SlideShare a Scribd company logo
1 of 19
Building your Social Engineering
Awareness Program
Dave Keene
Wells Fargo
Information Security Engineer
May 7, 2015
11
Agenda
 Definition of Social Engineering and why it is effective
 Recent Examples
 Social Engineering Techniques
 Building Your Awareness Program
 Testing Your Awareness Program
 Remediation
22
Social Engineering Defined
 Social Engineering is the practical application of
manipulation and deception against the human element
 Relies on instinctive trust in people, a trust that is a
survival tactic as part of human evolution
– Think about your youth, things you were taught
• Politeness
• Kindness
• Sense of community
33
Why does Social Engineering work?
 Techniques used leverage this ingrained vulnerability of
trust
 In other words, this is a zero day exploit with no patch
on the horizon
 Like any other security risk, there are mitigating
controls
44
Recent Examples of Social Engineering
 Hospital Sues Bank of America Over Million-Dollar
Cyber heist – Krebs On Security
– “A Bank of America employee, contacted the Chelan County Treasurer’s office later
that morning and asked if a pending transfer request of $603,575.00 was
authorized,” … an employee in the Chelan County Treasurer’s Office, responded
immediately that the $603,575.00 transfer request was not authorized.
Nonetheless, Bank of America processed the $603,575.00 transfer request and
transferred the funds as directed by the hackers.”
 Anthem – Tom DeSot, Digital Defense
– “It is highly possible that they are preparing for another attack, such as
a social engineering or phishing attack, that may give them access
to systems that they were unable to reach,”
55
Social Engineering Techniques
 Phishing
– Using crafted emails to manipulate a person into doing
something other than what they would normally do
 Voice Phishing (Vishing)
– Traditional use of phone calls to convince a person to
disclose information
 SMS Phishing (Smishing)
– Text messages with links that lead to charges on phone
bill
66
Social Engineering Techniques
 Flyer drops
– Flyers with enticing advertisements that lead people to
manually entering a link into their browser
 Removable media drops
– CDs/DVDs labeled with interesting possible contents, USB
drives
– Content included contains malware, some of which can be
made undetectable by anti-virus
77
Building Your Education Program
Create you policies and reporting processes
 Before instruction can begin, you must have basic
policies in place for employees to understand
– Acceptable Use Policy
– Social Media Use Policy
 Employees need a way to report Social Engineering
attempts
– Phishing mail box
– Phone line or voicemail box
• Monitoring and response is key!
88
Building Your Education Program
Phishing Education
 Teach users how to spot a phishing email
 Unify communications and reduce use of email blasts to
all employees
99
Building Your Education Program
Vishing Education
 Educate users about voice calls
– Phone numbers are easily spoofed
 Caller authentication
– Programs that will allow a challenge/response to ensure
the caller is authentic
1010
Building Your Education Program
Smishing Education
 Alert users to what smishing is, as it is not a commonly
used term
 Disable short codes on company phones, or restrict
short codes to require an additional PIN
1111
Building Your Education Program
Flyer Drop Education
 Don’t keep a sterile work environment
 Don’t allow flyers with shortened links
 Have someone designated to check flyers for validity
1212
Building Your Education Program
Media Drop Education
 Make users aware of the risk of enticing USB keys or
other media that appears to have exciting/sensitive
data
 Don’t allow unknown media into corporate computers,
or at minimum don’t allow files to be executed
– Restrict to certain USB identifiers or encrypted only
devices to be used on corporate systems
– Use Endpoint protection
1313
Testing Your Education Program
Phish your employees
 Use phishing software to phish employees
– Change the difficultly in spotting the phish, starting with
obvious then gradually removing obvious phish identifiers
• First phish contains gratuitous spelling mistakes, sense of
urgency, invalid sender and/or receiver, bogus URLs, etc.
• Each level reduces the phishing elements making the phish
harder to spot and reinforcing training
 While there are open source phishing software, larger
organizations may need assistance from phishing service
providers and/or development of tools to assist in phishing
1414
Testing Your Education Program
Vish your employees
 This may take more effort as vishing is a live
manipulation exercise
– Find someone outside of the organization willing to assist
 Many security firms offer these services as this is a
specialized skill yet highly important due to
effectiveness
1515
Testing Your Education Program
Test flyer and removable media drops
 Create internal tracking that can detect when users:
– Enter the flyer URL
– Execute removable media
 Engage your technical staff for assistance, there are
tutorials on tracking with open source software for
testing your programs effectiveness
1616
Remediate when training fails
 Don’t just track failure, make sure you notify
employees if they put the company at risk
 Engage legal and HR for advise on repeat offenses
 Remember there is no perfect solution, there will still
be a small percentage that fall for these every time
– Investigate on restricting these users due to repeat
offenses
1717
Summary
 Definition of Social Engineering and why it is effective
 Recent Examples
 Social Engineering Techniques
 Building Your Awareness Program
 Testing Your Awareness Program
 Remediation
1818
Questions?
People are the weakest link in a security practice, but
properly trained can become the strongest asset in
protecting your company
Insert Sun Tzu quote here

More Related Content

What's hot

The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communicationSnapComms
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security TrainingAngela Samuels
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessAnkitaKale12
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
·  The write up should be at most 1,000-words (12-point font, 1.5 sp
·  The write up should be at most 1,000-words (12-point font, 1.5 sp·  The write up should be at most 1,000-words (12-point font, 1.5 sp
·  The write up should be at most 1,000-words (12-point font, 1.5 spSANSKAR20
 

What's hot (20)

The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016 Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen TestingPACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
PACE-IT, Security+3.8: Vulnerability Scanning vs Pen Testing
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
LSC Tech Baselines
LSC Tech BaselinesLSC Tech Baselines
LSC Tech Baselines
 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 3)
 
PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)PACE-IT: Common Threats (part 2)
PACE-IT: Common Threats (part 2)
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your business
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)PACE-IT, Security+1.4: Common Network Protocols (part 3)
PACE-IT, Security+1.4: Common Network Protocols (part 3)
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
·  The write up should be at most 1,000-words (12-point font, 1.5 sp
·  The write up should be at most 1,000-words (12-point font, 1.5 sp·  The write up should be at most 1,000-words (12-point font, 1.5 sp
·  The write up should be at most 1,000-words (12-point font, 1.5 sp
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
PACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response ConceptsPACE-IT, Security+ 2.5: Incident Response Concepts
PACE-IT, Security+ 2.5: Incident Response Concepts
 

Similar to Building your social engineering awareness program

Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfahmad661583
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Shannon Gregg, MBA
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmcanpaksolutions04
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Ruth Edmonds
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdfFiyona Nourin
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksFitCEO, Inc. (FCI)
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]Tim Rhodes
 

Similar to Building your social engineering awareness program (20)

Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109Assets Protection Course_I_BR_1109
Assets Protection Course_I_BR_1109
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]Social Engineering Presentation 2008 Linkedin[1]
Social Engineering Presentation 2008 Linkedin[1]
 

Building your social engineering awareness program

  • 1. Building your Social Engineering Awareness Program Dave Keene Wells Fargo Information Security Engineer May 7, 2015
  • 2. 11 Agenda  Definition of Social Engineering and why it is effective  Recent Examples  Social Engineering Techniques  Building Your Awareness Program  Testing Your Awareness Program  Remediation
  • 3. 22 Social Engineering Defined  Social Engineering is the practical application of manipulation and deception against the human element  Relies on instinctive trust in people, a trust that is a survival tactic as part of human evolution – Think about your youth, things you were taught • Politeness • Kindness • Sense of community
  • 4. 33 Why does Social Engineering work?  Techniques used leverage this ingrained vulnerability of trust  In other words, this is a zero day exploit with no patch on the horizon  Like any other security risk, there are mitigating controls
  • 5. 44 Recent Examples of Social Engineering  Hospital Sues Bank of America Over Million-Dollar Cyber heist – Krebs On Security – “A Bank of America employee, contacted the Chelan County Treasurer’s office later that morning and asked if a pending transfer request of $603,575.00 was authorized,” … an employee in the Chelan County Treasurer’s Office, responded immediately that the $603,575.00 transfer request was not authorized. Nonetheless, Bank of America processed the $603,575.00 transfer request and transferred the funds as directed by the hackers.”  Anthem – Tom DeSot, Digital Defense – “It is highly possible that they are preparing for another attack, such as a social engineering or phishing attack, that may give them access to systems that they were unable to reach,”
  • 6. 55 Social Engineering Techniques  Phishing – Using crafted emails to manipulate a person into doing something other than what they would normally do  Voice Phishing (Vishing) – Traditional use of phone calls to convince a person to disclose information  SMS Phishing (Smishing) – Text messages with links that lead to charges on phone bill
  • 7. 66 Social Engineering Techniques  Flyer drops – Flyers with enticing advertisements that lead people to manually entering a link into their browser  Removable media drops – CDs/DVDs labeled with interesting possible contents, USB drives – Content included contains malware, some of which can be made undetectable by anti-virus
  • 8. 77 Building Your Education Program Create you policies and reporting processes  Before instruction can begin, you must have basic policies in place for employees to understand – Acceptable Use Policy – Social Media Use Policy  Employees need a way to report Social Engineering attempts – Phishing mail box – Phone line or voicemail box • Monitoring and response is key!
  • 9. 88 Building Your Education Program Phishing Education  Teach users how to spot a phishing email  Unify communications and reduce use of email blasts to all employees
  • 10. 99 Building Your Education Program Vishing Education  Educate users about voice calls – Phone numbers are easily spoofed  Caller authentication – Programs that will allow a challenge/response to ensure the caller is authentic
  • 11. 1010 Building Your Education Program Smishing Education  Alert users to what smishing is, as it is not a commonly used term  Disable short codes on company phones, or restrict short codes to require an additional PIN
  • 12. 1111 Building Your Education Program Flyer Drop Education  Don’t keep a sterile work environment  Don’t allow flyers with shortened links  Have someone designated to check flyers for validity
  • 13. 1212 Building Your Education Program Media Drop Education  Make users aware of the risk of enticing USB keys or other media that appears to have exciting/sensitive data  Don’t allow unknown media into corporate computers, or at minimum don’t allow files to be executed – Restrict to certain USB identifiers or encrypted only devices to be used on corporate systems – Use Endpoint protection
  • 14. 1313 Testing Your Education Program Phish your employees  Use phishing software to phish employees – Change the difficultly in spotting the phish, starting with obvious then gradually removing obvious phish identifiers • First phish contains gratuitous spelling mistakes, sense of urgency, invalid sender and/or receiver, bogus URLs, etc. • Each level reduces the phishing elements making the phish harder to spot and reinforcing training  While there are open source phishing software, larger organizations may need assistance from phishing service providers and/or development of tools to assist in phishing
  • 15. 1414 Testing Your Education Program Vish your employees  This may take more effort as vishing is a live manipulation exercise – Find someone outside of the organization willing to assist  Many security firms offer these services as this is a specialized skill yet highly important due to effectiveness
  • 16. 1515 Testing Your Education Program Test flyer and removable media drops  Create internal tracking that can detect when users: – Enter the flyer URL – Execute removable media  Engage your technical staff for assistance, there are tutorials on tracking with open source software for testing your programs effectiveness
  • 17. 1616 Remediate when training fails  Don’t just track failure, make sure you notify employees if they put the company at risk  Engage legal and HR for advise on repeat offenses  Remember there is no perfect solution, there will still be a small percentage that fall for these every time – Investigate on restricting these users due to repeat offenses
  • 18. 1717 Summary  Definition of Social Engineering and why it is effective  Recent Examples  Social Engineering Techniques  Building Your Awareness Program  Testing Your Awareness Program  Remediation
  • 19. 1818 Questions? People are the weakest link in a security practice, but properly trained can become the strongest asset in protecting your company Insert Sun Tzu quote here

Editor's Notes

  1. “A Bank of America employee, contacted the Chelan County Treasurer’s office later that morning and asked if a pending transfer request of $603,575.00 was authorized,” the complaint reads. “No funds had been transferred at the time of the phone call.  Theresa Pinneo, an employee in the Chelan County Treasurer’s Office, responded immediately that the $603,575.00 transfer request was not authorized. Nonetheless, Bank of America processed the $603,575.00 transfer request and transferred the funds as directed by the hackers.” “It is highly possible that they are preparing for another attack, such as a social engineering or phishing attack, that may give them access to systems that they were unable to reach,” said Tom DeSot, chief information officer of cybersecurity firm Digital Defense Inc. in San Antonio.
  2. FIX