SlideShare a Scribd company logo
Restricting
Authenticating
Tracking
User Access?
Time Is Not
On Our Side!
12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191
Just like Lucifer, the Dark Net is known by many names with only subtle
differences in meaning: the Dark Web, the Digital Underground, and the
Deep Web, to name a few. Dark Net sites are difficult to find because they do
not show up in normal search engines, but they are accessible through TOR
or Tails. At their core these sites are meant to serve one purpose: enable
privacy and free speech on the Internet. Unfortunately, they also provide
fertile ground for illegal activities, such as selling contraband drugs, firearms,
and stolen data, as well as much worse crimes.
When you hear a news story about yet another data breach, you can be confi-
dent the stolen data will be available on the Dark Net, on information broker-
age sites known as Dark Markets. Some of these Dark Markets trade in stolen
data (credit cards, Social Security numbers, personally identifiable information,
protected health information, and so forth). Figure 1 below depicts a Dark
Market welcome page offering bank account information; and Figure 2
displays a list of prices for chipped and magnetic-only credit cards.
Figure 1 – Screenshot Example of an Illegal Dark Market Site
Dark Net
The Devil is in the Details
“At their core these
sites are meant to
serve one purpose:
enable privacy and
free speech....”
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
Figure 2 – Screenshot of an Illegal Dark Market Pricing Page
VIMRO security team members are often asked, “Why would a criminal
want our data and how could they use it?” Criminals want whatever data
we have, and they will find a use for it all. It may seem insignificant at
first glance, but each bit of data (email accounts, social media accounts,
passwords, birthdays, mothers’ maiden names, addresses, workplaces,
prescribed medications, and so on) can add up to be worth $1,000(1) in
a Dark Market; and the more data available on one individual, the more
money that data is worth to Dark Market dealers.
The Dark Market has made it easy for criminals without hacking skills to
get what they want: they simply hire someone to do the dirty work for
them. Hackers for hire wait on the Dark Net, ready to commit various
Internet crimes for the right price. This makes all organizations — and
individuals — potential hacking victims. Figure 3 is an example of one
hacker’s service menu.
Figure 3 – Hacker for Hire Example
Dark Net
The Devil is in the Details
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
“The Dark Market has
made it easy for
criminals without
hacking skills to get
what they want.....”
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
Some of these criminals are willing to do whatever the buyer asks, such
as perform DDOS attacks, corporate espionage, hacktivism, and so
forth. And it’s easy and simple to pay for these crimes! You may have
noticed the symbol in the Price column of Figure 3. This is one of the
symbols for Bitcoin(2), whose guarantee of anonymity for both buyer and
seller has made it the common currency of the Dark Market.
The Dark Net has made cybercrime seem safe and easy, and there is no
permanent solution in sight, at least in the near future. For law enforce-
ment, this means a repeating cycle of stopping one cybercriminal ring
only to move onto the next. As aggressively as the FBI infiltrates and
shuts down Dark Market sites, more sites spring up.
To protect your company, your employees, and your customers from
cybercrime in this volatile environment, you must invest in a good cyber
security program. VIMRO’s approach is a holistic security methodology
that includes the elements in Figure 4.
Dark Net
The Devil is in the Details
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
“As aggrressivly as the
FBI infiltrates and shuts
down Dark Market sites,
MORE sites spring up.”
Authored by VIMRO’s Cybersecurity Leaders
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
Note that for our methodology to succeed, you must adopt it in a con-
trolled manner and treat it as an evolving process. Implementing it too
quickly or without adequate resources may reduce the security program’s
effectiveness and demotivate the team members involved. Here’s an
overview of a VIMRO cyber security system:
Figure 4 – VIMRO’s Cyber Security Enabling Methodology
Dark Net
The Devil is in the Details
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
Implementing quickly
or without adequate
resources will
dangerously
reduce effectiveness.
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
• The foundation of our security system first aligns your organization’s
business needs with your IT security, allowing you to focus on the criti-
cal business applications, systems, and processes that need strong securi-
ty controls. For example, when you implement a new application, include
a security representative in the development of the budget and project
plan. This way, you are assured that time and resources are allocated for
security controls throughout the project; and for support throughout the
new application’s lifecycle. If you overlook security requirements in the
beginning stages of a project, the application and associated systems
may require rework for failure to meet your company’s approved security
standards. And rework, delays or budget excesses invariably reduce your
new application’s ROI.
• The second layer of our foundation includes implementing a security
framework. Many of VIMRO’s clients have adopted either the NIST(3)
Cybersecurity Framework or ISO27001/ISO27002(4).
• Along with the framework, organizations have adopted a cyber securi-
ty Capability Maturity Model (CMM) that provides a strategy to optimize
critical security controls, mechanisms, and processes (Level 5 in the
CMM). The cyber security CMM includes:
• To manage performance leading toward the optimal level (Level 5) in
the security CMM, we recommend Key Performance Indicator (KPI)
metrics. Many clients start with MITRE(5) Cyber Resiliency Metrics.
Dark Net
The Devil is in the Details
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
The methodology
assures the organizations
business needs align
with your security
requirements.
Authored by VIMRO’s Cybersecurity Leaders
o Level 1 – Initial: Processes are unpredictable, poorly controlled
and reactive
o Level 2 – Managed: Processes are characterized for projects and
are still often reactive
o Level 3 – Defined: Processes are characterized for the organiza-
tion and are proactive, taking their procedures from the organiza-
tion’s standards
o Level 4 – Quantitatively Managed: Processes are measured and
controlled
o Level 5 – Optimizing: Focuses on process improvement
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
• VIMRO policies, standards, and procedures include all of the verbiage
necessary to raise your organization to the upper levels of the cyber
security CMM. These are critical to success. Without these, your organi-
zation will not even surpass Level 2 in the security CMM.
• After writing your security policies, standards, and procedures, we
implement technological mechanisms to support your cyber security
program, and train workforce members to apply the requirements of the
formal documents to their practices.
• VIMRO’s risk management program includes continuous evaluation
of your technological mechanisms and processes to validate them, and
find areas which need improvement, so that your company always main-
tains optimized security controls.
Below is an example application of the VIMRO methodology to one
specific security control item: a firewall. The NIST Cybersecurity Frame-
work includes Configuration Management in the family of controls.
Using the firewall as our example:
• An organization includes firewall configuration requirements in a
policy; procedures are written for how the firewall will be implemented
and managed.
• The procedure includes a baseline security assessment vulnerability
report. The baseline is to be updated whenever a change is made on the
firewall.
• The policy, procedure, and baseline report define the controls (CMM
Level 3) for the firewall.
• In order to determine if the company is maintaining controls for the
firewall to meet CMM Level 4, the firewall is audited using KPIs (a
common approach is to conduct firewall configuration audits every six
months).
Dark Net
The Devil is in the Details
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
....the risk management
program includes
continuous evaluation
of your mechanisms
and process to
validate them.
COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS
• Some examples of KPIs include:
• If during firewall configuration audits, some findings do not meet the
KPI requirements, it is an opportunity to determine why this is the case.
Perhaps there are too few people to meet the KPI objectives; perhaps
skillsets are lacking and training on maintaining the firewall is necessary.
For any items that do not meet KPIs, we implement a Corrective Action
Plan (CAP), which sets expectation dates for the resolution of any issues
cited. We conduct an audit immediately after said date to ensure that the
items have been improved based on the CAP. This is an example of an
optimized process (Level 5) for firewall controls practices.
Every layer of the VIMRO Cyber Security Enabling Methodology is
critical for the success of an optimized cyber security risk management
program. Systematic dedication to the process at each level assures a
solid yet dynamic foundation proactively protecting you today and into
the future. Based on this holistic approach, you can be confident that
your cyber security initiatives will enable your organization to meet the
needs to prevent, detect and respond to cybercriminal attacks that try to
harm your business, clients, employees or steal your sensitive data.
Contact VIMRO to discuss the details of our cyber security enabling
methodology, and learn how we help our clients streamline and realize
their cyber security program initiatives.
Dark Net
The Devil is in the Details
(800) 272 0019
Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL
A holistic and synergistic
cyber security enabling
methodology assures
you and your organization
reach the upper levels of
the cyber security CMM.
o There must be a change record for each change made to the
firewall. The acceptable KPI for changes without corresponding
records is 0.
o A vulnerability assessment report must not result in high or
medium scores. The acceptable KPI for high or medium findings
in a vulnerability assessment is 0.

More Related Content

What's hot

Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
Guise Bule
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
Ashish Chauhan
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber Insurance
Joseph Brunsman
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
Meg Weber
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
- Mark - Fullbright
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
Lifeline Data Centers
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
Tracey Ong
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
Δρ. Γιώργος K. Κασάπης
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
Paul Melson
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
NormShield
 

What's hot (20)

Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
The CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber InsuranceThe CPAs Guide to Buying Cyber Insurance
The CPAs Guide to Buying Cyber Insurance
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
 

Viewers also liked

Kevincito
KevincitoKevincito
Kevincito
Jadielvera
 
Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.
Giovanni Vicencini
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
FitCEO, Inc. (FCI)
 
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Marlène Pra
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
kishore rao
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!
FitCEO, Inc. (FCI)
 
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
National Institute of Food and Agriculture
 
Sejarah smk gajah berang
Sejarah smk gajah berangSejarah smk gajah berang
Sejarah smk gajah berangTeh onchew
 
El Periódico (13/03/2013)
El Periódico (13/03/2013)El Periódico (13/03/2013)
El Periódico (13/03/2013)
Francesc Fajula de Quintana
 
CAS State of the Project 2016
CAS State of the Project 2016CAS State of the Project 2016
CAS State of the Project 2016
Misagh Moayyed
 
Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015
are_pay
 
Derecho Concursal y Atraso
Derecho Concursal y AtrasoDerecho Concursal y Atraso
Derecho Concursal y Atraso
YessicaB1
 
Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)
Francesc Fajula de Quintana
 

Viewers also liked (14)

Kevincito
KevincitoKevincito
Kevincito
 
Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.Juego educativo sobre animales en extención.
Juego educativo sobre animales en extención.
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
Mémoire_Marlene_Pra_Acces_au_marche_agriculture_familiale2015
 
Curriculum vitae
Curriculum vitaeCurriculum vitae
Curriculum vitae
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!
 
Redes inalambricas
Redes inalambricasRedes inalambricas
Redes inalambricas
 
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
Large Runoff Flux And Transformation of Particulate Nitrogen (Pn) Following L...
 
Sejarah smk gajah berang
Sejarah smk gajah berangSejarah smk gajah berang
Sejarah smk gajah berang
 
El Periódico (13/03/2013)
El Periódico (13/03/2013)El Periódico (13/03/2013)
El Periódico (13/03/2013)
 
CAS State of the Project 2016
CAS State of the Project 2016CAS State of the Project 2016
CAS State of the Project 2016
 
Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015Sijil pertandingan kebersihan 2015
Sijil pertandingan kebersihan 2015
 
Derecho Concursal y Atraso
Derecho Concursal y AtrasoDerecho Concursal y Atraso
Derecho Concursal y Atraso
 
Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)Entrevista en El Economista (18/022013)
Entrevista en El Economista (18/022013)
 

Similar to Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz

Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Steven Schwartz
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Company Named on Target List for Hacktivist Campaign
Company Named on Target List for Hacktivist CampaignCompany Named on Target List for Hacktivist Campaign
Company Named on Target List for Hacktivist Campaign
Digital Shadows
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
Ulf Mattsson
 
Mom phd
Mom phdMom phd
Mom phd
Anne ndolo
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Configuration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationConfiguration File of Trojan Targets Organization
Configuration File of Trojan Targets Organization
Digital Shadows
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
Joan Weber
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
DMI
 
The only way to survive is to automate your SOC
The only way to survive is to automate your SOCThe only way to survive is to automate your SOC
The only way to survive is to automate your SOC
Roberto Sponchioni
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
In the news
In the newsIn the news
In the news
Rob Wilson
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
TriState Technology
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
Ulf Mattsson
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
joevest
 

Similar to Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz (20)

Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Company Named on Target List for Hacktivist Campaign
Company Named on Target List for Hacktivist CampaignCompany Named on Target List for Hacktivist Campaign
Company Named on Target List for Hacktivist Campaign
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Mom phd
Mom phdMom phd
Mom phd
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Configuration File of Trojan Targets Organization
Configuration File of Trojan Targets OrganizationConfiguration File of Trojan Targets Organization
Configuration File of Trojan Targets Organization
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
The only way to survive is to automate your SOC
The only way to survive is to automate your SOCThe only way to survive is to automate your SOC
The only way to survive is to automate your SOC
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
In the news
In the newsIn the news
In the news
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 

More from FitCEO, Inc. (FCI)

HIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance GuideHIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance Guide
FitCEO, Inc. (FCI)
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
FitCEO, Inc. (FCI)
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
FitCEO, Inc. (FCI)
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119FitCEO, Inc. (FCI)
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15FitCEO, Inc. (FCI)
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119FitCEO, Inc. (FCI)
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
FitCEO, Inc. (FCI)
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119FitCEO, Inc. (FCI)
 
VIMRO Cyber Security Methodology
VIMRO Cyber Security MethodologyVIMRO Cyber Security Methodology
VIMRO Cyber Security Methodology
FitCEO, Inc. (FCI)
 
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
FitCEO, Inc. (FCI)
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
FitCEO, Inc. (FCI)
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to knowFitCEO, Inc. (FCI)
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesFitCEO, Inc. (FCI)
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROFitCEO, Inc. (FCI)
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3FitCEO, Inc. (FCI)
 

More from FitCEO, Inc. (FCI) (18)

HIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance GuideHIPAA and HITECH Compliance Guide
HIPAA and HITECH Compliance Guide
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
TheDemystification_of_SuccessfulCyberSecurity_VIMRO_LB_VH_MHF_10_11_15
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
Cyber security audits and risk management 2016
Cyber security audits and risk management 2016Cyber security audits and risk management 2016
Cyber security audits and risk management 2016
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
VIMRO Cyber Security Methodology
VIMRO Cyber Security MethodologyVIMRO Cyber Security Methodology
VIMRO Cyber Security Methodology
 
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
Using Motive, Opportunity, and Means (M.O.M.) and ISO 27001 as Cyber Crime Pr...
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
SCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US UtilitiesSCADA Exposure Will Short-Circuit US Utilities
SCADA Exposure Will Short-Circuit US Utilities
 
PCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMROPCI DSS Reaper - Are you ready - VIMRO
PCI DSS Reaper - Are you ready - VIMRO
 
IPV6 a tale of two protocols
IPV6 a tale of two protocolsIPV6 a tale of two protocols
IPV6 a tale of two protocols
 
CODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHFCODE INSPECTION VIMRO 2015 MHF
CODE INSPECTION VIMRO 2015 MHF
 
MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3MHF-joins-VIMRO-Press-Release-FINAL3
MHF-joins-VIMRO-Press-Release-FINAL3
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz

  • 1. Restricting Authenticating Tracking User Access? Time Is Not On Our Side! 12100 Sunrise Valley Dr. Suite 290-1 Reston, VA 20191 Just like Lucifer, the Dark Net is known by many names with only subtle differences in meaning: the Dark Web, the Digital Underground, and the Deep Web, to name a few. Dark Net sites are difficult to find because they do not show up in normal search engines, but they are accessible through TOR or Tails. At their core these sites are meant to serve one purpose: enable privacy and free speech on the Internet. Unfortunately, they also provide fertile ground for illegal activities, such as selling contraband drugs, firearms, and stolen data, as well as much worse crimes. When you hear a news story about yet another data breach, you can be confi- dent the stolen data will be available on the Dark Net, on information broker- age sites known as Dark Markets. Some of these Dark Markets trade in stolen data (credit cards, Social Security numbers, personally identifiable information, protected health information, and so forth). Figure 1 below depicts a Dark Market welcome page offering bank account information; and Figure 2 displays a list of prices for chipped and magnetic-only credit cards. Figure 1 – Screenshot Example of an Illegal Dark Market Site Dark Net The Devil is in the Details “At their core these sites are meant to serve one purpose: enable privacy and free speech....”
  • 2. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS Figure 2 – Screenshot of an Illegal Dark Market Pricing Page VIMRO security team members are often asked, “Why would a criminal want our data and how could they use it?” Criminals want whatever data we have, and they will find a use for it all. It may seem insignificant at first glance, but each bit of data (email accounts, social media accounts, passwords, birthdays, mothers’ maiden names, addresses, workplaces, prescribed medications, and so on) can add up to be worth $1,000(1) in a Dark Market; and the more data available on one individual, the more money that data is worth to Dark Market dealers. The Dark Market has made it easy for criminals without hacking skills to get what they want: they simply hire someone to do the dirty work for them. Hackers for hire wait on the Dark Net, ready to commit various Internet crimes for the right price. This makes all organizations — and individuals — potential hacking victims. Figure 3 is an example of one hacker’s service menu. Figure 3 – Hacker for Hire Example Dark Net The Devil is in the Details (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL “The Dark Market has made it easy for criminals without hacking skills to get what they want.....”
  • 3. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS Some of these criminals are willing to do whatever the buyer asks, such as perform DDOS attacks, corporate espionage, hacktivism, and so forth. And it’s easy and simple to pay for these crimes! You may have noticed the symbol in the Price column of Figure 3. This is one of the symbols for Bitcoin(2), whose guarantee of anonymity for both buyer and seller has made it the common currency of the Dark Market. The Dark Net has made cybercrime seem safe and easy, and there is no permanent solution in sight, at least in the near future. For law enforce- ment, this means a repeating cycle of stopping one cybercriminal ring only to move onto the next. As aggressively as the FBI infiltrates and shuts down Dark Market sites, more sites spring up. To protect your company, your employees, and your customers from cybercrime in this volatile environment, you must invest in a good cyber security program. VIMRO’s approach is a holistic security methodology that includes the elements in Figure 4. Dark Net The Devil is in the Details (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL “As aggrressivly as the FBI infiltrates and shuts down Dark Market sites, MORE sites spring up.” Authored by VIMRO’s Cybersecurity Leaders
  • 4. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS Note that for our methodology to succeed, you must adopt it in a con- trolled manner and treat it as an evolving process. Implementing it too quickly or without adequate resources may reduce the security program’s effectiveness and demotivate the team members involved. Here’s an overview of a VIMRO cyber security system: Figure 4 – VIMRO’s Cyber Security Enabling Methodology Dark Net The Devil is in the Details (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL Implementing quickly or without adequate resources will dangerously reduce effectiveness.
  • 5. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS • The foundation of our security system first aligns your organization’s business needs with your IT security, allowing you to focus on the criti- cal business applications, systems, and processes that need strong securi- ty controls. For example, when you implement a new application, include a security representative in the development of the budget and project plan. This way, you are assured that time and resources are allocated for security controls throughout the project; and for support throughout the new application’s lifecycle. If you overlook security requirements in the beginning stages of a project, the application and associated systems may require rework for failure to meet your company’s approved security standards. And rework, delays or budget excesses invariably reduce your new application’s ROI. • The second layer of our foundation includes implementing a security framework. Many of VIMRO’s clients have adopted either the NIST(3) Cybersecurity Framework or ISO27001/ISO27002(4). • Along with the framework, organizations have adopted a cyber securi- ty Capability Maturity Model (CMM) that provides a strategy to optimize critical security controls, mechanisms, and processes (Level 5 in the CMM). The cyber security CMM includes: • To manage performance leading toward the optimal level (Level 5) in the security CMM, we recommend Key Performance Indicator (KPI) metrics. Many clients start with MITRE(5) Cyber Resiliency Metrics. Dark Net The Devil is in the Details (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL The methodology assures the organizations business needs align with your security requirements. Authored by VIMRO’s Cybersecurity Leaders o Level 1 – Initial: Processes are unpredictable, poorly controlled and reactive o Level 2 – Managed: Processes are characterized for projects and are still often reactive o Level 3 – Defined: Processes are characterized for the organiza- tion and are proactive, taking their procedures from the organiza- tion’s standards o Level 4 – Quantitatively Managed: Processes are measured and controlled o Level 5 – Optimizing: Focuses on process improvement
  • 6. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS • VIMRO policies, standards, and procedures include all of the verbiage necessary to raise your organization to the upper levels of the cyber security CMM. These are critical to success. Without these, your organi- zation will not even surpass Level 2 in the security CMM. • After writing your security policies, standards, and procedures, we implement technological mechanisms to support your cyber security program, and train workforce members to apply the requirements of the formal documents to their practices. • VIMRO’s risk management program includes continuous evaluation of your technological mechanisms and processes to validate them, and find areas which need improvement, so that your company always main- tains optimized security controls. Below is an example application of the VIMRO methodology to one specific security control item: a firewall. The NIST Cybersecurity Frame- work includes Configuration Management in the family of controls. Using the firewall as our example: • An organization includes firewall configuration requirements in a policy; procedures are written for how the firewall will be implemented and managed. • The procedure includes a baseline security assessment vulnerability report. The baseline is to be updated whenever a change is made on the firewall. • The policy, procedure, and baseline report define the controls (CMM Level 3) for the firewall. • In order to determine if the company is maintaining controls for the firewall to meet CMM Level 4, the firewall is audited using KPIs (a common approach is to conduct firewall configuration audits every six months). Dark Net The Devil is in the Details (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL ....the risk management program includes continuous evaluation of your mechanisms and process to validate them.
  • 7. COPYRIGHT © 2015 VIMRO, LLC. ALL RIGHTS RESERVED. ALL REFERENCED COMPANY NAMES AND LOGOS ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS • Some examples of KPIs include: • If during firewall configuration audits, some findings do not meet the KPI requirements, it is an opportunity to determine why this is the case. Perhaps there are too few people to meet the KPI objectives; perhaps skillsets are lacking and training on maintaining the firewall is necessary. For any items that do not meet KPIs, we implement a Corrective Action Plan (CAP), which sets expectation dates for the resolution of any issues cited. We conduct an audit immediately after said date to ensure that the items have been improved based on the CAP. This is an example of an optimized process (Level 5) for firewall controls practices. Every layer of the VIMRO Cyber Security Enabling Methodology is critical for the success of an optimized cyber security risk management program. Systematic dedication to the process at each level assures a solid yet dynamic foundation proactively protecting you today and into the future. Based on this holistic approach, you can be confident that your cyber security initiatives will enable your organization to meet the needs to prevent, detect and respond to cybercriminal attacks that try to harm your business, clients, employees or steal your sensitive data. Contact VIMRO to discuss the details of our cyber security enabling methodology, and learn how we help our clients streamline and realize their cyber security program initiatives. Dark Net The Devil is in the Details (800) 272 0019 Ashburn, VA | Baltimore, MD | Boston, MA | Glendale, CA | Las Vegas, NV | Reston, VA | San Diego, CA | Tampa, FL A holistic and synergistic cyber security enabling methodology assures you and your organization reach the upper levels of the cyber security CMM. o There must be a change record for each change made to the firewall. The acceptable KPI for changes without corresponding records is 0. o A vulnerability assessment report must not result in high or medium scores. The acceptable KPI for high or medium findings in a vulnerability assessment is 0.