SlideShare a Scribd company logo
1 of 23
Download to read offline
Thrive. Grow. Achieve.
IT Security 101
Nate Solloway, CEH, E|CSA
June 15, 2015
WHAT’S ON TAP?
• Passing the Security Portion of Your Financial Audit
• Assessing Security Vulnerabilities
• Security in the Cloud
• Privacy Laws
• Q&A
2
WHO’S A CFO? RAISE YOUR HAND
3
Computer
Operations
Are system and application data backed
up? What is the frequency?
How and where are the backups stored?
What is the frequency in which backups
are tested?
What restrictions are placed, if any, to
access to the computer room and any
computer equipment,
telecommunication equipment and data
files?
To what extent is the computer room and any computer equipment,
telecommunication equipment and data files protected from
environmental hazards?
To what extent are security management practices in place to support
the IT functions and infrastructure?
How are modifications to user access privileges performed and
authorized?
How is IT security monitored? To what extent are logs of security
activity created and maintained?
Are User IDs and passwords used for individual user authentication to
gain access to the company applications and financial systems?
Do user passwords require strong complexity controls (i.e.: length,
expiration, history, sessions, timeouts, and special restrictions).
Does the client have access to the source code for any accounting
system modifications made for them?
4
ASSESSING VULNERABILITIES
5
VULNERABILITY MAPPING VS. PENETRATION TESTING
TOOLS ARE AWESOME, BUT….
AUTOMATED SCRIPTS, FALSE POSITIVES
HOW MUCH INTELLIGENCE DO YOU NEED?
HOW THE BAD GUYS EXPLOIT THEM
6
MANUAL VULNERABILITY MAPPING
7
LET’S GOOGLE THAT
8
BUT EXPLOITING IS HARD, RIGHT?
9
COMMON VULNERABILITIES
10
OPEN PORTS
PEOPLE
LAZY SOFTWARE PATCHING
PEOPLE
OUT DATE AV/IDS
PEOPLE
LAZY PROCESSES FOR CRITICAL AUTHENTICATION (BANKS,
TRANSFERS)
PEOPLE
CLIENT SIDE VULNERABILITIES
CLIENT SIDE VULNERABILITIES ARE NOT ALWAYS EASY TO IDENTIFY.
SOME COMMON CLIENT SIDE ATTACK AGENTS INCLUDE:
- ADOBE READER
- WINZIP
- ITUNES
- INTERNET EXPLORER
- FIREFOX
- SAFARI
- ADOBE FLASH PLAYER
11
WHAT IS PENETRATION TESTING?
BLACK BOX
- APPROACHING THINGS JUST LIKE AN UNIFORMED ATTACKER
- REQUIRES NO REVELATION OF SECURITY
WHITE BOX
- USING KNOWLEDGE OF THE SYSTEMS TO ELABORATE TEST
CASES
- PROVIDES AS MUCH INFORMATION AS POSSIBLE TO THE
PENETRATION TEST TO THAT THEY CAN GAIN INSIGHT AND
CREATE TESTS
HOST BASED ASSESSMENTS
- MAKE A COPY OF YOUR SERVERS. TEST ON THEM WITH FULL
ACCESS LOOKING FOR VULNERABILITIES
12
WHAT DOES A REPORT DELIVER?
A SECURITY ASSESSMENT DELIVERS A REPORT THAT
• HELPS EXECUTIVES MAKE DECISIONS ON IMPLEMENTING
SECURITY CONTROLS
• HELP THE IT TEAM IMPLEMENT CONTROLS AND PATCH FLAWS
DISCOVERED DURING TESTING
• LOW
• MED
• HIGH
• SERIOUS
• CRITICAL
13
SECURITY IS A BUSINESS DECISION
14
RISK IS A BUSINESS DECISION
15
WHAT’S MY RISK?
DOWNTIME?
REPUTATION?
$$$ ?
16
PRIVACY (GAPP)
PERSONAL INFORMATION COLLECTED ON EMPLOYEES
• NAME
• ADDRESS
• PHONE NUMBERS
• SOCIAL SECURITY NUMBER
• BANK ACCOUNT AND ROUTING NUMBERS.
17
EXTERNAL DATA COLLECTION
NAMES
• ADDRESSES OR GEOGRAPHIC IDENTIFIERS SMALLER THAN A STATE
• PHONE NUMBERS
• FAX NUMBERS
• EMAIL ADDRESSES
• SOCIAL SECURITY NUMBERS
• CREDIT CARD ACCOUNT NUMBERS
• WEB ADDRESSES
• PHOTOGRAPHIC IMAGES
18
WHAT’S A BREACH?
FIRST NAME OR FIRST INITIAL AND LAST NAME IN COMBINATION WITH
ANY OF THE FOLLOWING
• SOCIAL SECURITY NUMBER
• HOME ADDRESS
• EMAIL ADDRESS
• PHONE NUMBERS
• CREDIT CARD ACCOUNT NUMBERS
19
INCIDENTS REQUIRING NOTIFICATION
• A USER (EMPLOYEE, CONTRACTOR OR THIRD PARTY PROVIDER)
HAS OBTAINED UNAUTHORIZED ACCESS TO
PERSONAL INFORMATION MAINTAINED IN EITHER PAPER OR
ELECTRONIC FORM
• AN INTRUDER HAS ACCESSED DATABASE(S) SUCH AS THAT
CONTAIN PERSONAL INFORMATION ON AN INDIVIDUAL.
• COMPUTER EQUIPMENT SUCH AS A WORKSTATION, LAPTOP, CD-
ROM OR OTHER ELECTRONIC MEDIA CONTAINING PERSONAL
INFORMATION ON AN INDIVIDUAL HAS BEEN LOST OR STOLEN.
• A DEPARTMENT OR UNIT HAS NOT PROPERLY DISPOSED OF
RECORDS CONTAINING PERSONAL INFORMATION ABOUT AN
INDIVIDUAL.
• A THIRD-PARTY SERVICE PROVIDER HAS EXPERIENCED ANY OF THE
INCIDENTS ABOVE, AFFECTING THE ORGANIZATION’S
DATACONTAINING PERSONAL INFORMATION.
20
STATES REQUIRING NOTIFICATION
21
22
MINIMIZING OPEN PORTS
- FEWER SERVICES?
- MAYBE THE CLOUD
PEOPLE
- LET’S GET BACK TO THIS ONE
AGGRESSIVE SOFTWARE PATCHING
- SERVERS
- WORKSTATIONS
- APPS
AV VS IDS
AUTHENTICATION
PEOPLE
QUESTIONS?
23
Nate Solloway – Manager
nsolloway@raffa.com
Seth Zarny – Partner
szarny@raffa.com
Evette Collins – Account Executive
ecollins@raffa.com

More Related Content

What's hot

Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer ForensicsNeilg42
 
Data validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageData validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageNicola Chemello
 
Facts about computer forensic investigator
Facts about computer forensic investigatorFacts about computer forensic investigator
Facts about computer forensic investigatorcclgroup
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingBryan Len
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialistheidirobison
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Damir Delija
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practiceJonathan Ezor
 

What's hot (17)

Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Data validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageData validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverage
 
Facts about computer forensic investigator
Facts about computer forensic investigatorFacts about computer forensic investigator
Facts about computer forensic investigator
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex TrainingDigital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 
cv_Bodenmann
cv_Bodenmanncv_Bodenmann
cv_Bodenmann
 
Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice3 21-12 ethical challenges for mobile practice
3 21-12 ethical challenges for mobile practice
 

Viewers also liked

2016-01-05 Dynamics SL Year End Closing Procedures
2016-01-05 Dynamics SL Year End Closing Procedures2016-01-05 Dynamics SL Year End Closing Procedures
2016-01-05 Dynamics SL Year End Closing ProceduresRaffa Learning Community
 
2015-12-15 Introduction to PCI and HIPAA Compliance
2015-12-15 Introduction to PCI and HIPAA Compliance2015-12-15 Introduction to PCI and HIPAA Compliance
2015-12-15 Introduction to PCI and HIPAA ComplianceRaffa Learning Community
 
2015-02-26 Securing Your Network Perimeter
2015-02-26 Securing Your Network Perimeter2015-02-26 Securing Your Network Perimeter
2015-02-26 Securing Your Network PerimeterRaffa Learning Community
 
2015-12-10 Accounting Systems Comparison Seminar
2015-12-10 Accounting Systems Comparison Seminar2015-12-10 Accounting Systems Comparison Seminar
2015-12-10 Accounting Systems Comparison SeminarRaffa Learning Community
 
2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other ApplicationsRaffa Learning Community
 
2015 06-02 Improving ROI with IT Cloud Solutions
2015 06-02 Improving ROI with IT Cloud Solutions2015 06-02 Improving ROI with IT Cloud Solutions
2015 06-02 Improving ROI with IT Cloud SolutionsRaffa Learning Community
 
2015 04-21 Assessing Your Organization's Sustainability
2015 04-21 Assessing Your Organization's Sustainability2015 04-21 Assessing Your Organization's Sustainability
2015 04-21 Assessing Your Organization's SustainabilityRaffa Learning Community
 
2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection Act
2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection Act2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection Act
2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection ActRaffa Learning Community
 
2015-09-08 Preparing Your Organization and Yourself for a Successful Transition
2015-09-08 Preparing Your Organization and Yourself for a Successful Transition2015-09-08 Preparing Your Organization and Yourself for a Successful Transition
2015-09-08 Preparing Your Organization and Yourself for a Successful TransitionRaffa Learning Community
 
2015-01-29 Generating Corporate Sponsorship Support
2015-01-29 Generating Corporate Sponsorship Support2015-01-29 Generating Corporate Sponsorship Support
2015-01-29 Generating Corporate Sponsorship SupportRaffa Learning Community
 
2015-06-25 Trending Topics in Employee Benefit Plans
2015-06-25 Trending Topics in Employee Benefit Plans2015-06-25 Trending Topics in Employee Benefit Plans
2015-06-25 Trending Topics in Employee Benefit PlansRaffa Learning Community
 

Viewers also liked (16)

2016-01-05 Dynamics SL Year End Closing Procedures
2016-01-05 Dynamics SL Year End Closing Procedures2016-01-05 Dynamics SL Year End Closing Procedures
2016-01-05 Dynamics SL Year End Closing Procedures
 
2015-12-15 Introduction to PCI and HIPAA Compliance
2015-12-15 Introduction to PCI and HIPAA Compliance2015-12-15 Introduction to PCI and HIPAA Compliance
2015-12-15 Introduction to PCI and HIPAA Compliance
 
2015-02-26 Securing Your Network Perimeter
2015-02-26 Securing Your Network Perimeter2015-02-26 Securing Your Network Perimeter
2015-02-26 Securing Your Network Perimeter
 
2015-12-10 Accounting Systems Comparison Seminar
2015-12-10 Accounting Systems Comparison Seminar2015-12-10 Accounting Systems Comparison Seminar
2015-12-10 Accounting Systems Comparison Seminar
 
2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications2015-05-07 Integrating Your AMS with Other Applications
2015-05-07 Integrating Your AMS with Other Applications
 
2015 06-02 Improving ROI with IT Cloud Solutions
2015 06-02 Improving ROI with IT Cloud Solutions2015 06-02 Improving ROI with IT Cloud Solutions
2015 06-02 Improving ROI with IT Cloud Solutions
 
2016-03-29 Audit & Finance Committees
2016-03-29 Audit & Finance Committees2016-03-29 Audit & Finance Committees
2016-03-29 Audit & Finance Committees
 
2015 04-21 Assessing Your Organization's Sustainability
2015 04-21 Assessing Your Organization's Sustainability2015 04-21 Assessing Your Organization's Sustainability
2015 04-21 Assessing Your Organization's Sustainability
 
2015-03-10 internal ceo succession
2015-03-10 internal ceo succession2015-03-10 internal ceo succession
2015-03-10 internal ceo succession
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
2015-02-03 Self-Insurance Under the ACA
2015-02-03 Self-Insurance Under the ACA2015-02-03 Self-Insurance Under the ACA
2015-02-03 Self-Insurance Under the ACA
 
2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection Act
2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection Act2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection Act
2015-03-26 Minimum Wage, Overtime Expansion and DC Wage Theft Protection Act
 
2015-09-08 Preparing Your Organization and Yourself for a Successful Transition
2015-09-08 Preparing Your Organization and Yourself for a Successful Transition2015-09-08 Preparing Your Organization and Yourself for a Successful Transition
2015-09-08 Preparing Your Organization and Yourself for a Successful Transition
 
2015-01-29 Generating Corporate Sponsorship Support
2015-01-29 Generating Corporate Sponsorship Support2015-01-29 Generating Corporate Sponsorship Support
2015-01-29 Generating Corporate Sponsorship Support
 
2015-02-05 Fundraising for the Small Shop
2015-02-05 Fundraising for the Small Shop2015-02-05 Fundraising for the Small Shop
2015-02-05 Fundraising for the Small Shop
 
2015-06-25 Trending Topics in Employee Benefit Plans
2015-06-25 Trending Topics in Employee Benefit Plans2015-06-25 Trending Topics in Employee Benefit Plans
2015-06-25 Trending Topics in Employee Benefit Plans
 

Similar to 2015-06-16 IT Security - What You Need to Know

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionTransUnion
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUResilient Systems
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursMotherGuardians
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)Jan Wong
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 

Similar to 2015-06-16 IT Security - What You Need to Know (20)

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to PreventionLunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
ke-1.pptx
ke-1.pptxke-1.pptx
ke-1.pptx
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 

More from Raffa Learning Community

2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIO2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIORaffa Learning Community
 
2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuity2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuityRaffa Learning Community
 
2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison Seminar2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison SeminarRaffa Learning Community
 
2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue Recognition2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue RecognitionRaffa Learning Community
 
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...Raffa Learning Community
 
2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar 2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar Raffa Learning Community
 
2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End Close2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End CloseRaffa Learning Community
 
4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self Awareness4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self AwarenessRaffa Learning Community
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIORaffa Learning Community
 
2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?Raffa Learning Community
 
2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best Practices2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best PracticesRaffa Learning Community
 
2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIO2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIORaffa Learning Community
 
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!Raffa Learning Community
 

More from Raffa Learning Community (20)

2018-11-29 Intacct for Nonprofits
2018-11-29 Intacct for Nonprofits2018-11-29 Intacct for Nonprofits
2018-11-29 Intacct for Nonprofits
 
2018-11-15 IT Assessment
2018-11-15 IT Assessment2018-11-15 IT Assessment
2018-11-15 IT Assessment
 
2018-11-15 Compliance Issues
2018-11-15 Compliance Issues2018-11-15 Compliance Issues
2018-11-15 Compliance Issues
 
2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIO2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIO
 
2018-9-26 Federal Funding
2018-9-26 Federal Funding2018-9-26 Federal Funding
2018-9-26 Federal Funding
 
2018-09-25 Sage Intacct for Nonprofits
2018-09-25 Sage Intacct for Nonprofits2018-09-25 Sage Intacct for Nonprofits
2018-09-25 Sage Intacct for Nonprofits
 
2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuity2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuity
 
2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison Seminar2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison Seminar
 
2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue Recognition2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue Recognition
 
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
 
2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar 2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar
 
2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End Close2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End Close
 
2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO
 
2018-05-31 A New Look for Nonprofits
2018-05-31 A New Look for Nonprofits2018-05-31 A New Look for Nonprofits
2018-05-31 A New Look for Nonprofits
 
4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self Awareness4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self Awareness
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO
 
2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?
 
2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best Practices2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best Practices
 
2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIO2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIO
 
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
 

2015-06-16 IT Security - What You Need to Know

  • 1. Thrive. Grow. Achieve. IT Security 101 Nate Solloway, CEH, E|CSA June 15, 2015
  • 2. WHAT’S ON TAP? • Passing the Security Portion of Your Financial Audit • Assessing Security Vulnerabilities • Security in the Cloud • Privacy Laws • Q&A 2
  • 3. WHO’S A CFO? RAISE YOUR HAND 3 Computer Operations Are system and application data backed up? What is the frequency? How and where are the backups stored? What is the frequency in which backups are tested? What restrictions are placed, if any, to access to the computer room and any computer equipment, telecommunication equipment and data files?
  • 4. To what extent is the computer room and any computer equipment, telecommunication equipment and data files protected from environmental hazards? To what extent are security management practices in place to support the IT functions and infrastructure? How are modifications to user access privileges performed and authorized? How is IT security monitored? To what extent are logs of security activity created and maintained? Are User IDs and passwords used for individual user authentication to gain access to the company applications and financial systems? Do user passwords require strong complexity controls (i.e.: length, expiration, history, sessions, timeouts, and special restrictions). Does the client have access to the source code for any accounting system modifications made for them? 4
  • 5. ASSESSING VULNERABILITIES 5 VULNERABILITY MAPPING VS. PENETRATION TESTING TOOLS ARE AWESOME, BUT…. AUTOMATED SCRIPTS, FALSE POSITIVES HOW MUCH INTELLIGENCE DO YOU NEED?
  • 6. HOW THE BAD GUYS EXPLOIT THEM 6
  • 9. BUT EXPLOITING IS HARD, RIGHT? 9
  • 10. COMMON VULNERABILITIES 10 OPEN PORTS PEOPLE LAZY SOFTWARE PATCHING PEOPLE OUT DATE AV/IDS PEOPLE LAZY PROCESSES FOR CRITICAL AUTHENTICATION (BANKS, TRANSFERS) PEOPLE
  • 11. CLIENT SIDE VULNERABILITIES CLIENT SIDE VULNERABILITIES ARE NOT ALWAYS EASY TO IDENTIFY. SOME COMMON CLIENT SIDE ATTACK AGENTS INCLUDE: - ADOBE READER - WINZIP - ITUNES - INTERNET EXPLORER - FIREFOX - SAFARI - ADOBE FLASH PLAYER 11
  • 12. WHAT IS PENETRATION TESTING? BLACK BOX - APPROACHING THINGS JUST LIKE AN UNIFORMED ATTACKER - REQUIRES NO REVELATION OF SECURITY WHITE BOX - USING KNOWLEDGE OF THE SYSTEMS TO ELABORATE TEST CASES - PROVIDES AS MUCH INFORMATION AS POSSIBLE TO THE PENETRATION TEST TO THAT THEY CAN GAIN INSIGHT AND CREATE TESTS HOST BASED ASSESSMENTS - MAKE A COPY OF YOUR SERVERS. TEST ON THEM WITH FULL ACCESS LOOKING FOR VULNERABILITIES 12
  • 13. WHAT DOES A REPORT DELIVER? A SECURITY ASSESSMENT DELIVERS A REPORT THAT • HELPS EXECUTIVES MAKE DECISIONS ON IMPLEMENTING SECURITY CONTROLS • HELP THE IT TEAM IMPLEMENT CONTROLS AND PATCH FLAWS DISCOVERED DURING TESTING • LOW • MED • HIGH • SERIOUS • CRITICAL 13
  • 14. SECURITY IS A BUSINESS DECISION 14
  • 15. RISK IS A BUSINESS DECISION 15
  • 17. PRIVACY (GAPP) PERSONAL INFORMATION COLLECTED ON EMPLOYEES • NAME • ADDRESS • PHONE NUMBERS • SOCIAL SECURITY NUMBER • BANK ACCOUNT AND ROUTING NUMBERS. 17
  • 18. EXTERNAL DATA COLLECTION NAMES • ADDRESSES OR GEOGRAPHIC IDENTIFIERS SMALLER THAN A STATE • PHONE NUMBERS • FAX NUMBERS • EMAIL ADDRESSES • SOCIAL SECURITY NUMBERS • CREDIT CARD ACCOUNT NUMBERS • WEB ADDRESSES • PHOTOGRAPHIC IMAGES 18
  • 19. WHAT’S A BREACH? FIRST NAME OR FIRST INITIAL AND LAST NAME IN COMBINATION WITH ANY OF THE FOLLOWING • SOCIAL SECURITY NUMBER • HOME ADDRESS • EMAIL ADDRESS • PHONE NUMBERS • CREDIT CARD ACCOUNT NUMBERS 19
  • 20. INCIDENTS REQUIRING NOTIFICATION • A USER (EMPLOYEE, CONTRACTOR OR THIRD PARTY PROVIDER) HAS OBTAINED UNAUTHORIZED ACCESS TO PERSONAL INFORMATION MAINTAINED IN EITHER PAPER OR ELECTRONIC FORM • AN INTRUDER HAS ACCESSED DATABASE(S) SUCH AS THAT CONTAIN PERSONAL INFORMATION ON AN INDIVIDUAL. • COMPUTER EQUIPMENT SUCH AS A WORKSTATION, LAPTOP, CD- ROM OR OTHER ELECTRONIC MEDIA CONTAINING PERSONAL INFORMATION ON AN INDIVIDUAL HAS BEEN LOST OR STOLEN. • A DEPARTMENT OR UNIT HAS NOT PROPERLY DISPOSED OF RECORDS CONTAINING PERSONAL INFORMATION ABOUT AN INDIVIDUAL. • A THIRD-PARTY SERVICE PROVIDER HAS EXPERIENCED ANY OF THE INCIDENTS ABOVE, AFFECTING THE ORGANIZATION’S DATACONTAINING PERSONAL INFORMATION. 20
  • 22. 22 MINIMIZING OPEN PORTS - FEWER SERVICES? - MAYBE THE CLOUD PEOPLE - LET’S GET BACK TO THIS ONE AGGRESSIVE SOFTWARE PATCHING - SERVERS - WORKSTATIONS - APPS AV VS IDS AUTHENTICATION PEOPLE
  • 23. QUESTIONS? 23 Nate Solloway – Manager nsolloway@raffa.com Seth Zarny – Partner szarny@raffa.com Evette Collins – Account Executive ecollins@raffa.com