SlideShare a Scribd company logo
© International Institute for Learning, Inc., All rights reserved. 1
Intelligence, Integrity and Innovation
© International Institute for Learning, Inc., All rights reserved.
Thank you for joining us today.
This webinar is brought to you by IIL – a global leader in:
Project, Program and Portfolio Management
Microsoft® Project and Project Server
Lean Six Sigma | Business Analysis
Agile | PRINCE2® | ITIL®
Leadership and Interpersonal Skills
Data Security Breach
The Sony & Staples Story
© International Institute for Learning, Inc., All rights reserved. 2
Intelligence, Integrity and Innovation
Global IIL Companies
IIL US
IIL Asia (Singapore)
IIL Australia
IIL Brasil
IIL Canada
IIL China
IIL Europe (United Kingdom)
IIL Finland
IIL France
IIL Germany
IIL Hong Kong
IIL Hungary
IIL India
IIL Japan
IIL Korea (Seoul)
IIL México
IIL Middle East (Dubai)
IIL Spain
© International Institute for Learning, Inc., All rights reserved. 3
Intelligence, Integrity and Innovation
In today’s world, companies generate and consume massive
amounts of data, as a day-to-day prerequisite of doing business.
This accumulated data becomes the most strategic asset of the
organization and more often than not gives a competitive
advantage in the market.
This critical nature of data makes it the new corporate target!
Data
© International Institute for Learning, Inc., All rights reserved. 4
Intelligence, Integrity and Innovation
Data security involves protecting data from the unwanted
actions of unauthorized users.
BUT
Data security must not come at the cost of not being available
when necessary.
Data Security
© International Institute for Learning, Inc., All rights reserved. 5
Intelligence, Integrity and Innovation
A security breach is any incident that results in unauthorized
access of data, applications, services, networks, and/or devices
by perpetrators bypassing underlying security mechanisms.
Security Breach
© International Institute for Learning, Inc., All rights reserved. 6
Intelligence, Integrity and Innovation
Data Breaches – Causes
© International Institute for Learning, Inc., All rights reserved. 7
Intelligence, Integrity and Innovation
“Well-meaning” insiders: who have no intention to breach but
inadvertently do so because they fail to follow security policies.
‒ Lost devices
‒ Exposed data – no measures in place
‒ Poor business processes
Targeted Attacks: Coordinated effort involving humans or
automated software to cyber attack another individual, entity or
organization.
‒ System vulnerabilities
‒ Malware
‒ Stolen credentials
Data Breaches Occur Through:
© International Institute for Learning, Inc., All rights reserved. 8
Intelligence, Integrity and Innovation
Malicious insiders: who intentionally breach security policies.
Terminated employees
Company data stored on home computers for career
progression
Industrial espionage
Data Breaches Occur Through:
© International Institute for Learning, Inc., All rights reserved. 9
Intelligence, Integrity and Innovation
Incursion: Hackers break into the company's network by
exploiting system vulnerabilities.
Discovery: The hacker maps out the organization's systems and
automatically scans for confidential data.
Capture: Exposed data on unprotected systems is immediately
accessed. Components called root kits are surreptitiously
installed on targeted systems and networks.
Exfiltration: Confidential data is sent back to the hacker team.
The Anatomy of a Data Breach
© International Institute for Learning, Inc., All rights reserved. 10
Intelligence, Integrity and Innovation
The Anatomy of a Data Breach
© International Institute for Learning, Inc., All rights reserved. 11
Intelligence, Integrity and Innovation
Damaged Intellectual Property: Blueprints, technical
specifications, designs, launch plans
Revenue Lost: Downtime
Theft: Bank information, transfer codes
Vandalism: False or discrediting information
Ruined reputation
Consequences of a Security Breach
© International Institute for Learning, Inc., All rights reserved. 12
Intelligence, Integrity and Innovation
Confidentiality, integrity, and availability, also known as the CIA
triad, is a model designed to guide policies for information security
within an organization.
Balances the competing requirements of confidentiality, integrity,
and integrity with equal emphasis on each.
Information Security Basics:
The CIA Triad
© International Institute for Learning, Inc., All rights reserved. 13
Intelligence, Integrity and Innovation
Confidentiality is required to prevent sensitive information from
reaching the wrong people.
Simple ways of ensuring confidentiality: data encryption, user
IDs and passwords or, for highly sensitive information, in hard-
copy form only.
More advanced techniques: storage on air-gapped computers,
disconnected storage devices.
Confidentiality
© International Institute for Learning, Inc., All rights reserved. 14
Intelligence, Integrity and Innovation
Integrity involves maintaining the consistency, accuracy, and
trustworthiness of data over its entire life cycle.
Data must not be changed in transit, and steps must be taken to
ensure that data cannot be altered by unauthorized people.
Techniques include the use of checksums and hashing.
Integrity
© International Institute for Learning, Inc., All rights reserved. 15
Intelligence, Integrity and Innovation
Data is meant to be used, when needed, by those authorized to
use it.
Techniques implemented to implement confidentiality and
integrity must not compromise on the availability of information.
Availability of data can be improved through implementing
redundancy, failover, RAID.
Availability
© International Institute for Learning, Inc., All rights reserved. 16
Intelligence, Integrity and Innovation
Part 1: The Sony Story
© International Institute for Learning, Inc., All rights reserved. 17
Intelligence, Integrity and Innovation
It was a release of confidential data belonging to Sony Pictures
Entertainment on November 24, 2014.
100 terabytes of data was stolen containing:
Personal information about Sony Pictures’ employees and
their families
E-mails between employees
Information about executive salaries at the company
Copies of unreleased Sony films
Sony Pictures Entertainment Hack – 2014
© International Institute for Learning, Inc., All rights reserved. 18
Intelligence, Integrity and Innovation
It is alleged that the attack was orchestrated by a group calling
themselves the “Guardians of Peace” or GOP.
There are alternate theories proposing that the Government of
North Korea and even former Sony employees were behind the
attack.
By whom?
© International Institute for Learning, Inc., All rights reserved. 19
Intelligence, Integrity and Innovation
A malware called Wiper has been identified as the agent used in
the attack and was responsible for destroying data on the
target's hard disk (or similar storage) on systems running
Microsoft® Windows.
The malware comes wrapped in an executable “dropper” that
installs it and supporting files. In this case, the “dropper” installs
itself as a Windows service when executed.
How was the Breach Orchestrated?
© International Institute for Learning, Inc., All rights reserved. 20
Intelligence, Integrity and Innovation
The malware service appears to create a network file share –
which points to the location of Windows system files in the PC’s
file directory structure (usually WINDOWS).
It then gives unrestricted access to that share, allowing any
other computer on the local network to access it.
Mechanics of the Attack
© International Institute for Learning, Inc., All rights reserved. 21
Intelligence, Integrity and Innovation
The dropper then communicates with a set of IP addresses in
Japan, possibly connected to Sony's corporate network. Then it
shuts itself down.
At some point – either based on a hard-coded time within the
malware package or after some other communication with the
attackers – the nasty part of the malware package gets
launched.
Mechanics of the Attack – II
© International Institute for Learning, Inc., All rights reserved. 22
Intelligence, Integrity and Innovation
Wiper then communicates with 3 IP addresses (one each in Italy,
Poland, and Thailand) to transfer the contents of the computer.
The malware starts accessing the hard drive and deleting its
contents sector by sector.
Once it’s complete, it suspends Windows for two hours, then
reboots the computer when it wakes.
At this point, the drive is completely wiped out – even making
physical changes to the hard drive.
Coup de Grâce
© International Institute for Learning, Inc., All rights reserved. 23
Intelligence, Integrity and Innovation
An e-mail released in the hack showed that Angelina Jolie
wanted David Fincher to direct her film Cleopatra.
In another e-mail, Scott Rudin referred to Jolie as "a minimally
talented spoiled brat“.
Several future Sony Pictures films, including Annie, Mr. Turner,
Still Alice, and To Write Love on Her Arms, were also leaked.
The Saucier Bits in the Stolen Data
© International Institute for Learning, Inc., All rights reserved. 24
Intelligence, Integrity and Innovation
Industry estimates that the data breach will cost Sony about
Y100 billion, or $1.25 billion from:
Lost business,
Various compensation costs and
New investments
Consequences for Sony
© International Institute for Learning, Inc., All rights reserved. 25
Intelligence, Integrity and Innovation
Maybe not! But the consequences could have been lesser if:
Sensitive IPR data was segregated
Back-up networks were disconnected from the primary network
so that back-ups are not affected.
The malware was identified early by having up-to-date patches.
The infected machine(s) were isolated immediately after
detection.
Sony had learned from the Sony 2011 PlayStation incident and
educated its users on what to look out for.
Could It Have Been Prevented?
© International Institute for Learning, Inc., All rights reserved. 26
Intelligence, Integrity and Innovation
Part 2: The Staples Story
© International Institute for Learning, Inc., All rights reserved. 27
Intelligence, Integrity and Innovation
Cardholder names, card numbers, expiration dates, and card
verification codes of 1.16 million customer credit and debit cards
used at 119 Staples locations in 35 American states.
This data was stolen over a period of up to six months.
Staples Data Breach 2014
© International Institute for Learning, Inc., All rights reserved. 28
Intelligence, Integrity and Innovation
It is alleged that a cybercrime gang using malware known as
Anunak was behind the Staples breach.
This same gang is believed to behind breaches at Sheplers (a
cowboy apparel chain) and Bebe (a women's clothing retailer),
as well as attacks on the Russian banking sector.
By whom?
© International Institute for Learning, Inc., All rights reserved. 29
Intelligence, Integrity and Innovation
Speculation is that the malware was cascaded using one of these
two methods:
Method 1:
Using rented computers called “BotNets”, Anunak members
sent phishing e-mails to the company’s employees.
The e-mails may have appeared to be from the Central Bank
of the Russian Federation, but actually contained malware
designed to infect the employees' computers.
Method 2:
A company-wide update might have pushed this malware to
all PoS terminals
How was the Breach Orchestrated?
© International Institute for Learning, Inc., All rights reserved. 30
Intelligence, Integrity and Innovation
The malware then infects the Point of Sale (PoS) terminals to
capture the information from cards swiped on these terminals.
Once the stolen card information was located the PoS’ memory,
after a card swipe, it is transmitted to a programmed IP where
the stolen data reaches the attackers.
Mechanics of the Attack – II
© International Institute for Learning, Inc., All rights reserved. 31
Intelligence, Integrity and Innovation
The attack cost Target $148 million, and cost financial
institutions $200 million.
Profits fell 46 percent in the fourth quarter of 2013.
Resignation of Beth M. Jacob, the company’s most senior
technology officer in February, and Gregg Steinhafel, CEO and
chairman of the board, in May.
Consequences for Staples
© International Institute for Learning, Inc., All rights reserved. 32
Intelligence, Integrity and Innovation
This attack may have been prevented if:
Secure readers for card data capture were used
Encrypting of data, upstream of the POS, all the way to the
payment processing host, beyond the retail store network was
done
No live data was stored on the PoS memory
Exclusive use of chip and pin cards
Prevention Methods
© International Institute for Learning, Inc., All rights reserved. 33
Intelligence, Integrity and Innovation
Data security breaches have the power to cripple a corporation
and often result in large losses, both monetary and non-
monetary.
Techniques for preventing breaches:
Stop targeted attacks through a combination of policies, patches,
encryption, and isolation.
Keep aligned with the global security intelligence.
Actively identify the most sensitive information.
Automate IT controls to prevent human errors and internal theft.
Prevent data exfiltration once stolen [Isolation and Disconnection]
Closing Notes
© International Institute for Learning, Inc., All rights reserved. 34
Intelligence, Integrity and Innovation
 White Paper, “Why breaches happen and what to do about it?”
 2014 Sony Pictures Entertainment hack,
http://en.wikipedia.org/wiki/Sony_Pictures_Entertainment_hack
 Wiper Malware – A detection deep dive
http://blogs.cisco.com/security/talos/wiper-malware
 Inside the “wiper” malware that brought Sony Pictures to its knees
http://arstechnica.com/security/2014/12/inside-the-wiper-malware-
that-brought-sony-pictures-to-its-knees/
 Wiper (malware) http://en.wikipedia.org/wiki/Wiper_%28malware%29
 Target Hit by Credit-Card Breach
http://www.wsj.com/articles/SB100014240527023047731045792667432
30242538
References:
© International Institute for Learning, Inc., All rights reserved. 35
Intelligence, Integrity and Innovation
We invite you to get a closer look at what IIL can do for you
and your organization, by visiting www.iil.com or email
learning@iil.com and let us know how we can meet your
learning needs.
Please connect with IIL Socially:
Like us on: facebook.com/IIL.inc
Follow us: twitter.com/IILGLOBAL
Join our Discussions on LinkedIn
At IIL, Our Greatest Accomplishments are Yours

More Related Content

What's hot

Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
The Forensic Lab
The Forensic LabThe Forensic Lab
The Forensic Lab
primeteacher32
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
vishnuv43
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Falgun Rathod
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
MyAssignmenthelp.com
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
jahanzebmunawar
 
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnovComputer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Eric Vanderburg
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
Marco Alamanni
 
Osint
OsintOsint
Incident Response
Incident Response Incident Response
Incident Response
InnoTech
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
gaurang17
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
Ambuj Kumar
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
Bradford Bach
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
Piyush Jain
 
How to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with RecuvaHow to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with Recuva
maggiemiao
 

What's hot (20)

Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
The Forensic Lab
The Forensic LabThe Forensic Lab
The Forensic Lab
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Corporate security
Corporate securityCorporate security
Corporate security
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnovComputer Forensics: First Responder Training - Eric Vanderburg - JurInnov
Computer Forensics: First Responder Training - Eric Vanderburg - JurInnov
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Sony Hacking Presentation
Sony Hacking PresentationSony Hacking Presentation
Sony Hacking Presentation
 
Osint
OsintOsint
Osint
 
Incident Response
Incident Response Incident Response
Incident Response
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
How to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with RecuvaHow to Recover Deleted Files for Free with Recuva
How to Recover Deleted Files for Free with Recuva
 

Viewers also liked

Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Cyphort
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
Baltimax
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
Dylan Holbrook
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
corelink11
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
GuardEra Access Solutions, Inc.
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case AAshley Chase
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
Eversheds Sutherland
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
Wasef Al-Hakim
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
dnomura
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
AlienVault
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
Edge Pereira
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
YanivTaieb
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].
Alexander Decker
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army
blackflags
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
Matthew Rosenquist
 
Blog Example
Blog ExampleBlog Example
Blog Example
Dylan Holbrook
 

Viewers also liked (20)

Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
Sony case study
Sony case studySony case study
Sony case study
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
Blog Example
Blog ExampleBlog Example
Blog Example
 

Similar to Data Security Breach: The Sony & Staples Story

Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
Mukesh Chinta
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
YazanSalileh
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
EhabRushdy1
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Fidelis Cybersecurity
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
Simone Onofri
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
Jeff Lemmermann
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
360mnbsu
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
RamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
Ian Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
ssuser6c59cb
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
Somesh Kumar
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
IBM Government
 

Similar to Data Security Breach: The Sony & Staples Story (20)

Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Network security
Network securityNetwork security
Network security
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 

More from International Institute for Learning

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
International Institute for Learning
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
International Institute for Learning
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
International Institute for Learning
 
PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification
International Institute for Learning
 
2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR) 2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR)
International Institute for Learning
 
Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business
International Institute for Learning
 
Applying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in HealthcareApplying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in Healthcare
International Institute for Learning
 
Global Business Etiquette
Global Business Etiquette Global Business Etiquette
Global Business Etiquette
International Institute for Learning
 
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideThe Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
International Institute for Learning
 
Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication
International Institute for Learning
 
Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...
International Institute for Learning
 
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand International Institute for Learning
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
International Institute for Learning
 
Emerging Trends in PMO Governance
Emerging Trends in PMO Governance Emerging Trends in PMO Governance
Emerging Trends in PMO Governance
International Institute for Learning
 
Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server
International Institute for Learning
 
Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma
International Institute for Learning
 
Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!
International Institute for Learning
 
CAPM® EDGE
CAPM® EDGECAPM® EDGE
Knowledge Management Principles for Project Managers
Knowledge Management Principles for Project ManagersKnowledge Management Principles for Project Managers
Knowledge Management Principles for Project Managers
International Institute for Learning
 

More from International Institute for Learning (20)

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
 
PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification
 
2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR) 2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR)
 
Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business
 
Applying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in HealthcareApplying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in Healthcare
 
Global Business Etiquette
Global Business Etiquette Global Business Etiquette
Global Business Etiquette
 
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideThe Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
 
Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication
 
Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...
 
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
 
Emerging Trends in PMO Governance
Emerging Trends in PMO Governance Emerging Trends in PMO Governance
Emerging Trends in PMO Governance
 
Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server
 
Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma
 
Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!
 
Grateful Leadership
Grateful Leadership Grateful Leadership
Grateful Leadership
 
CAPM® EDGE
CAPM® EDGECAPM® EDGE
CAPM® EDGE
 
Knowledge Management Principles for Project Managers
Knowledge Management Principles for Project ManagersKnowledge Management Principles for Project Managers
Knowledge Management Principles for Project Managers
 

Recently uploaded

Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 

Recently uploaded (20)

Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 

Data Security Breach: The Sony & Staples Story

  • 1. © International Institute for Learning, Inc., All rights reserved. 1 Intelligence, Integrity and Innovation © International Institute for Learning, Inc., All rights reserved. Thank you for joining us today. This webinar is brought to you by IIL – a global leader in: Project, Program and Portfolio Management Microsoft® Project and Project Server Lean Six Sigma | Business Analysis Agile | PRINCE2® | ITIL® Leadership and Interpersonal Skills Data Security Breach The Sony & Staples Story
  • 2. © International Institute for Learning, Inc., All rights reserved. 2 Intelligence, Integrity and Innovation Global IIL Companies IIL US IIL Asia (Singapore) IIL Australia IIL Brasil IIL Canada IIL China IIL Europe (United Kingdom) IIL Finland IIL France IIL Germany IIL Hong Kong IIL Hungary IIL India IIL Japan IIL Korea (Seoul) IIL México IIL Middle East (Dubai) IIL Spain
  • 3. © International Institute for Learning, Inc., All rights reserved. 3 Intelligence, Integrity and Innovation In today’s world, companies generate and consume massive amounts of data, as a day-to-day prerequisite of doing business. This accumulated data becomes the most strategic asset of the organization and more often than not gives a competitive advantage in the market. This critical nature of data makes it the new corporate target! Data
  • 4. © International Institute for Learning, Inc., All rights reserved. 4 Intelligence, Integrity and Innovation Data security involves protecting data from the unwanted actions of unauthorized users. BUT Data security must not come at the cost of not being available when necessary. Data Security
  • 5. © International Institute for Learning, Inc., All rights reserved. 5 Intelligence, Integrity and Innovation A security breach is any incident that results in unauthorized access of data, applications, services, networks, and/or devices by perpetrators bypassing underlying security mechanisms. Security Breach
  • 6. © International Institute for Learning, Inc., All rights reserved. 6 Intelligence, Integrity and Innovation Data Breaches – Causes
  • 7. © International Institute for Learning, Inc., All rights reserved. 7 Intelligence, Integrity and Innovation “Well-meaning” insiders: who have no intention to breach but inadvertently do so because they fail to follow security policies. ‒ Lost devices ‒ Exposed data – no measures in place ‒ Poor business processes Targeted Attacks: Coordinated effort involving humans or automated software to cyber attack another individual, entity or organization. ‒ System vulnerabilities ‒ Malware ‒ Stolen credentials Data Breaches Occur Through:
  • 8. © International Institute for Learning, Inc., All rights reserved. 8 Intelligence, Integrity and Innovation Malicious insiders: who intentionally breach security policies. Terminated employees Company data stored on home computers for career progression Industrial espionage Data Breaches Occur Through:
  • 9. © International Institute for Learning, Inc., All rights reserved. 9 Intelligence, Integrity and Innovation Incursion: Hackers break into the company's network by exploiting system vulnerabilities. Discovery: The hacker maps out the organization's systems and automatically scans for confidential data. Capture: Exposed data on unprotected systems is immediately accessed. Components called root kits are surreptitiously installed on targeted systems and networks. Exfiltration: Confidential data is sent back to the hacker team. The Anatomy of a Data Breach
  • 10. © International Institute for Learning, Inc., All rights reserved. 10 Intelligence, Integrity and Innovation The Anatomy of a Data Breach
  • 11. © International Institute for Learning, Inc., All rights reserved. 11 Intelligence, Integrity and Innovation Damaged Intellectual Property: Blueprints, technical specifications, designs, launch plans Revenue Lost: Downtime Theft: Bank information, transfer codes Vandalism: False or discrediting information Ruined reputation Consequences of a Security Breach
  • 12. © International Institute for Learning, Inc., All rights reserved. 12 Intelligence, Integrity and Innovation Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Balances the competing requirements of confidentiality, integrity, and integrity with equal emphasis on each. Information Security Basics: The CIA Triad
  • 13. © International Institute for Learning, Inc., All rights reserved. 13 Intelligence, Integrity and Innovation Confidentiality is required to prevent sensitive information from reaching the wrong people. Simple ways of ensuring confidentiality: data encryption, user IDs and passwords or, for highly sensitive information, in hard- copy form only. More advanced techniques: storage on air-gapped computers, disconnected storage devices. Confidentiality
  • 14. © International Institute for Learning, Inc., All rights reserved. 14 Intelligence, Integrity and Innovation Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people. Techniques include the use of checksums and hashing. Integrity
  • 15. © International Institute for Learning, Inc., All rights reserved. 15 Intelligence, Integrity and Innovation Data is meant to be used, when needed, by those authorized to use it. Techniques implemented to implement confidentiality and integrity must not compromise on the availability of information. Availability of data can be improved through implementing redundancy, failover, RAID. Availability
  • 16. © International Institute for Learning, Inc., All rights reserved. 16 Intelligence, Integrity and Innovation Part 1: The Sony Story
  • 17. © International Institute for Learning, Inc., All rights reserved. 17 Intelligence, Integrity and Innovation It was a release of confidential data belonging to Sony Pictures Entertainment on November 24, 2014. 100 terabytes of data was stolen containing: Personal information about Sony Pictures’ employees and their families E-mails between employees Information about executive salaries at the company Copies of unreleased Sony films Sony Pictures Entertainment Hack – 2014
  • 18. © International Institute for Learning, Inc., All rights reserved. 18 Intelligence, Integrity and Innovation It is alleged that the attack was orchestrated by a group calling themselves the “Guardians of Peace” or GOP. There are alternate theories proposing that the Government of North Korea and even former Sony employees were behind the attack. By whom?
  • 19. © International Institute for Learning, Inc., All rights reserved. 19 Intelligence, Integrity and Innovation A malware called Wiper has been identified as the agent used in the attack and was responsible for destroying data on the target's hard disk (or similar storage) on systems running Microsoft® Windows. The malware comes wrapped in an executable “dropper” that installs it and supporting files. In this case, the “dropper” installs itself as a Windows service when executed. How was the Breach Orchestrated?
  • 20. © International Institute for Learning, Inc., All rights reserved. 20 Intelligence, Integrity and Innovation The malware service appears to create a network file share – which points to the location of Windows system files in the PC’s file directory structure (usually WINDOWS). It then gives unrestricted access to that share, allowing any other computer on the local network to access it. Mechanics of the Attack
  • 21. © International Institute for Learning, Inc., All rights reserved. 21 Intelligence, Integrity and Innovation The dropper then communicates with a set of IP addresses in Japan, possibly connected to Sony's corporate network. Then it shuts itself down. At some point – either based on a hard-coded time within the malware package or after some other communication with the attackers – the nasty part of the malware package gets launched. Mechanics of the Attack – II
  • 22. © International Institute for Learning, Inc., All rights reserved. 22 Intelligence, Integrity and Innovation Wiper then communicates with 3 IP addresses (one each in Italy, Poland, and Thailand) to transfer the contents of the computer. The malware starts accessing the hard drive and deleting its contents sector by sector. Once it’s complete, it suspends Windows for two hours, then reboots the computer when it wakes. At this point, the drive is completely wiped out – even making physical changes to the hard drive. Coup de Grâce
  • 23. © International Institute for Learning, Inc., All rights reserved. 23 Intelligence, Integrity and Innovation An e-mail released in the hack showed that Angelina Jolie wanted David Fincher to direct her film Cleopatra. In another e-mail, Scott Rudin referred to Jolie as "a minimally talented spoiled brat“. Several future Sony Pictures films, including Annie, Mr. Turner, Still Alice, and To Write Love on Her Arms, were also leaked. The Saucier Bits in the Stolen Data
  • 24. © International Institute for Learning, Inc., All rights reserved. 24 Intelligence, Integrity and Innovation Industry estimates that the data breach will cost Sony about Y100 billion, or $1.25 billion from: Lost business, Various compensation costs and New investments Consequences for Sony
  • 25. © International Institute for Learning, Inc., All rights reserved. 25 Intelligence, Integrity and Innovation Maybe not! But the consequences could have been lesser if: Sensitive IPR data was segregated Back-up networks were disconnected from the primary network so that back-ups are not affected. The malware was identified early by having up-to-date patches. The infected machine(s) were isolated immediately after detection. Sony had learned from the Sony 2011 PlayStation incident and educated its users on what to look out for. Could It Have Been Prevented?
  • 26. © International Institute for Learning, Inc., All rights reserved. 26 Intelligence, Integrity and Innovation Part 2: The Staples Story
  • 27. © International Institute for Learning, Inc., All rights reserved. 27 Intelligence, Integrity and Innovation Cardholder names, card numbers, expiration dates, and card verification codes of 1.16 million customer credit and debit cards used at 119 Staples locations in 35 American states. This data was stolen over a period of up to six months. Staples Data Breach 2014
  • 28. © International Institute for Learning, Inc., All rights reserved. 28 Intelligence, Integrity and Innovation It is alleged that a cybercrime gang using malware known as Anunak was behind the Staples breach. This same gang is believed to behind breaches at Sheplers (a cowboy apparel chain) and Bebe (a women's clothing retailer), as well as attacks on the Russian banking sector. By whom?
  • 29. © International Institute for Learning, Inc., All rights reserved. 29 Intelligence, Integrity and Innovation Speculation is that the malware was cascaded using one of these two methods: Method 1: Using rented computers called “BotNets”, Anunak members sent phishing e-mails to the company’s employees. The e-mails may have appeared to be from the Central Bank of the Russian Federation, but actually contained malware designed to infect the employees' computers. Method 2: A company-wide update might have pushed this malware to all PoS terminals How was the Breach Orchestrated?
  • 30. © International Institute for Learning, Inc., All rights reserved. 30 Intelligence, Integrity and Innovation The malware then infects the Point of Sale (PoS) terminals to capture the information from cards swiped on these terminals. Once the stolen card information was located the PoS’ memory, after a card swipe, it is transmitted to a programmed IP where the stolen data reaches the attackers. Mechanics of the Attack – II
  • 31. © International Institute for Learning, Inc., All rights reserved. 31 Intelligence, Integrity and Innovation The attack cost Target $148 million, and cost financial institutions $200 million. Profits fell 46 percent in the fourth quarter of 2013. Resignation of Beth M. Jacob, the company’s most senior technology officer in February, and Gregg Steinhafel, CEO and chairman of the board, in May. Consequences for Staples
  • 32. © International Institute for Learning, Inc., All rights reserved. 32 Intelligence, Integrity and Innovation This attack may have been prevented if: Secure readers for card data capture were used Encrypting of data, upstream of the POS, all the way to the payment processing host, beyond the retail store network was done No live data was stored on the PoS memory Exclusive use of chip and pin cards Prevention Methods
  • 33. © International Institute for Learning, Inc., All rights reserved. 33 Intelligence, Integrity and Innovation Data security breaches have the power to cripple a corporation and often result in large losses, both monetary and non- monetary. Techniques for preventing breaches: Stop targeted attacks through a combination of policies, patches, encryption, and isolation. Keep aligned with the global security intelligence. Actively identify the most sensitive information. Automate IT controls to prevent human errors and internal theft. Prevent data exfiltration once stolen [Isolation and Disconnection] Closing Notes
  • 34. © International Institute for Learning, Inc., All rights reserved. 34 Intelligence, Integrity and Innovation  White Paper, “Why breaches happen and what to do about it?”  2014 Sony Pictures Entertainment hack, http://en.wikipedia.org/wiki/Sony_Pictures_Entertainment_hack  Wiper Malware – A detection deep dive http://blogs.cisco.com/security/talos/wiper-malware  Inside the “wiper” malware that brought Sony Pictures to its knees http://arstechnica.com/security/2014/12/inside-the-wiper-malware- that-brought-sony-pictures-to-its-knees/  Wiper (malware) http://en.wikipedia.org/wiki/Wiper_%28malware%29  Target Hit by Credit-Card Breach http://www.wsj.com/articles/SB100014240527023047731045792667432 30242538 References:
  • 35. © International Institute for Learning, Inc., All rights reserved. 35 Intelligence, Integrity and Innovation We invite you to get a closer look at what IIL can do for you and your organization, by visiting www.iil.com or email learning@iil.com and let us know how we can meet your learning needs. Please connect with IIL Socially: Like us on: facebook.com/IIL.inc Follow us: twitter.com/IILGLOBAL Join our Discussions on LinkedIn At IIL, Our Greatest Accomplishments are Yours