SlideShare a Scribd company logo
1 of 9
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
Ron Pelletier, CISSP, CBCP, CISA, QSA
VP and Executive Manager
A SERIES OF LESSONS LEARNED
THE INCIDENT RESPONSE PROCESS
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
AGENDA
• Setting Stage for Incident Response – LifeCycle Approach
• Real World Attack Scenarios Prompt Incident Response
• Accumulating the Lessons Learned
• Applying the Lessons Learned
PONDURANCE 2
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
INCIDENT RESPONSE LIFE CYCLE
Identification Containment Eradication Recovery
Establish
monitoring to
recognize,
identify, & detect
an incident as
soon as possible
Establish
programmatic
methods to stop
the incident from
propagating or
extending its
impact
Establish
procedures, tools
and know-how to
eliminate the
source and
prevent
recurrence
Establish
communications
with stakeholders
and procedures to
continue normal
operations
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
REAL WORLD ATTACK SCENARIOS PROMPT INCIDENT RESPONSE
PONDURANCE 4
Situation 2: A compromise of email credentials (phishing attack possible) leads
to social engineering and transfer of more than one hundred thousand dollars
Situation 1: A phishing attack (leveraging Dyre Trojan) leads to an unauthorized
transfer of hundreds of thousands of dollars
Situation 3: A phishing attack leads to the compromise of end user credentials
and potential exposure of a number of sensitive records
Situation 4: A phishing attack (most probable cause) leads to the compromise
of admin credentials and millions of sensitive records
Pondurance Provided Direct Assistance to these 3
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
ACCUMULATING THE LESSONS LEARNED
PONDURANCE 5
Prepare
Do I know where my sensitive data lives?
Am I prepared to defend against attacks? Phishing attacks?
Is my helpdesk prepared to correlate attacks, attack patterns?
Does my retention schedule work against me?
What is my exposure to SSO, or passwords in multi use?
By Three Key Phases
Execute
Do I have a favorable and flexible risk assessment process?
Do I have a timely and tested response capability?
Can I parameterize the discovery process to limit my exposure?
Do I know how my systems are configured for discovery?
Learn
Do I know my legal and regulatory obligations for reporting?
Am I capable of aggregating and confirming discovery results?
Have I pre-contracted the expertise to investigate/report?
The Challenging Questions to Consider
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
Prepare
APPLYING THE LESSONS LEARNED
PONDURANCE 6
• Discourage use of Email as a personal “database”
• Conduct Incident Response AND eDiscovery exercises to target
potential data exposure
• Ensure defense-in-depth including additional capabilities for
advanced detection (dynamic egress/ingress monitoring)
• Establish correlative reporting for service desks, other reporting
intake functions
• Evaluate retention for unintended exposure (e.g., Email “deleted”
folders)
• Ensure Incident Response Team personnel represent all parts of
the organization, are properly trained
• Ensure end users are properly trained on retention and disposition
of data (think about common data stores like Email)
• Analyze the potential reuse of network passwords for external
portals such as OWA, VPN, external data stores/portals, etc.
• Develop meaningful Policies and /Procedures, including those that
target investigation and discovery
Key Take-Away:
Prepare during a period
of calm…
…don’t wait until
adversity is at your
doorstep
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
APPLYING THE LESSONS LEARNED
PONDURANCE
7
• Incident Response is not a linear process, may require dynamic
alerting to, and collaboration with, various risk management
functions (legal, DR/BCP, compliance, IT, etc.)
• Additional threat management capabilities may provide evidence
to leverage and assess exposure and reporting liability
• The risk management process should consider proper evaluation
of threat actors, attack methods BEFORE move to reporting
• Consider leveraging Incident Response process, eDiscovery
methods and risk assessment-at-incident with penetration tests
• Evaluate “mapped” drives as well as public and private folders
within OWA for potential exposure
• A PST file does not always provide same view as OWA, discovery
may require caveats/parameterization (assess accordingly)
• Establish a timeframe related to incident, provide search terms to
discovery analysts and KNOW what is a true exposure and what is
not, or not likely to be
Key Take-Away:
The average IQ goes to
zero during an
emergency…
…use your
plan, but
build in some
flexibility
Execute
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
APPLYING THE LESSONS LEARNED
PONDURANCE
8
• Exercise your plans as often as tolerated by the organization, but
no less than once per year
• Involve management in response plans and exercises, or be
prepared for management to deviate and execute untested
procedures at time of incident
• Develop organizational clarity by classifying data (and for heaven’s
sake find out where it lives!)
• Regarding eDiscovery, the “de-duplication” process is difficult,
particularly when tens of thousands of records are involved…know
what you are looking for ahead of time
• Develop consistency among independent entities that may
operate under a shared services model, limit top-level liability
• Pre-arrange for services that provide competency and flexibility,
attempt to limit “unknown” or surprise costs…but plan accordingly
• Share the wealth in lessons learned
Key Take-Away:
If you do not exercise
your incident response
plan and procedures…
…you have denied yourself
invaluable knowledge
through controlled failure
Learn
INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED
Ron Pelletier, CISSP, CBCP, CISA, QSA
VP and Executive Manager
QUESTIONS?
THE INCIDENT RESPONSE PROCESS

More Related Content

What's hot

What's hot (9)

Research Methods: Design and Analysis
Research Methods: Design and AnalysisResearch Methods: Design and Analysis
Research Methods: Design and Analysis
 
Module 5 - Concise Analysis Method
Module 5 - Concise Analysis MethodModule 5 - Concise Analysis Method
Module 5 - Concise Analysis Method
 
Setting research objectives
Setting research objectivesSetting research objectives
Setting research objectives
 
Denise Rousseau's Generic EBMgt Class 1
Denise Rousseau's Generic EBMgt Class 1Denise Rousseau's Generic EBMgt Class 1
Denise Rousseau's Generic EBMgt Class 1
 
Mind the Gap Health Systems Research and the Search for Answers
Mind the Gap Health Systems Research and the Search for AnswersMind the Gap Health Systems Research and the Search for Answers
Mind the Gap Health Systems Research and the Search for Answers
 
APT ASSIGNMENT 9
APT ASSIGNMENT 9APT ASSIGNMENT 9
APT ASSIGNMENT 9
 
Organizational agility
Organizational agilityOrganizational agility
Organizational agility
 
Risk perception & amp; management
Risk perception & amp; management Risk perception & amp; management
Risk perception & amp; management
 
RBM Links - Sep15
RBM Links - Sep15RBM Links - Sep15
RBM Links - Sep15
 

Similar to Spring Security Briefing: Lessons Learned from Recent Data Breach

11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.pptabhichowdary16
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Incident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docxIncident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docxjaggernaoma
 
3.-unit-1-hazard-analysis-correction.pptx
3.-unit-1-hazard-analysis-correction.pptx3.-unit-1-hazard-analysis-correction.pptx
3.-unit-1-hazard-analysis-correction.pptxssuser1ecccc
 
2012 IEHF - Task risk management
2012 IEHF - Task risk management2012 IEHF - Task risk management
2012 IEHF - Task risk managementAndy Brazier
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramCarl C. Manion
 
Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...
Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...
Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...Margolis Healy
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016Ashley Deuble
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004Donald E. Hester
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery PlanningKathy Pelletier
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationInfocyte
 

Similar to Spring Security Briefing: Lessons Learned from Recent Data Breach (20)

11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
PSM RM - Learn from experience
PSM RM - Learn from experiencePSM RM - Learn from experience
PSM RM - Learn from experience
 
Safe Operating Procudures
Safe Operating ProcuduresSafe Operating Procudures
Safe Operating Procudures
 
Incident response
Incident responseIncident response
Incident response
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Reliability
ReliabilityReliability
Reliability
 
Incident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docxIncident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docx
 
3.-unit-1-hazard-analysis-correction.pptx
3.-unit-1-hazard-analysis-correction.pptx3.-unit-1-hazard-analysis-correction.pptx
3.-unit-1-hazard-analysis-correction.pptx
 
2012 IEHF - Task risk management
2012 IEHF - Task risk management2012 IEHF - Task risk management
2012 IEHF - Task risk management
 
risk management.pdf
risk management.pdfrisk management.pdf
risk management.pdf
 
Building a Successful Threat Hunting Program
Building a Successful Threat Hunting ProgramBuilding a Successful Threat Hunting Program
Building a Successful Threat Hunting Program
 
Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...
Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...
Emergency Planning & Response for Colleges & Universities, VACLEA Conference ...
 
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response - Auscert 2016
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 

Recently uploaded

Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 

Recently uploaded (20)

Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 

Spring Security Briefing: Lessons Learned from Recent Data Breach

  • 1. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED Ron Pelletier, CISSP, CBCP, CISA, QSA VP and Executive Manager A SERIES OF LESSONS LEARNED THE INCIDENT RESPONSE PROCESS
  • 2. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED AGENDA • Setting Stage for Incident Response – LifeCycle Approach • Real World Attack Scenarios Prompt Incident Response • Accumulating the Lessons Learned • Applying the Lessons Learned PONDURANCE 2
  • 3. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED INCIDENT RESPONSE LIFE CYCLE Identification Containment Eradication Recovery Establish monitoring to recognize, identify, & detect an incident as soon as possible Establish programmatic methods to stop the incident from propagating or extending its impact Establish procedures, tools and know-how to eliminate the source and prevent recurrence Establish communications with stakeholders and procedures to continue normal operations
  • 4. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED REAL WORLD ATTACK SCENARIOS PROMPT INCIDENT RESPONSE PONDURANCE 4 Situation 2: A compromise of email credentials (phishing attack possible) leads to social engineering and transfer of more than one hundred thousand dollars Situation 1: A phishing attack (leveraging Dyre Trojan) leads to an unauthorized transfer of hundreds of thousands of dollars Situation 3: A phishing attack leads to the compromise of end user credentials and potential exposure of a number of sensitive records Situation 4: A phishing attack (most probable cause) leads to the compromise of admin credentials and millions of sensitive records Pondurance Provided Direct Assistance to these 3
  • 5. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED ACCUMULATING THE LESSONS LEARNED PONDURANCE 5 Prepare Do I know where my sensitive data lives? Am I prepared to defend against attacks? Phishing attacks? Is my helpdesk prepared to correlate attacks, attack patterns? Does my retention schedule work against me? What is my exposure to SSO, or passwords in multi use? By Three Key Phases Execute Do I have a favorable and flexible risk assessment process? Do I have a timely and tested response capability? Can I parameterize the discovery process to limit my exposure? Do I know how my systems are configured for discovery? Learn Do I know my legal and regulatory obligations for reporting? Am I capable of aggregating and confirming discovery results? Have I pre-contracted the expertise to investigate/report? The Challenging Questions to Consider
  • 6. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED Prepare APPLYING THE LESSONS LEARNED PONDURANCE 6 • Discourage use of Email as a personal “database” • Conduct Incident Response AND eDiscovery exercises to target potential data exposure • Ensure defense-in-depth including additional capabilities for advanced detection (dynamic egress/ingress monitoring) • Establish correlative reporting for service desks, other reporting intake functions • Evaluate retention for unintended exposure (e.g., Email “deleted” folders) • Ensure Incident Response Team personnel represent all parts of the organization, are properly trained • Ensure end users are properly trained on retention and disposition of data (think about common data stores like Email) • Analyze the potential reuse of network passwords for external portals such as OWA, VPN, external data stores/portals, etc. • Develop meaningful Policies and /Procedures, including those that target investigation and discovery Key Take-Away: Prepare during a period of calm… …don’t wait until adversity is at your doorstep
  • 7. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED APPLYING THE LESSONS LEARNED PONDURANCE 7 • Incident Response is not a linear process, may require dynamic alerting to, and collaboration with, various risk management functions (legal, DR/BCP, compliance, IT, etc.) • Additional threat management capabilities may provide evidence to leverage and assess exposure and reporting liability • The risk management process should consider proper evaluation of threat actors, attack methods BEFORE move to reporting • Consider leveraging Incident Response process, eDiscovery methods and risk assessment-at-incident with penetration tests • Evaluate “mapped” drives as well as public and private folders within OWA for potential exposure • A PST file does not always provide same view as OWA, discovery may require caveats/parameterization (assess accordingly) • Establish a timeframe related to incident, provide search terms to discovery analysts and KNOW what is a true exposure and what is not, or not likely to be Key Take-Away: The average IQ goes to zero during an emergency… …use your plan, but build in some flexibility Execute
  • 8. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED APPLYING THE LESSONS LEARNED PONDURANCE 8 • Exercise your plans as often as tolerated by the organization, but no less than once per year • Involve management in response plans and exercises, or be prepared for management to deviate and execute untested procedures at time of incident • Develop organizational clarity by classifying data (and for heaven’s sake find out where it lives!) • Regarding eDiscovery, the “de-duplication” process is difficult, particularly when tens of thousands of records are involved…know what you are looking for ahead of time • Develop consistency among independent entities that may operate under a shared services model, limit top-level liability • Pre-arrange for services that provide competency and flexibility, attempt to limit “unknown” or surprise costs…but plan accordingly • Share the wealth in lessons learned Key Take-Away: If you do not exercise your incident response plan and procedures… …you have denied yourself invaluable knowledge through controlled failure Learn
  • 9. INCIDENT RESPONSE – A SERIES OF LESSONS LEARNED Ron Pelletier, CISSP, CBCP, CISA, QSA VP and Executive Manager QUESTIONS? THE INCIDENT RESPONSE PROCESS