MassTLC Security Conference
COMPREHENSIVE SECURITY –
A 3600 VIEW OF YOUR SECURITY PROGRAM
Tweet it out
@MassTLC #MTLCsecurity
The MA Tech Ecosystem
@MassTLC #MTLCSecurity
Thank You to Our Platinum Sponsor
3
Thank You to Our Gold Sponsors
@MassTLC #MTLCSecurity
Thank You to Our Silver Sponsors
Thanks to Our Global Sponsors
@MassTLC #MTLCSecurity
Save the Date!
September 14: MassTLC Leadership Awards Gala
October 6: Software Development Conference: Data,
Development, & Drive
November 18: Transform
@MassTLC #MTLCSecurity
Welcome
Keynote: Dave Mahon, VP & Chief Security Officer, CenturyLink
Simulated Breach
Breakout Sessions #1
– Harnessing the 3rd Party Ecosystem
– Building Your Incident Response Plan
Breakout Sessions #2
– User Entity Behavior Analytics
– Security Operations Analytics and Reporting
– Application Security
Networking and Career Fair
Today’s Agenda
@MassTLC #MTLCSecurity
Keynote Address
Dave Mahon
CenturyLink
@MassTLC #MTLCSecurity
Data Breach Simulation Panel
MASSTLC AUGUST 2016
Agenda
Introductions
Simulation
– More details are learned
Lessons learned
Simulation
We will discuss important topics such as
legal disclosure, cyber insurance,
incident response plans,
communication and working with law
enforcement
this simulation is ficticous and ……
Our Victim - WindResources
WindResources is the global leading
manufacturer for wind turbines.
Everyone want this technology and some
are willing to get it any way possible.
WindResources products are network
devices.
WindResources customers include the
government, states and consumers.
How the incident unfolded -WIP
A Sales Director, John Doe, has called the WindResources
helpdesk to report that his machine is acting sluggishly
and that possibly this might be due to a malware
infection.
He has received an email regarding Nuclear Radiation and
has tried unsuccessfully to open the Excel attachment.
Triage is performed on John’s computer and it was
observed that there are suspicious files in a TEMP folder
as well as suspicious processes running.
The WindResources SOC Forensics team was engaged to
analyze the computer and conclude that it has been
compromised. They examine web access (proxy) logs for
this computer
Process
Steady
State
• Where you want to be
Validation
• Validation – Is the event real?
• What do I do?
It is Real
• What is the impact?
• Who needs to be involved?
• What are the next steps?
Day – 2 thru 5
While the Forensics team was doing their analysis the CERT
Incident Coordinator examined email logs. The Incident
Coordinator identifies other user from the list affected as well.
The coordinator now engages the Forensics team to examine
other computers.
The forensic analysis of the other computers shows that they are
infected by the same malware as was found on first computer.
The web access logs obtained earlier also seem to indicate that
something may have been uploaded from a machine.
One of the files recovered from a computer appears to contain
customer login credentials, so the coordinator obtains logs from
the system.
This showed many customer accounts logging in from Russia. The
incident coordinator then escalated to the SOC manager as a
critical incident.
Day 5+
One of the company security providers
contacted the Cybersecurity team
reporting that data has been recovered
from a Russian hacker web site.
A customer who performed a google
search on his own name has found his
personal details in a hacker forum.
Lessons Learned
Have an incident response plan
When to engage Legal
Be prepared to communicate
Engage in Threat-Sharing
Select Points of Contact
When to engage Law Enforcement
Develop swift messaging
Practice!

MassTLC Opening Slides and Simulation Session

  • 1.
    MassTLC Security Conference COMPREHENSIVESECURITY – A 3600 VIEW OF YOUR SECURITY PROGRAM Tweet it out @MassTLC #MTLCsecurity
  • 2.
    The MA TechEcosystem @MassTLC #MTLCSecurity
  • 3.
    Thank You toOur Platinum Sponsor 3 Thank You to Our Gold Sponsors @MassTLC #MTLCSecurity Thank You to Our Silver Sponsors
  • 4.
    Thanks to OurGlobal Sponsors @MassTLC #MTLCSecurity
  • 5.
    Save the Date! September14: MassTLC Leadership Awards Gala October 6: Software Development Conference: Data, Development, & Drive November 18: Transform @MassTLC #MTLCSecurity
  • 6.
    Welcome Keynote: Dave Mahon,VP & Chief Security Officer, CenturyLink Simulated Breach Breakout Sessions #1 – Harnessing the 3rd Party Ecosystem – Building Your Incident Response Plan Breakout Sessions #2 – User Entity Behavior Analytics – Security Operations Analytics and Reporting – Application Security Networking and Career Fair Today’s Agenda @MassTLC #MTLCSecurity
  • 7.
  • 8.
    Data Breach SimulationPanel MASSTLC AUGUST 2016
  • 9.
  • 10.
    Simulation We will discussimportant topics such as legal disclosure, cyber insurance, incident response plans, communication and working with law enforcement this simulation is ficticous and ……
  • 11.
    Our Victim -WindResources WindResources is the global leading manufacturer for wind turbines. Everyone want this technology and some are willing to get it any way possible. WindResources products are network devices. WindResources customers include the government, states and consumers.
  • 12.
    How the incidentunfolded -WIP A Sales Director, John Doe, has called the WindResources helpdesk to report that his machine is acting sluggishly and that possibly this might be due to a malware infection. He has received an email regarding Nuclear Radiation and has tried unsuccessfully to open the Excel attachment. Triage is performed on John’s computer and it was observed that there are suspicious files in a TEMP folder as well as suspicious processes running. The WindResources SOC Forensics team was engaged to analyze the computer and conclude that it has been compromised. They examine web access (proxy) logs for this computer
  • 13.
    Process Steady State • Where youwant to be Validation • Validation – Is the event real? • What do I do? It is Real • What is the impact? • Who needs to be involved? • What are the next steps?
  • 14.
    Day – 2thru 5 While the Forensics team was doing their analysis the CERT Incident Coordinator examined email logs. The Incident Coordinator identifies other user from the list affected as well. The coordinator now engages the Forensics team to examine other computers. The forensic analysis of the other computers shows that they are infected by the same malware as was found on first computer. The web access logs obtained earlier also seem to indicate that something may have been uploaded from a machine. One of the files recovered from a computer appears to contain customer login credentials, so the coordinator obtains logs from the system. This showed many customer accounts logging in from Russia. The incident coordinator then escalated to the SOC manager as a critical incident.
  • 15.
    Day 5+ One ofthe company security providers contacted the Cybersecurity team reporting that data has been recovered from a Russian hacker web site. A customer who performed a google search on his own name has found his personal details in a hacker forum.
  • 16.
    Lessons Learned Have anincident response plan When to engage Legal Be prepared to communicate Engage in Threat-Sharing Select Points of Contact When to engage Law Enforcement Develop swift messaging Practice!

Editor's Notes

  • #2 I want to thank you for being here today. For those of you that don’t know me, I manage the Security community for MassTLC. And I’m really happy to be standing up here for our third annual conference.
  • #3 Today where are going to talk a lot about building partnerships and ecosystems within the context of IoT. MassTLC is a catalyst where these partnerships and communities can come together within IoT and the greater tech ecosystem as a whole.
  • #4 Most of our events require the support of our sponsors. And today, we’re thankful to have as our Platinum Sponsor Cisco, as well as our Gold sponsors Bitsight and Raytheon, and silver sponsors CenturyLink and Codiscope, supporting this conference and our Security community.
  • #5 And a thank to MassTLC’s Global Sponsors that provide support all of our events and initiatives throughout the year.
  • #6 While we do have a number of smaller programs happening throughout the fall, which you can see on our website and also in the back of your program book, we have some great larger events coming up including our Leadership Awards Gala happening at the World Trade Center. A fantastic software development conference also happening here at NERD. And then finally a new program called Transform, which will bring together leaders in tech, academia, and policy to explore the transformative ideas that are creating opportunities in the region – and world today.
  • #7 So enough with all of that. Let’s get on with the real reason we are all here. I am really lucky to have such a dedicated advisory board who worked to design a program that really hits home to any company with a digital footprint. Today is all about focusing on security breaches and how companies must not only be vigilant in protecting themselves but also remain vigilant so that when a breach does occur you have the processes in place to manage it.