SlideShare a Scribd company logo
1 of 10
AN INFOSEC WATERSHED MOMENT
Rob Ferrill, CISO UAB Health System
DEFINITION
wa·ter·shed
/ˈwôdərˌSHed,ˈwädərˌSHed/
1. An event or period marking a turning point in a course of action or state of affairs.
2. Synonyms: turning point, milestone, landmark
HIJACKINGS
• What would you surmise the mindset of the pilot / crew / passengers if a plane was
hijacked prior to 9/11?
• How did 9/11 change that mindset?
• What security controls exist today that didn’t exist prior to 9/11? (next slide)
• What priority was this given after 9/11?
• Shortly after the terrorist attack on the United States, President Bush provided twenty
billion dollars for the upgrading of intelligence and security
http://www.ifpo.org/resource-links/articles-and-reports/protection-of-specific-environments/the-evolution-of-airline-security-since-911/
WATERSHED MOMENT FOR AIRLINES
• The biggest change was the creation of the TSA just months after 9/11
• Identification requirements: ID must be presented, name must match ticket
• Shoe removal: Most travelers must remove shoes at checkpoints
• Baggage: All baggage whether carry-on and checked must be screened
• Liquid ban: No liquids allowed through security in containers larger than 3.4
ounces
• Special items: Most travelers must remove toiletries and laptops from bags
• Jackets: Most travelers must remove outerwear during screening
• Enhanced pat-downs: This extra screening is sometimes administered
• No welcome committees: Only ticketed travelers are now allowed at airline gate
areas
• Cockpit doors: These have been reinforced and stay locked during flights
https://www.farecompare.com/travel-advice/9-ways-security-has-changed-since-911/
INFOSEC WATERSHED EVENTS
International Event
• August 15th, 2012 – Saudi Aramco –
Shamoon malware partially wiped or totally
destroyed the hard drives of 35,000
company computers
Domestic Event
• On November 24th, 2014 – Sony Pictures
Entertainment was breached seemingly by
the GOP (Guardians of Peace) and had over
100 terabytes of data stolen
https://www.darkreading.com/attacks-breaches/inside-the-aftermath-of-the-saudi-aramco-breach/d/d-id/1321676
https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-sony-implemented-36022
WHAT ARE THE RECENT THREATS?
WannaCry – May 12th, 2017
• True ransomware propagating using
EternalBlue exploiting MS17-010
• Wannacry crippled computers in at least
150 countries and economic losses are
estimated at $4 billion
• Motive… financial gain?
Companies Affected
• UK’s National Health Service
• US hospitals (undisclosed)
• FedEx
• Nissan
• Renault
• Hitachi
• Russia (banks, telecom, railway, etc.)
• Police in one Indian state
• Universities in China (over 100k pc’s)
• Chinese police
ANOTHER RECENT THREAT
NotPetya – June 27th 2017
• Destructive “wiper” malware
• Propagation also using EternalBlue
exploiting MS17-010
• Motive… disruption, maybe nation state
testing the waters?
Companies Affected
• Major healthcare vendor (Nuance)
affected by NotPetya ($30m loss)
• Portion of FedEx affected (Intl shipping)
”may never be recovered” $300m
• Maersk shipping indicated a $200m-$300m
loss
• Merck allegedly had 90,000 machines
affected
HOW TO DEFEND?
• If you happen to be in Healthcare… HHS states that ransomware is automatically
considered a breach until proven otherwise; setup a process to engage third
party forensics to analyze and offer a risk assessment of the probability of a
breach
• An incident response plan should be in place to respond quickly with specific
steps to follow in the event of ransomware
• Communicate as quickly as possible when an infection like ransomware occurs
so that appropriate teams can engage and hopefully avoid costly issues
• Patch your systems, verify patching is working through vulnerability scans,
segment your high risk and critical systems off user networks
• Continuous monitoring of network activities, file movements, threat detection
and correlating these events is essential
• Continuous assessment of risk culminating in the remediation or acceptance of
identified vulnerabilities via a plan of action
WILL WE EVER LEARN?
• To quote a colleague in the industry… “look at what happened to Home Depot,
Target, TJ Maxx. Everyone still shops there. Maybe they had a temporary dip, but
no permanent damage”
• From a discussion at the 2017 Cyber Summit in Cambridge, Mass last week…
“Nobody will take security seriously until they’re hurt in new ways”.
https://www.cnbc.com/2017/10/09/greylocks-sarah-guo-us-doest-take-data-security-seriously-enough.html
Q&A
• Any questions?

More Related Content

Similar to An infosec watershed moment

CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussionRussell Publishing
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSReputelligence
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsMaganathin Veeraragaloo
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsKristian Alisasis Pura
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxharrisonhoward80223
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 

Similar to An infosec watershed moment (20)

CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Airport security 2013 cyber security panel discussion
Airport security 2013   cyber security panel discussionAirport security 2013   cyber security panel discussion
Airport security 2013 cyber security panel discussion
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

An infosec watershed moment

  • 1. AN INFOSEC WATERSHED MOMENT Rob Ferrill, CISO UAB Health System
  • 2. DEFINITION wa·ter·shed /ˈwôdərˌSHed,ˈwädərˌSHed/ 1. An event or period marking a turning point in a course of action or state of affairs. 2. Synonyms: turning point, milestone, landmark
  • 3. HIJACKINGS • What would you surmise the mindset of the pilot / crew / passengers if a plane was hijacked prior to 9/11? • How did 9/11 change that mindset? • What security controls exist today that didn’t exist prior to 9/11? (next slide) • What priority was this given after 9/11? • Shortly after the terrorist attack on the United States, President Bush provided twenty billion dollars for the upgrading of intelligence and security http://www.ifpo.org/resource-links/articles-and-reports/protection-of-specific-environments/the-evolution-of-airline-security-since-911/
  • 4. WATERSHED MOMENT FOR AIRLINES • The biggest change was the creation of the TSA just months after 9/11 • Identification requirements: ID must be presented, name must match ticket • Shoe removal: Most travelers must remove shoes at checkpoints • Baggage: All baggage whether carry-on and checked must be screened • Liquid ban: No liquids allowed through security in containers larger than 3.4 ounces • Special items: Most travelers must remove toiletries and laptops from bags • Jackets: Most travelers must remove outerwear during screening • Enhanced pat-downs: This extra screening is sometimes administered • No welcome committees: Only ticketed travelers are now allowed at airline gate areas • Cockpit doors: These have been reinforced and stay locked during flights https://www.farecompare.com/travel-advice/9-ways-security-has-changed-since-911/
  • 5. INFOSEC WATERSHED EVENTS International Event • August 15th, 2012 – Saudi Aramco – Shamoon malware partially wiped or totally destroyed the hard drives of 35,000 company computers Domestic Event • On November 24th, 2014 – Sony Pictures Entertainment was breached seemingly by the GOP (Guardians of Peace) and had over 100 terabytes of data stolen https://www.darkreading.com/attacks-breaches/inside-the-aftermath-of-the-saudi-aramco-breach/d/d-id/1321676 https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-sony-implemented-36022
  • 6. WHAT ARE THE RECENT THREATS? WannaCry – May 12th, 2017 • True ransomware propagating using EternalBlue exploiting MS17-010 • Wannacry crippled computers in at least 150 countries and economic losses are estimated at $4 billion • Motive… financial gain? Companies Affected • UK’s National Health Service • US hospitals (undisclosed) • FedEx • Nissan • Renault • Hitachi • Russia (banks, telecom, railway, etc.) • Police in one Indian state • Universities in China (over 100k pc’s) • Chinese police
  • 7. ANOTHER RECENT THREAT NotPetya – June 27th 2017 • Destructive “wiper” malware • Propagation also using EternalBlue exploiting MS17-010 • Motive… disruption, maybe nation state testing the waters? Companies Affected • Major healthcare vendor (Nuance) affected by NotPetya ($30m loss) • Portion of FedEx affected (Intl shipping) ”may never be recovered” $300m • Maersk shipping indicated a $200m-$300m loss • Merck allegedly had 90,000 machines affected
  • 8. HOW TO DEFEND? • If you happen to be in Healthcare… HHS states that ransomware is automatically considered a breach until proven otherwise; setup a process to engage third party forensics to analyze and offer a risk assessment of the probability of a breach • An incident response plan should be in place to respond quickly with specific steps to follow in the event of ransomware • Communicate as quickly as possible when an infection like ransomware occurs so that appropriate teams can engage and hopefully avoid costly issues • Patch your systems, verify patching is working through vulnerability scans, segment your high risk and critical systems off user networks • Continuous monitoring of network activities, file movements, threat detection and correlating these events is essential • Continuous assessment of risk culminating in the remediation or acceptance of identified vulnerabilities via a plan of action
  • 9. WILL WE EVER LEARN? • To quote a colleague in the industry… “look at what happened to Home Depot, Target, TJ Maxx. Everyone still shops there. Maybe they had a temporary dip, but no permanent damage” • From a discussion at the 2017 Cyber Summit in Cambridge, Mass last week… “Nobody will take security seriously until they’re hurt in new ways”. https://www.cnbc.com/2017/10/09/greylocks-sarah-guo-us-doest-take-data-security-seriously-enough.html

Editor's Notes

  1. Prior to 9/11, I would assume a pilot might think a hijacking would end up with some terrorists demanding a ransom and most everyone on board goes home unscathed so to speak. After 9/11, I would assume everyone on board would think their plane has just turned into a weapon and they may not live much longer
  2. In 2012, the Saudi Aramco event started with an employee clicking a link in a spear-phishing email. The timing of the event was specific to Ramadan when the miscreants knew the IT staff would be limited. A group calling itself the “Cutting Sword of Justice” claimed responsibility At risk here was potentially the 9.4 million barrels of oil a day supplied by this company. 10% of the worlds oil supply was at risk Aramco utilized its private fleet of airplanes to fly employees directly to factory floors in Southeast Asia where they could procure 50,000 hard drives Their corporate office was offline for 5 months. This event should have rocked our world in terms of information security controls having top priority in our companies, especially within IT, but it seems to been shrugged off as an isolated attack that “won’t happen to us”. In 2014, the Sony event, it seemed to me that the public perception of this was a targeted attack by “seemingly” North Korea as retribution for the movie they were producing that depicted an assassination attempt on their leader (even though attribution has landed on multiple groups being possibly responsible). With that said, I’m guessing leadership in most organizations didn’t feel threatened by this because it was so politically motivated. Either way, it was devastating to the company: It’s believed that user account credentials were harvested early on in this breach and that the malware used had these credentials imbedded for a high likelihood of success The wiper malware activated and wiped around 9-10,000 machines Basic operations were established again after 45 days and everything else was rebuilt over the next 18 months The “Destover” malware seemed to be tied to N Korea but that same tool has been used in other instances It appeared that the wipe may have come from one group and the data leaks from another Basically everything was stolen and leaked… personal data on employees, movies and scripts, performance reports and salary info, source code, private keys, passwords, certificates, production schedules, box office projections, executives emails, Brad Pitt’s phone number, and more!
  3. These incidents that happened this year that affected US companies so greatly have been a game changer for many executives that serve in leadership for corporate America. For many, this will be the tipping point where they begin to adequately staff and fund the information security programs of their organizations. Due to the fact that these NSA tools are still being disclosed over time, these events may just be a precursor to much bigger issues in the future.
  4. Started in the Ukraine and spread like wildfire.
  5. On third bullet, I say hopefully because we have info directly from one of the companies affected by NotPetya that all of their systems that were affected happened in 10 minutes. On fourth bullet, I totally understand the difficulty of staying up to date on all patches. It is not easy! Trying to take clinical systems offline for patching is a challenge. Medical devices are another challenge, especially when there are FDA regulations.
  6. I guarantee you that these companies affected by WannaCry and NotPetya have a new perspective on priorities in their organization. The thing is… we can’t live in fear of these miscreants or what might happen. People like me have to explain to the leaders of our companies how this can happen, how it can be prevented, and quickly get to that state if you are not there. Everything happens for a reason… I truly believe that and I know the One who’s in control, so I sleep pretty good at night. Thanks for your time! Any questions?