data, and tools needed to respond
to a cyber incident
Tighter integration between parties likely to
be collectively involved in the response to a
cyber incident
Enhanced awareness of the downstream
impacts of cyber incident response decisions
and actions
Reduced time-to-response through the
development of cyber incident response
“muscle memory”
Improved clarity regarding ownership of
authority related to certain key cyber incident
response decisions
#RSAC
Session logistics
5
Today’s session will consists of three parts…
Simulation
90 minutes
Pre-Brief
10 minutes
Debrief
20 minutes
#RSAC
Company profile
6
YouKnight Bank (YKB)
The 6th largest diversified financial services company in the
United States, primarily operating in four core segments –
retail banking, corporate and institutional banking, asset
management, and residential mortgage banking.
Locations: 2,704
Employees: 50,492
Headquarters: New York City, NY
Founded: April 2, 1923
#RSAC
Company profile (cont’d)
7
Technology environment
Employees perform daily computing with traditional desktops and
laptops
Cloud computing has not been widely deployed – plans for the
capability have been proposed
Marketing and supply chain systems are managed by third parties
Transaction monitoring and the IT customer service help desk
have been outsourced to India
#RSAC
Participant roles
8
Players will assume the following roles within YouKnight Bank:
Chief Executive Officer
Chief Financial Officer
Chief Operating Officer
Chief Information Officer
General Counsel
Head of Communications & Public
Relations
Chief Risk Officer
Chief Security Officer
Chief Customer Experience Officer
#RSAC
Objectives
9
Understand the role of executive leadership in cyber incident
response
Identify the types of information, tools, and capabilities
needed to effectively support cyber incident response
Explore the interaction model for third parties (e.g., law
enforcement, regulators)
#RSAC
How to play
10
Review injects.
Review inject content in its entirety
Determine actions you will take and / or decisions you will make
Make decisions.
Describe your thought process, including your assumptions, out loud
Articulate how the decision will be executed
Consult others.
Engage directly with other players
Inform the facilitator if you want to speak to a non-player
#RSAC
Leading practices
11
Act decisively – have a clear, ongoing decision-making process
Focus on the emerging crisis over the symptoms of the incident
Prioritize decision-making based on impact
1
2
3
We are about to begin…
[ YKB Commercial ]
It is now 9:15 AM on April 19th
Update Clock
[ Incoming Ransom Video ]
[ Hackme Video ]
10 hours until 8:00 PM deadline
Text Spacing
2 hours until 8:00 PM deadline
Text Spacing
It is now 8:00 PM on April 19th
It is now 9:00 AM on April 20thMoving forward to the next morning…
Update Anim.
[ Boardroom Video ]
Heads up – XChange has now been offline for 2 hours. Until it comes back up, interbank transaction clearing and settlement
will not be functional across the bank.
We have all hands on deck investigating the cause, but haven’t found anything yet. Per our continuity plan, the incident
response team has been invoked; but it’s really not clear what we should be doing. Like many of our other systems, XChange
appears to be operating within parameters – except that it’s not working…
As you know, XChange is a Tier-1 application and we need it to complete our end-of-day transactions. But, given how
everything looks, I am looking for your input on how to proceed. Should we:
 Continue our investigations and hope that we find the cause of the outage and a solution; or
 Initiate disaster recovery right away. If we go down this path, we should be back online in 36 hours, but most critical
systems would be offline until then (we have to fail over everything at the same time, we can’t do it in pieces).
Also, as you know, we haven’t been able to renew our incident response retainer due to the vendor’s push for indemnification.
Still, we need more skilled resources to perform detailed technical investigation... Can we push through ASAP?
Tyler
Search all messages…<Ctrl+K>
Logout
COO
youknightbank.com
This message was sent with High importance.i
File Edit View Go Message Tools Help
Get Mail Write Tag
Inbox
Drafts
Sent
Follow Up
All Documents
Junk
Trash
Views
Folders
Archive
Tools
Other Mail
Reply Reply To All Forward Mark As More
From: Rice, Tyler (Director, Enterprise Applications) To: Chief Operations Officer
Subject: URGENT: XChange offline Cc:
Sender Subject Date Size
Diana Carter Lunch today? Thurs 04/20/2017 7:45AM 1K
Tyler Rice URGENT: FastFill offline Thurs 04/20/2017 8:15AM 2K
It is now 10:00 AM on April 20thMoving forward 1 hour…
Secure Sign-in
Save Online ID Security & Help
Forgot ID Forgot Passcode Enroll
Online ID Passcode Sign In
Lose more than just your
interest payments when you
accept a loan from YouKnight…
YouKnight Bank bet on your American Dream and won. They profited billions
on the subprime mortgages they sold to their NINJA customers, and what
did you get? You got EVICTED.
Open an Account Español
YouKnight
Bank
Retail / Personal Corporate Asset Management Mortgage
We gave you a chance, you didn’t take it. Now you’ve been served. Repent or more will come.
YouKnight.com/ YouKnight Bank
#Hackme
Get a loan, lose a house!
MORAL FAILURE
It is now 12:00 PM on April 20thMoving forward 2 hours…
[ News Video ]
[ Revolving Logo ]
It is now 6:00 PM on April 20thMoving forward 6 hours…
Valued employee,
At approximately 5:00 p.m. today, there was a water main break near your location. Because the water main break is so close
to power gridlines, access to your location will be prohibited until further notice.
We will provide further instructions when access to the building is reinstated.
Thank you for your patience and cooperation.
- Physical Security
Search all messages…<Ctrl+K>
Logout
All Personnel
youknightbank.com
This message was sent with High importance.i
File Edit View Go Message Tools Help
Get Mail Write Tag
Inbox
Drafts
Sent
Follow Up
All Documents
Junk
Trash
Views
Folders
Archive
Tools
Other Mail
Reply Reply To All Forward Mark As More
From: Physical Security To: All Personnel
Subject: URGENT: Location closed due to water main breakage Cc:
Public Relations Marketing campaign update Thurs 04/20/2017 8:15AM 3K
Physical Security URGENT: Location closed due to water main breakage Thurs 04/20/2017 5:30PM 2K
Sender Subject Date Size
It is now 11:00 AM on April 21stMoving forward to the next day…
Home About Photos Events More
Company
Invite friends to subscribe
450,916 people have been here
What are you saving up for? A new car? A summer vacation? Stop by today to learn
how you could be earning more on your savings! #moneyinthebank #savingisgaining
20 hrs Edited
+357,937 votes
79,526 Reshares
Roberta Landry How can you provide tips when your employees don’t
even bother to show up and you can’t open your stores? #YouNotThere
+21 votes Comments 19,203 1 hrs
Dave Hestle I’m saving for a new house since they took mine!
You’re better off not being able to get in… #YouKnightYouNever
YouKnight
YouKnight YouKnight Home
Sign Up
57,821 people commented
Connectin
Shop Now
Vote
Message
Watch videoSubscribe
351,102 people subscribed to this
Search for posts on this Page
..
ouKnight Bank
ouKnight Bank
ouKnight Bank
1642 new hollers
New to CHATNHOLLER?
Sign up now to get your own
personalized timeline!
Sign up
#YouNotYouKnighted MarcoCHATNHOLLER
Top Live Accounts Photos Videos More options
Trends
Venus Williams
115K Hollers
#SCOTUS
305K Hollers
#MyOneWordDistraction
Just started trending
#GilmoreGirls
89K Hollers
#OITNB
264K Hollers
Katie Lane @musicmantra_KL89 • 8m
Glad you decided to give yourself a “holiday,” but I cant afford a vacation cuz you still haven’t processed
the check I deposited DAYS ago! @YouKnight, get back to work! #YouNotYouKnighted #YouClosed
Polo Echo Heart Expand
James Arden @Arden_James • 29m
Hey, @YouKnight whether you cash my paychecks or not, I still have to pay rent. Waive the fee for
overdrawing on my account or I’m taking my money elsewhere! #YouPay #YouNotYouKnighted
Polo Echo Heart Expand
Ben Lee @bikerben003 • 42m
OMG some guy is going irate at YouKnight Bank right now – only one lady working the front desk and a
line almost out the door. Guy’s at the back obvi. #YouLast #YouWait #YouMad #YouNotYouKnighted
Polo Echo Heart Expand
Jeremy Jones MD @DrJeremyJones• 55m
Technology outage, crashing applications, website defacement… You about to go knight knight forever if
you don’t get your ducks in a row. #YouFailing #YouNotYouKnighted #ClosingTime
Polo Echo Heart Expand
Whitney Swift @Witty_Whitney82 • 1h
If you can’t keep your site safe, why should I believe you can keep my money safe!? These days, if the
hackers aren’t stealing from you, the banks are. #KnightInTinfoil #YouNoHero #YouNotYouKnighted
Polo Echo Heart Expand
Jacob Andrews @J_Andrew92 • 2h
@YouKnight - I understand that you may be experiencing “technical difficulties” but there is no excuse
for treating your customers poorly #YouRude #YouNotYouKnighted #PoorCustomerService
Polo Echo Heart Expand
It is now 1:00 PM on April 21stMoving forward 2 hours…
Greeting Voicemail Edit
Doug Dominose
New York City, New York
April 21, 2017 at 1:00 PM
Jane Finley
work
Tuesday
0:33
Richard Gilmore
home
Monday
0:48
George Stephens
home
04/14/17
0:21
+1 (347) 634-2012
New York City, NY
04/11/17
0:12
+1 (872) 657-8929
Chicago, IL
11/29/16
0:12
i
Call BackSpeaker Delete
CM&H LTE
i
i
i
i
i
0:03 -0:20
1
1:00 PM
“This is Special Agent Doug Dominose
with the FBI. I’m headed to YouKnight
headquarters now - should arrive within
the hour. Can you see to it that
someone is available to meet with me?”
It is now 4:00 PM on April 21stMoving forward 3 hours…
As you are likely aware, the media is reporting that YouKnight Bank has experienced a widespread technology outage rendering
it unable to accurately and securely perform transactional duties within the interbank network. Due to the far reaching
implications of the outage on members of the financial community, we will be monitoring the situation and conducting an
investigation to determine if certain penalties may apply.
Please provide your any input you feel will be valuable to our discovery efforts. I’ll be available at +1 (212) 555-3464 if you
would like to speak by phone.
Thanks,
Kevin Sumner
Senior Bank Examiner - Federal Reserve Bank
Search all messages…<Ctrl+K>
Logout
CFO
youknightbank.com
This message was sent with High importance.i
File Edit View Go Message Tools Help
Get Mail Write Tag
Inbox
Drafts
Sent
Follow Up
All Documents
Junk
Trash
Views
Folders
Archive
Tools
Other Mail
Reply Reply To All Forward Mark As More
From: Sumner, Kevin (Federal Reserve Bank) To: Chief Financial Officer
Subject: URGENT: Outage & Interbank Impact Cc:
Jan Finkle Status Update Fri 04/21/2017 3:45PM 1K
Kevin Sumner URGENT: Outage & Interbank Impact Fri 04/21/2017 4:00PM 1K
Sender Subject Date Size
The wargame has ended.
[ Debrief Video ]
#RSAC
Cyber wargaming lessons learned
39
Cyber events have an accelerated rate of escalation and
unfold more ambiguously than traditional crises
Impacts resulting from actions and decisions during
cyber incident response, even at a low level, are
greater and broader than those of a traditional incident
The scope of incident responders expands well
beyond technology during cyber incident response
1
2
3
#RSAC
Cyber Incident Response Success
40
Simulate realistic incidents regularly. By exercising the
plan, organizations can build “muscle memory” and
respond more effectively and consistently.
Organizations should embrace
technologies that enable operational
resiliency and proactive detection and
response capabilities.
Simple, flexible and distributed plans
provide guidance to responsible parties
throughout the organization. Understand
where external help is needed and have
contracts and capabilities in place
beforehand.
Determining legal, regulatory, and compliance
issues in the midst of a crisis is a bad place to be.
Prepare ahead and incorporate these
considerations into the CIR plan.
Educate executives on crisis communication
plans and their associated responsibilities.
Setting tone at the top of organizational
hierarchies has cascading impacts.
Prevent your plans from becoming “shelf
ware” by training your CIR team
periodically.
Carefully select CIR team members and
confirm they have the requisite skills and
experience to perform responsibilities
outlined in the plan.
Involve business operations in cyber Incident Response
planning so that mission critical processes and systems are
available when crises occur.
Cyber
Incident
Response
Legal, Risk, &
Compliance
The Plan
Supported by
Technology
Simulate the
Event
Operations
Cyber
Education
Cyber
Response
Team
Executive
Management
#RSAC
Effective cyber wargame exercises leverage a
carefully selected combination of high-fidelity
injects designed to mimic the real world.
Injects are revealed based upon player
actions and decisions, typically via:
Players will respond more realistically to
realistic injects – leading to improved
identification of strengths and weaknesses.
RELEVANCE TO THE BUSINESS READINESS TO EMBRACE CHALLENGES
Effective cyber wargame exercises are built
from the ground up to reflect an
organization’s specific business context,
organizational structure, operating
procedures, systems, data, etc.
Exercises should be designed so that
outcomes will impact how the business will
make decisions moving forward.
REALISM FOR THE PLAYERS+ +
Effective cyber wargame exercises involve
participants that are excited to embrace cyber
challenges and ready to remediate identified
weaknesses. Common outcomes include the
need to improve capabilities related to:
Designing an effective cyber wargame
41
Paper contentLive phone calls
Pre-recorded video The Facilitator
Delivery
Scenario
Audience
Objectives
Debrief
Business context
Report
Briefed actorsPre-recorded audio
IS risk
assessment
Cyber incident
response
Core security
services
Threat
Intelligence
Technical
resilience
Cyber
forensics
User ID
management
Business
engagement
Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack

More Related Content

Similar to Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack

Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingLERNER Consulting
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
LoanResolve Brief Presentation
LoanResolve Brief PresentationLoanResolve Brief Presentation
LoanResolve Brief Presentationjimmymac935
 
In motion winter14_final
In motion winter14_finalIn motion winter14_final
In motion winter14_finalSikich LLP
 
Social IT & Multi-channel support
Social IT & Multi-channel supportSocial IT & Multi-channel support
Social IT & Multi-channel supportDavid Favelle
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
For Managers With Logo Sw
For Managers With Logo SwFor Managers With Logo Sw
For Managers With Logo SwLasa UK
 
Australian Payments Network - Digital Identity
Australian Payments Network  - Digital Identity Australian Payments Network  - Digital Identity
Australian Payments Network - Digital Identity Australian Payments Network
 
Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...
Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...
Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...Dealmaker Media
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
 
Post-Event-Report-Delegate
Post-Event-Report-DelegatePost-Event-Report-Delegate
Post-Event-Report-DelegateAlan Royal
 
Open Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration PresentationOpen Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration Presentationdarryl_lehmann
 
Minimize Your Client's Risk: From IP to Cash Flow
Minimize Your Client's Risk: From IP to Cash FlowMinimize Your Client's Risk: From IP to Cash Flow
Minimize Your Client's Risk: From IP to Cash FlowTraklight.com
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Webinar: How To Create A Killer Presentation With Roberto Monaco
Webinar: How To Create A Killer Presentation With Roberto MonacoWebinar: How To Create A Killer Presentation With Roberto Monaco
Webinar: How To Create A Killer Presentation With Roberto MonacoMortgage Coach
 
Intergen Smarts 2 (2002)
Intergen Smarts 2 (2002)Intergen Smarts 2 (2002)
Intergen Smarts 2 (2002)Intergen
 

Similar to Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack (20)

OCTOBERFINAL 9
OCTOBERFINAL 9OCTOBERFINAL 9
OCTOBERFINAL 9
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER Consulting
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
LoanResolve Brief Presentation
LoanResolve Brief PresentationLoanResolve Brief Presentation
LoanResolve Brief Presentation
 
232 a7d01
232 a7d01232 a7d01
232 a7d01
 
In motion winter14_final
In motion winter14_finalIn motion winter14_final
In motion winter14_final
 
Social IT & Multi-channel support
Social IT & Multi-channel supportSocial IT & Multi-channel support
Social IT & Multi-channel support
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
For Managers With Logo Sw
For Managers With Logo SwFor Managers With Logo Sw
For Managers With Logo Sw
 
Australian Payments Network - Digital Identity
Australian Payments Network  - Digital Identity Australian Payments Network  - Digital Identity
Australian Payments Network - Digital Identity
 
Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...
Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...
Resource Code: Innovating the VC Firm with Platform & Community | Rob Hayes, ...
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Post-Event-Report-Delegate
Post-Event-Report-DelegatePost-Event-Report-Delegate
Post-Event-Report-Delegate
 
Open Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration PresentationOpen Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration Presentation
 
Minimize Your Client's Risk: From IP to Cash Flow
Minimize Your Client's Risk: From IP to Cash FlowMinimize Your Client's Risk: From IP to Cash Flow
Minimize Your Client's Risk: From IP to Cash Flow
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Webinar: How To Create A Killer Presentation With Roberto Monaco
Webinar: How To Create A Killer Presentation With Roberto MonacoWebinar: How To Create A Killer Presentation With Roberto Monaco
Webinar: How To Create A Killer Presentation With Roberto Monaco
 
Intergen Smarts 2 (2002)
Intergen Smarts 2 (2002)Intergen Smarts 2 (2002)
Intergen Smarts 2 (2002)
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingPriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack

  • 1. SESSION ID:SESSION ID: #RSAC Daniel Soo Deep Impact: Explore the Wide- Reaching Impact of a Cyberattack LAB4-R04 Principal Deloitte & Touche LLP Mary Galligan Managing Director Deloitte & Touche LLP
  • 2. #RSAC Cyber security needs are evolving 2 Business leaders are responsible for guiding response and recovery from a risk perspective Rehearsing builds threat awareness and creates “muscle memory” for adaptive response SECURE Establish risk-prioritized controls to protect against known and emerging threats, and comply with standards and regulations VIGILANT Establish situational risk and threat awareness across the environment to detect violations and anomalies RESILIENT Establish the ability to handle critical incidents, quickly return to normal operations, and repair damage to the business Organizations need to transform legacy IT security programs into cyber risk programs
  • 3. #RSAC Introduction to cyber wargaming 3 Cyber wargaming is an interactive technique that immerses potential cyber-incident responders in a simulated cyber scenario to help organizations evaluate their cyber incident response preparedness
  • 4. #RSAC Cyber resilience 4 Cyber wargames drive improvements in cyber resilience, including: Better identification of gaps in cyber incident response people, processes, and tools Broader consensus on the appropriate strategies and activities to execute cyber incident response Stronger response capabilities aligned towards mitigating the highest impact risks of a cyber incident Improved understanding of the people, processes, data, and tools needed to respond to a cyber incident Tighter integration between parties likely to be collectively involved in the response to a cyber incident Enhanced awareness of the downstream impacts of cyber incident response decisions and actions Reduced time-to-response through the development of cyber incident response “muscle memory” Improved clarity regarding ownership of authority related to certain key cyber incident response decisions
  • 5. #RSAC Session logistics 5 Today’s session will consists of three parts… Simulation 90 minutes Pre-Brief 10 minutes Debrief 20 minutes
  • 6. #RSAC Company profile 6 YouKnight Bank (YKB) The 6th largest diversified financial services company in the United States, primarily operating in four core segments – retail banking, corporate and institutional banking, asset management, and residential mortgage banking. Locations: 2,704 Employees: 50,492 Headquarters: New York City, NY Founded: April 2, 1923
  • 7. #RSAC Company profile (cont’d) 7 Technology environment Employees perform daily computing with traditional desktops and laptops Cloud computing has not been widely deployed – plans for the capability have been proposed Marketing and supply chain systems are managed by third parties Transaction monitoring and the IT customer service help desk have been outsourced to India
  • 8. #RSAC Participant roles 8 Players will assume the following roles within YouKnight Bank: Chief Executive Officer Chief Financial Officer Chief Operating Officer Chief Information Officer General Counsel Head of Communications & Public Relations Chief Risk Officer Chief Security Officer Chief Customer Experience Officer
  • 9. #RSAC Objectives 9 Understand the role of executive leadership in cyber incident response Identify the types of information, tools, and capabilities needed to effectively support cyber incident response Explore the interaction model for third parties (e.g., law enforcement, regulators)
  • 10. #RSAC How to play 10 Review injects. Review inject content in its entirety Determine actions you will take and / or decisions you will make Make decisions. Describe your thought process, including your assumptions, out loud Articulate how the decision will be executed Consult others. Engage directly with other players Inform the facilitator if you want to speak to a non-player
  • 11. #RSAC Leading practices 11 Act decisively – have a clear, ongoing decision-making process Focus on the emerging crisis over the symptoms of the incident Prioritize decision-making based on impact 1 2 3
  • 12. We are about to begin…
  • 14. It is now 9:15 AM on April 19th Update Clock
  • 15. [ Incoming Ransom Video ]
  • 17. 10 hours until 8:00 PM deadline Text Spacing
  • 18. 2 hours until 8:00 PM deadline Text Spacing
  • 19. It is now 8:00 PM on April 19th
  • 20. It is now 9:00 AM on April 20thMoving forward to the next morning… Update Anim.
  • 22. Heads up – XChange has now been offline for 2 hours. Until it comes back up, interbank transaction clearing and settlement will not be functional across the bank. We have all hands on deck investigating the cause, but haven’t found anything yet. Per our continuity plan, the incident response team has been invoked; but it’s really not clear what we should be doing. Like many of our other systems, XChange appears to be operating within parameters – except that it’s not working… As you know, XChange is a Tier-1 application and we need it to complete our end-of-day transactions. But, given how everything looks, I am looking for your input on how to proceed. Should we:  Continue our investigations and hope that we find the cause of the outage and a solution; or  Initiate disaster recovery right away. If we go down this path, we should be back online in 36 hours, but most critical systems would be offline until then (we have to fail over everything at the same time, we can’t do it in pieces). Also, as you know, we haven’t been able to renew our incident response retainer due to the vendor’s push for indemnification. Still, we need more skilled resources to perform detailed technical investigation... Can we push through ASAP? Tyler Search all messages…<Ctrl+K> Logout COO youknightbank.com This message was sent with High importance.i File Edit View Go Message Tools Help Get Mail Write Tag Inbox Drafts Sent Follow Up All Documents Junk Trash Views Folders Archive Tools Other Mail Reply Reply To All Forward Mark As More From: Rice, Tyler (Director, Enterprise Applications) To: Chief Operations Officer Subject: URGENT: XChange offline Cc: Sender Subject Date Size Diana Carter Lunch today? Thurs 04/20/2017 7:45AM 1K Tyler Rice URGENT: FastFill offline Thurs 04/20/2017 8:15AM 2K
  • 23. It is now 10:00 AM on April 20thMoving forward 1 hour…
  • 24. Secure Sign-in Save Online ID Security & Help Forgot ID Forgot Passcode Enroll Online ID Passcode Sign In Lose more than just your interest payments when you accept a loan from YouKnight… YouKnight Bank bet on your American Dream and won. They profited billions on the subprime mortgages they sold to their NINJA customers, and what did you get? You got EVICTED. Open an Account Español YouKnight Bank Retail / Personal Corporate Asset Management Mortgage We gave you a chance, you didn’t take it. Now you’ve been served. Repent or more will come. YouKnight.com/ YouKnight Bank #Hackme Get a loan, lose a house! MORAL FAILURE
  • 25. It is now 12:00 PM on April 20thMoving forward 2 hours…
  • 28. It is now 6:00 PM on April 20thMoving forward 6 hours…
  • 29. Valued employee, At approximately 5:00 p.m. today, there was a water main break near your location. Because the water main break is so close to power gridlines, access to your location will be prohibited until further notice. We will provide further instructions when access to the building is reinstated. Thank you for your patience and cooperation. - Physical Security Search all messages…<Ctrl+K> Logout All Personnel youknightbank.com This message was sent with High importance.i File Edit View Go Message Tools Help Get Mail Write Tag Inbox Drafts Sent Follow Up All Documents Junk Trash Views Folders Archive Tools Other Mail Reply Reply To All Forward Mark As More From: Physical Security To: All Personnel Subject: URGENT: Location closed due to water main breakage Cc: Public Relations Marketing campaign update Thurs 04/20/2017 8:15AM 3K Physical Security URGENT: Location closed due to water main breakage Thurs 04/20/2017 5:30PM 2K Sender Subject Date Size
  • 30. It is now 11:00 AM on April 21stMoving forward to the next day…
  • 31. Home About Photos Events More Company Invite friends to subscribe 450,916 people have been here What are you saving up for? A new car? A summer vacation? Stop by today to learn how you could be earning more on your savings! #moneyinthebank #savingisgaining 20 hrs Edited +357,937 votes 79,526 Reshares Roberta Landry How can you provide tips when your employees don’t even bother to show up and you can’t open your stores? #YouNotThere +21 votes Comments 19,203 1 hrs Dave Hestle I’m saving for a new house since they took mine! You’re better off not being able to get in… #YouKnightYouNever YouKnight YouKnight YouKnight Home Sign Up 57,821 people commented Connectin Shop Now Vote Message Watch videoSubscribe 351,102 people subscribed to this Search for posts on this Page .. ouKnight Bank ouKnight Bank ouKnight Bank
  • 32. 1642 new hollers New to CHATNHOLLER? Sign up now to get your own personalized timeline! Sign up #YouNotYouKnighted MarcoCHATNHOLLER Top Live Accounts Photos Videos More options Trends Venus Williams 115K Hollers #SCOTUS 305K Hollers #MyOneWordDistraction Just started trending #GilmoreGirls 89K Hollers #OITNB 264K Hollers Katie Lane @musicmantra_KL89 • 8m Glad you decided to give yourself a “holiday,” but I cant afford a vacation cuz you still haven’t processed the check I deposited DAYS ago! @YouKnight, get back to work! #YouNotYouKnighted #YouClosed Polo Echo Heart Expand James Arden @Arden_James • 29m Hey, @YouKnight whether you cash my paychecks or not, I still have to pay rent. Waive the fee for overdrawing on my account or I’m taking my money elsewhere! #YouPay #YouNotYouKnighted Polo Echo Heart Expand Ben Lee @bikerben003 • 42m OMG some guy is going irate at YouKnight Bank right now – only one lady working the front desk and a line almost out the door. Guy’s at the back obvi. #YouLast #YouWait #YouMad #YouNotYouKnighted Polo Echo Heart Expand Jeremy Jones MD @DrJeremyJones• 55m Technology outage, crashing applications, website defacement… You about to go knight knight forever if you don’t get your ducks in a row. #YouFailing #YouNotYouKnighted #ClosingTime Polo Echo Heart Expand Whitney Swift @Witty_Whitney82 • 1h If you can’t keep your site safe, why should I believe you can keep my money safe!? These days, if the hackers aren’t stealing from you, the banks are. #KnightInTinfoil #YouNoHero #YouNotYouKnighted Polo Echo Heart Expand Jacob Andrews @J_Andrew92 • 2h @YouKnight - I understand that you may be experiencing “technical difficulties” but there is no excuse for treating your customers poorly #YouRude #YouNotYouKnighted #PoorCustomerService Polo Echo Heart Expand
  • 33. It is now 1:00 PM on April 21stMoving forward 2 hours…
  • 34. Greeting Voicemail Edit Doug Dominose New York City, New York April 21, 2017 at 1:00 PM Jane Finley work Tuesday 0:33 Richard Gilmore home Monday 0:48 George Stephens home 04/14/17 0:21 +1 (347) 634-2012 New York City, NY 04/11/17 0:12 +1 (872) 657-8929 Chicago, IL 11/29/16 0:12 i Call BackSpeaker Delete CM&H LTE i i i i i 0:03 -0:20 1 1:00 PM “This is Special Agent Doug Dominose with the FBI. I’m headed to YouKnight headquarters now - should arrive within the hour. Can you see to it that someone is available to meet with me?”
  • 35. It is now 4:00 PM on April 21stMoving forward 3 hours…
  • 36. As you are likely aware, the media is reporting that YouKnight Bank has experienced a widespread technology outage rendering it unable to accurately and securely perform transactional duties within the interbank network. Due to the far reaching implications of the outage on members of the financial community, we will be monitoring the situation and conducting an investigation to determine if certain penalties may apply. Please provide your any input you feel will be valuable to our discovery efforts. I’ll be available at +1 (212) 555-3464 if you would like to speak by phone. Thanks, Kevin Sumner Senior Bank Examiner - Federal Reserve Bank Search all messages…<Ctrl+K> Logout CFO youknightbank.com This message was sent with High importance.i File Edit View Go Message Tools Help Get Mail Write Tag Inbox Drafts Sent Follow Up All Documents Junk Trash Views Folders Archive Tools Other Mail Reply Reply To All Forward Mark As More From: Sumner, Kevin (Federal Reserve Bank) To: Chief Financial Officer Subject: URGENT: Outage & Interbank Impact Cc: Jan Finkle Status Update Fri 04/21/2017 3:45PM 1K Kevin Sumner URGENT: Outage & Interbank Impact Fri 04/21/2017 4:00PM 1K Sender Subject Date Size
  • 37. The wargame has ended.
  • 39. #RSAC Cyber wargaming lessons learned 39 Cyber events have an accelerated rate of escalation and unfold more ambiguously than traditional crises Impacts resulting from actions and decisions during cyber incident response, even at a low level, are greater and broader than those of a traditional incident The scope of incident responders expands well beyond technology during cyber incident response 1 2 3
  • 40. #RSAC Cyber Incident Response Success 40 Simulate realistic incidents regularly. By exercising the plan, organizations can build “muscle memory” and respond more effectively and consistently. Organizations should embrace technologies that enable operational resiliency and proactive detection and response capabilities. Simple, flexible and distributed plans provide guidance to responsible parties throughout the organization. Understand where external help is needed and have contracts and capabilities in place beforehand. Determining legal, regulatory, and compliance issues in the midst of a crisis is a bad place to be. Prepare ahead and incorporate these considerations into the CIR plan. Educate executives on crisis communication plans and their associated responsibilities. Setting tone at the top of organizational hierarchies has cascading impacts. Prevent your plans from becoming “shelf ware” by training your CIR team periodically. Carefully select CIR team members and confirm they have the requisite skills and experience to perform responsibilities outlined in the plan. Involve business operations in cyber Incident Response planning so that mission critical processes and systems are available when crises occur. Cyber Incident Response Legal, Risk, & Compliance The Plan Supported by Technology Simulate the Event Operations Cyber Education Cyber Response Team Executive Management
  • 41. #RSAC Effective cyber wargame exercises leverage a carefully selected combination of high-fidelity injects designed to mimic the real world. Injects are revealed based upon player actions and decisions, typically via: Players will respond more realistically to realistic injects – leading to improved identification of strengths and weaknesses. RELEVANCE TO THE BUSINESS READINESS TO EMBRACE CHALLENGES Effective cyber wargame exercises are built from the ground up to reflect an organization’s specific business context, organizational structure, operating procedures, systems, data, etc. Exercises should be designed so that outcomes will impact how the business will make decisions moving forward. REALISM FOR THE PLAYERS+ + Effective cyber wargame exercises involve participants that are excited to embrace cyber challenges and ready to remediate identified weaknesses. Common outcomes include the need to improve capabilities related to: Designing an effective cyber wargame 41 Paper contentLive phone calls Pre-recorded video The Facilitator Delivery Scenario Audience Objectives Debrief Business context Report Briefed actorsPre-recorded audio IS risk assessment Cyber incident response Core security services Threat Intelligence Technical resilience Cyber forensics User ID management Business engagement