SlideShare a Scribd company logo
1 of 27
YOU CAN’T STOP
A BREACH.
NOW WHAT?!?
“Begin with the end in mind.”
~Stephen Covey
“You couldn't know what you didn't know,
but now you know.” ~Yogi Berra
PRESENTERS
Nate Latessa
Heureka Chief Operating Officer
nate.latessa@heurekasoftware.com
Stephen Marchewitz
VP Client Solutions
Stephen.marchewitz@heurekasoftware.com
HEUREKA OVERVIEW
Heureka
Meaning: “I’ve found it!”
Heureka was formed to allow
clients to search and respond
quickly to discovery, security,
compliance and free-form
investigation needs.
WHY?
There is a need for quick information regarding:
Breach
Lawsuit
HR Issues
BSA Licensing
Inquiry
Process Change
Lack of Planning
Excessive failed
logins undetected
Unpatched Endpoints
Forced to classify data
Unknown what's in the
cloud
Unknown IOC's
Intellectual Property
Loss
Failed Audit
Proof of compliance
HOW?
• Endpoint Intelligence
• Viewed via the search and
correlation platform
• Numerous workflows
– eDiscovery
– Data Classification
– Incident and Indicator Response
– Audit and Compliance
– Free Form Investigation
YOU CAN’T STOP A BREACH
Overview
• Security’s Strategic Change
• Resilience
• Reducing the Impact
• Reverse Engineering Your Plan of Action
“Enterprises have long over-spent on prevention and under-spent
on detection and response.” --Gartner
Verizon breach report shows:
– 80% RATED AS SIMPLE ATTACKS
– ⅔s WERE ACTIVE FOR MONTHS
BEFORE BEING DISCOVERED.
PHASES OF A BREACH
•Controls
•Hardening
•Enforcement
BEFORE
• Detect
• Block
• Defend
DURING
• Scope
• Contain
• Remediate
AFTER
SPENDING BEFORE KNOWN BREACH
•$$$$$$$$$$BEFORE
•$$$$DURING
•$AFTER
SPENDING SHIFT POST-BREACH
•$$$$$$$$BEFORE
•$$$$$DURING
•$$$$AFTER
A 20% increase in spending after a breach,
disproportionally in forensic and investigative tools.
--Ponemon
WHILE WE CAN’T STOP A
BREACH…
Can we realistically contain it?
RESILIENT
Patterned After Nature
You have to be
WHAT WILL IT TAKE?
• Increasing the speed and accuracy of
security response actions during an attack
• Effective and adaptive plans and processes
to identify and remediate security breaches
after they have occurred
- SANS report 2014
THE MOVE FROM PREVENTION
Respond
Detect
Prevent
IMPACT REDUCING EFFORTS
• Data Classification
• Granular Audits
• Solid Proactive Processes
• Anomaly Detection
• Policies and Procedures
• Incident Identification and Remediation
• Patching Process
NEED FOR PLANNING
• Incident Response Plan
• Data Classification Plan
• Audit Plan
• Risk Management Plan
• Business Impact Analysis
• Business Continuity Plan
• Patch Plan
– And Everything Must be a Process!
YET PLANS TAKE TIME AND RESOURCES
• Again, after a breach, spending only goes up 20%.
Corporations (on average) have
• No patience ( yet lack speed)
• Not enough resources (yet incomplete planning)
Starting with a conceptual plan doesn’t work (easily) in
practice
REVERSE ENGINEERING
It’s too difficult to forward engineer in
today’s environment.
Data Data
THE FIVE KEYS TO REVERSE
ENGINEERING
1. Determine the most basic level what happened (or
could), what you have, and where it is—(i.e. malware,
data, files, systems, network traffic, etc).
2. Define the problem
3. Identify as many steps as possible that are required to
resolve the issue.
4. Define the tools and resources needed to get the job
done.
5. Create the policies and procedures based on those
steps and resources.
BENEFITS OF REVERSE ENGINEERING
• Starting with a blank canvas is too difficult
• Systematically identifies areas to improve
• Provides a baseline for making changes
and testing them
• Helps assess performance and provides a
basis for making improvements.
IDEAL INCIDENT RESPONSE
Goals
• Risks and Impacts
• Classify
Plan
• Policies
• Procedures
Discover
• Scope
• Validate
Contain
• Prioritize
• Group
Eradicate
• Correlate
• Cleanse
Recover
• Resolve Collateral Issues
• Improve
REVERSE ENGINEERED IR
Discover
• Scope
• Validate
Contain
• Prioritize
• Group
Eradicate
• Correlate
• Cleanse
Recover
• Resolve Collateral Issues
• Improve
Goals
• Risks and Impacts
• Classify
Plan
• Policies
• Procedures
DISCOVERY IS KEY
What do we have? Where is it? Who owns it?
What’s happening now? Where should we start?
This is critical for many issues
• Incident Response
• Compliance
• Data Classification
• Intellectual Property Loss
• Lawsuits
• Etc.
SUMMARY
• You’re breached
• Ensure you ‘know what you know.’
• The ideal doesn’t work in practice
• Begin with the end in mind –Resilience is key
• Have your tools and processes reflect this
fact
• Start from where you are to reduce impact
and collateral risk issues
THANK YOU!
HEUREKA – I’VE FOUND IT!
www.heurekasoftware.com

More Related Content

What's hot (6)

Twelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About ThemTwelve Risks to Enterprise Software Projects-And What to Do About Them
Twelve Risks to Enterprise Software Projects-And What to Do About Them
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
One hundred rules for nasa project managers
One hundred rules for nasa project managersOne hundred rules for nasa project managers
One hundred rules for nasa project managers
 
Brighttalk high scale low touch and other bedtime stories - final
Brighttalk   high scale low touch and other bedtime stories - finalBrighttalk   high scale low touch and other bedtime stories - final
Brighttalk high scale low touch and other bedtime stories - final
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Bill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-SuiteBill Lisse - Communicating Security Across the C-Suite
Bill Lisse - Communicating Security Across the C-Suite
 

Similar to Heureka Webinar - Increase Resilience and Reduce the Impact of a Breach

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 

Similar to Heureka Webinar - Increase Resilience and Reduce the Impact of a Breach (20)

Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery ProfessionalsHeureka Webinar – Security, the Growth Engine for eDiscovery Professionals
Heureka Webinar – Security, the Growth Engine for eDiscovery Professionals
 
Applying TQM and the Toyota Production System in Development of Software Arti...
Applying TQM and the Toyota Production System in Development of Software Arti...Applying TQM and the Toyota Production System in Development of Software Arti...
Applying TQM and the Toyota Production System in Development of Software Arti...
 
Data Governance: Why, What & How
Data Governance: Why, What & HowData Governance: Why, What & How
Data Governance: Why, What & How
 
Defect Metrics for Organization and Project Health
Defect Metrics for Organization and Project HealthDefect Metrics for Organization and Project Health
Defect Metrics for Organization and Project Health
 
Computer Applications and Systems - Workshop IV
Computer Applications and Systems - Workshop IVComputer Applications and Systems - Workshop IV
Computer Applications and Systems - Workshop IV
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)You've Got No UI?! (Agile Data Teams)
You've Got No UI?! (Agile Data Teams)
 
Code Yellow: Helping operations top-heavy teams the smart way
Code Yellow: Helping operations top-heavy teams the smart wayCode Yellow: Helping operations top-heavy teams the smart way
Code Yellow: Helping operations top-heavy teams the smart way
 
WTF is Penetration Testing
WTF is Penetration TestingWTF is Penetration Testing
WTF is Penetration Testing
 
Code Yellow: Helping Operations Top-Heavy Teams the Smart Way
Code Yellow: Helping Operations Top-Heavy Teams the Smart WayCode Yellow: Helping Operations Top-Heavy Teams the Smart Way
Code Yellow: Helping Operations Top-Heavy Teams the Smart Way
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Assessment Project Management in the Real World - Hour Three
Assessment Project Management in the Real World - Hour ThreeAssessment Project Management in the Real World - Hour Three
Assessment Project Management in the Real World - Hour Three
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryAlphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
 
Engineering Teams and Systems for Velocity
Engineering Teams and Systems for VelocityEngineering Teams and Systems for Velocity
Engineering Teams and Systems for Velocity
 
Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...Building enterprise platforms - off the beaten path - SharePoint User Group U...
Building enterprise platforms - off the beaten path - SharePoint User Group U...
 
Measuring Data Quality with DataOps
Measuring Data Quality with DataOpsMeasuring Data Quality with DataOps
Measuring Data Quality with DataOps
 
Helping operations top-heavy teams the smart way
Helping operations top-heavy teams the smart wayHelping operations top-heavy teams the smart way
Helping operations top-heavy teams the smart way
 

Recently uploaded

Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Recently uploaded (20)

WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 

Heureka Webinar - Increase Resilience and Reduce the Impact of a Breach

  • 1. YOU CAN’T STOP A BREACH. NOW WHAT?!?
  • 2. “Begin with the end in mind.” ~Stephen Covey “You couldn't know what you didn't know, but now you know.” ~Yogi Berra
  • 3. PRESENTERS Nate Latessa Heureka Chief Operating Officer nate.latessa@heurekasoftware.com Stephen Marchewitz VP Client Solutions Stephen.marchewitz@heurekasoftware.com
  • 4. HEUREKA OVERVIEW Heureka Meaning: “I’ve found it!” Heureka was formed to allow clients to search and respond quickly to discovery, security, compliance and free-form investigation needs.
  • 5. WHY? There is a need for quick information regarding: Breach Lawsuit HR Issues BSA Licensing Inquiry Process Change Lack of Planning Excessive failed logins undetected Unpatched Endpoints Forced to classify data Unknown what's in the cloud Unknown IOC's Intellectual Property Loss Failed Audit Proof of compliance
  • 6. HOW? • Endpoint Intelligence • Viewed via the search and correlation platform • Numerous workflows – eDiscovery – Data Classification – Incident and Indicator Response – Audit and Compliance – Free Form Investigation
  • 7. YOU CAN’T STOP A BREACH Overview • Security’s Strategic Change • Resilience • Reducing the Impact • Reverse Engineering Your Plan of Action
  • 8. “Enterprises have long over-spent on prevention and under-spent on detection and response.” --Gartner Verizon breach report shows: – 80% RATED AS SIMPLE ATTACKS – ⅔s WERE ACTIVE FOR MONTHS BEFORE BEING DISCOVERED.
  • 9. PHASES OF A BREACH •Controls •Hardening •Enforcement BEFORE • Detect • Block • Defend DURING • Scope • Contain • Remediate AFTER
  • 10. SPENDING BEFORE KNOWN BREACH •$$$$$$$$$$BEFORE •$$$$DURING •$AFTER
  • 11. SPENDING SHIFT POST-BREACH •$$$$$$$$BEFORE •$$$$$DURING •$$$$AFTER A 20% increase in spending after a breach, disproportionally in forensic and investigative tools. --Ponemon
  • 12. WHILE WE CAN’T STOP A BREACH… Can we realistically contain it?
  • 14. WHAT WILL IT TAKE? • Increasing the speed and accuracy of security response actions during an attack • Effective and adaptive plans and processes to identify and remediate security breaches after they have occurred - SANS report 2014
  • 15. THE MOVE FROM PREVENTION Respond Detect Prevent
  • 16. IMPACT REDUCING EFFORTS • Data Classification • Granular Audits • Solid Proactive Processes • Anomaly Detection • Policies and Procedures • Incident Identification and Remediation • Patching Process
  • 17. NEED FOR PLANNING • Incident Response Plan • Data Classification Plan • Audit Plan • Risk Management Plan • Business Impact Analysis • Business Continuity Plan • Patch Plan – And Everything Must be a Process!
  • 18. YET PLANS TAKE TIME AND RESOURCES • Again, after a breach, spending only goes up 20%. Corporations (on average) have • No patience ( yet lack speed) • Not enough resources (yet incomplete planning) Starting with a conceptual plan doesn’t work (easily) in practice
  • 19. REVERSE ENGINEERING It’s too difficult to forward engineer in today’s environment. Data Data
  • 20. THE FIVE KEYS TO REVERSE ENGINEERING 1. Determine the most basic level what happened (or could), what you have, and where it is—(i.e. malware, data, files, systems, network traffic, etc). 2. Define the problem 3. Identify as many steps as possible that are required to resolve the issue. 4. Define the tools and resources needed to get the job done. 5. Create the policies and procedures based on those steps and resources.
  • 21. BENEFITS OF REVERSE ENGINEERING • Starting with a blank canvas is too difficult • Systematically identifies areas to improve • Provides a baseline for making changes and testing them • Helps assess performance and provides a basis for making improvements.
  • 22. IDEAL INCIDENT RESPONSE Goals • Risks and Impacts • Classify Plan • Policies • Procedures Discover • Scope • Validate Contain • Prioritize • Group Eradicate • Correlate • Cleanse Recover • Resolve Collateral Issues • Improve
  • 23. REVERSE ENGINEERED IR Discover • Scope • Validate Contain • Prioritize • Group Eradicate • Correlate • Cleanse Recover • Resolve Collateral Issues • Improve Goals • Risks and Impacts • Classify Plan • Policies • Procedures
  • 24. DISCOVERY IS KEY What do we have? Where is it? Who owns it? What’s happening now? Where should we start? This is critical for many issues • Incident Response • Compliance • Data Classification • Intellectual Property Loss • Lawsuits • Etc.
  • 25. SUMMARY • You’re breached • Ensure you ‘know what you know.’ • The ideal doesn’t work in practice • Begin with the end in mind –Resilience is key • Have your tools and processes reflect this fact • Start from where you are to reduce impact and collateral risk issues
  • 27. HEUREKA – I’VE FOUND IT! www.heurekasoftware.com

Editor's Notes

  1. Pain Story – why Something bad happened. People are yelling You're in trouble and you need answers from across the enterprise...ASAP!
  2. In the aftermath of a breach, security spending increases by 20% and many make the decision to invest in forensic and investigative tool
  3. You have issues now, start there