SlideShare a Scribd company logo
1 of 13
Service Delivery 
Operations 
BBCON 2014 
Ron Rainville – VP/Service Delivery Operations
2 
Overview 
• Today’s Landscape 
• What is Blackbaud doing? 
• Protection thru technology 
• Protection thru people 
• Protection thru certifications 
• Protection thru process 
Blackbaud Confidential
Today’s Landscape 
3 
Breaches in the News 
• Banks 
• Massive bank hack: What you need to know - CNN 
• Retailers 
• Home Depot hack could lead to $3 billion in fake 
charges – CBS News 
• Target store chain security breach 
• Healthcare 
• There is an epidemic of medical identity theft – USA 
Today 
• Universities 
• Ex-contractor says he hacked into U-Md. databases 
to alert others to security flaws – Washington Post 
• Governments 
• U.S. Probes Hacking of Government Computers at 
Personnel Agency – The Wall Street Journal
Theft has been Automated and 
Targeted 
4 
A variety of adversaries 
• Script Kiddies 
• Organized Crime 
• Nation States 
The value of targeted data is rising 
• Cardholder data 
• Personally Identifiable Information (“PII”) 
• Protected Health Information (“PHI”) 
• Social network handles (Twitter, Facebook)
5 
Attack Vectors 
Zero-Day Vulnerabilities 
• Vulnerabilities discovered by criminals within 
software, sold in Black Markets to the highest 
bidder 
Social Engineering 
• Targeted campaigns against key resources 
within an organization for the purpose of 
gaining access to confidential information 
Insider Threat 
• Disgruntled employees looking to get even 
• User mistakes (e.g. bringing data home) 
Best source for statistics: Verizon Data Breach Investigations Report
How Do Large Credit Card 
Breaches Happen? 
The Advanced Persistent Threat (“APT”) 
6 
Recon Infiltration 
Delivery & 
Exploitation 
Exfiltration Monetization 
Reconnaissance 
Adversaries probe targets for holes and vulnerabilities and/or steal 
credentials 
Infiltration 
Exploit these weaknesses to get inside 
Delivery & Exploitation 
Hook malware into processing streams 
Exfiltration 
Get data out as quietly as possible 
Monetization 
Data sold on the black market 
This can occur over months at a time
7 
Impact 
Reputational 
• Brand damage 
• Customers will seek alternative choices 
Financial and Liability 
• Stock price tumbles 
• Cost of data breach 
• Legal issues 
• Post-mortem audits – regulatory (e.g. HIPAA) 
or contractual (PCI)
So What is Blackbaud 
Doing?
Protection thru Technology 
9 
Strong Perimeter 
• Firewalls 
• IDS Control 
• DDoS 
• 2FA 
Access Control 
• Granted on an as needed basis 
• Role separation 
Password/Account Management 
Environment Awareness 
• Log and activity monitoring 
Data Centers 
• All tier III+ certified 
No Special cases
Protection thru People 
10 
Blackbaud Security Team 
• Dedicated to Security – complete focus 
• All personal heavily trained 
• High level of visibility 
Training 
• All employees receive security training – social engineering & best 
practices – annually and NEO 
• ITIL training 
Certifications 
• CISSP, GISM, GSEC, CCNA, CNSS, DoD 85 
Partnerships 
• PCI/SOC: Brightline CPAs 
• Pen-testing: Praetorian (annual rotation) 
• PCI validation scans: Qualys 
• Ethical hacking and forensics: eMagined Security Consultants 
Vendor Management 
• all service providers we use are required to meet or exceed our security 
standards
Protection thru Certifications 
11 
PCI – Credit Card 
• PCI level 1 – Annual Event, Brightline 
SSAE16 – PII, Best Practices – risk mitigation 
• SOC2, Level 2: based on Security, Availability, 
Confidentiality principles - Brightline 
• SOC1, Level 2: based on Financial Reporting for 
Ledger based products - Brightline 
ITIL Based 
• Annual Security Audit – 3rd Party, eMagined 
Security 
• Policy validation and Perimeter testing 
• Internal LAN – Ethical hacking; 
Credentialed and non-Credentialed
Protection thru Process 
12 
Security Patching – all platforms 
• Monthly and on-demand 
• Heartbleed, Shellshock 
Change Management 
• Rigorous process 
• Completely documented 
• Multi-level management approval 
Event and Incident Management 
• Complete log and event monitoring and response 
• 7X24 NOCC 
• eMagined on retainer and used often – false positives 
Security Testing 
• Vulnerability management (monthly) 
• Penetration testing / ethical hacking (annually and after major 
changes)
After all that… 
Are we completely 
Protected?

More Related Content

What's hot

Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...David Cunningham
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forwardNils Thulin
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachTeri Radichel
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedSteve Lodin
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญBAINIDA
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Santiago Bassett
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT securityDavid Strom
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in securityOsama Ellahi
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2Ron Miller
 
Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Kevin Murphy
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 

What's hot (20)

Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forward
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Data lake protection ft 3119 -ver1.0
Data lake protection   ft 3119 -ver1.0Data lake protection   ft 3119 -ver1.0
Data lake protection ft 3119 -ver1.0
 
Threat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - SubmittedThreat Intelligence 101 - Steve Lodin - Submitted
Threat Intelligence 101 - Steve Lodin - Submitted
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
ZoneFox, Machine Learning, the Insider Threat and how UEBA protects the user ...
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
 
Fears and fulfillment with IT security
Fears and fulfillment with IT securityFears and fulfillment with IT security
Fears and fulfillment with IT security
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
 
Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 

Similar to Moving to the Cloud: A Security and Hosting Introduction

Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUResilient Systems
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open SourceDonald Malloy
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Senior Management Awareness presetnation
Senior Management Awareness presetnationSenior Management Awareness presetnation
Senior Management Awareness presetnationNanda Mohan Shenoy
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 

Similar to Moving to the Cloud: A Security and Hosting Introduction (20)

Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Senior Management Awareness presetnation
Senior Management Awareness presetnationSenior Management Awareness presetnation
Senior Management Awareness presetnation
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 

More from Blackbaud

50 Fascinating Nonprofit Stats
50 Fascinating Nonprofit Stats50 Fascinating Nonprofit Stats
50 Fascinating Nonprofit StatsBlackbaud
 
Philanthropy by the Numbers: The story behind the stats
Philanthropy by the Numbers: The story behind the statsPhilanthropy by the Numbers: The story behind the stats
Philanthropy by the Numbers: The story behind the statsBlackbaud
 
npEXPERTS 2016: Philanthropy by the Numbers
npEXPERTS 2016: Philanthropy by the NumbersnpEXPERTS 2016: Philanthropy by the Numbers
npEXPERTS 2016: Philanthropy by the NumbersBlackbaud
 
5 Tips for Fundraising in an Election Year
5 Tips for Fundraising in an Election Year5 Tips for Fundraising in an Election Year
5 Tips for Fundraising in an Election YearBlackbaud
 
Anatomy of the Perfect Private School Landing Page
Anatomy of the Perfect Private School Landing PageAnatomy of the Perfect Private School Landing Page
Anatomy of the Perfect Private School Landing PageBlackbaud
 
New York NXT Roadshow
New York NXT Roadshow New York NXT Roadshow
New York NXT Roadshow Blackbaud
 
New York NXT Roadshow
New York NXT Roadshow New York NXT Roadshow
New York NXT Roadshow Blackbaud
 
The Cold Never Bothered You Anyway
The Cold Never Bothered You Anyway   The Cold Never Bothered You Anyway
The Cold Never Bothered You Anyway Blackbaud
 
What You Should be Doing with Master Schedule but May Not Know
What You Should be Doing with Master Schedule but May Not Know What You Should be Doing with Master Schedule but May Not Know
What You Should be Doing with Master Schedule but May Not Know Blackbaud
 
Trends in Affordability and Demand
Trends in Affordability and Demand   Trends in Affordability and Demand
Trends in Affordability and Demand Blackbaud
 
The Ripple Effect of Successful Implementation
The Ripple Effect of Successful ImplementationThe Ripple Effect of Successful Implementation
The Ripple Effect of Successful ImplementationBlackbaud
 
Using Hacks to Create Consistent and Awesome Video Content for Your Admission...
Using Hacks to Create Consistent and Awesome Video Content for Your Admission...Using Hacks to Create Consistent and Awesome Video Content for Your Admission...
Using Hacks to Create Consistent and Awesome Video Content for Your Admission...Blackbaud
 
The New Financial Aid Family
The New Financial Aid FamilyThe New Financial Aid Family
The New Financial Aid FamilyBlackbaud
 
The entrepreneurs a true babson story
The entrepreneurs a true babson story   The entrepreneurs a true babson story
The entrepreneurs a true babson story Blackbaud
 
Introduction to Inbound Marketing for Independent Schools
Introduction to Inbound Marketing for Independent SchoolsIntroduction to Inbound Marketing for Independent Schools
Introduction to Inbound Marketing for Independent SchoolsBlackbaud
 
Turning your newly enrolled families into annual fund donors
Turning your newly enrolled families into annual fund donors   Turning your newly enrolled families into annual fund donors
Turning your newly enrolled families into annual fund donors Blackbaud
 
The school’s guide to modern design trends corwin bermudez
The school’s guide to modern design trends   corwin bermudezThe school’s guide to modern design trends   corwin bermudez
The school’s guide to modern design trends corwin bermudezBlackbaud
 
Raiser's Edge Database Cleanup Tips
Raiser's Edge Database Cleanup TipsRaiser's Edge Database Cleanup Tips
Raiser's Edge Database Cleanup TipsBlackbaud
 
Maintaining a Healthy Database in The Education Edge
Maintaining a Healthy Database in The Education EdgeMaintaining a Healthy Database in The Education Edge
Maintaining a Healthy Database in The Education EdgeBlackbaud
 
Building Report Cards and Transcripts in The Education Edge
Building Report Cards and Transcripts in The Education EdgeBuilding Report Cards and Transcripts in The Education Edge
Building Report Cards and Transcripts in The Education EdgeBlackbaud
 

More from Blackbaud (20)

50 Fascinating Nonprofit Stats
50 Fascinating Nonprofit Stats50 Fascinating Nonprofit Stats
50 Fascinating Nonprofit Stats
 
Philanthropy by the Numbers: The story behind the stats
Philanthropy by the Numbers: The story behind the statsPhilanthropy by the Numbers: The story behind the stats
Philanthropy by the Numbers: The story behind the stats
 
npEXPERTS 2016: Philanthropy by the Numbers
npEXPERTS 2016: Philanthropy by the NumbersnpEXPERTS 2016: Philanthropy by the Numbers
npEXPERTS 2016: Philanthropy by the Numbers
 
5 Tips for Fundraising in an Election Year
5 Tips for Fundraising in an Election Year5 Tips for Fundraising in an Election Year
5 Tips for Fundraising in an Election Year
 
Anatomy of the Perfect Private School Landing Page
Anatomy of the Perfect Private School Landing PageAnatomy of the Perfect Private School Landing Page
Anatomy of the Perfect Private School Landing Page
 
New York NXT Roadshow
New York NXT Roadshow New York NXT Roadshow
New York NXT Roadshow
 
New York NXT Roadshow
New York NXT Roadshow New York NXT Roadshow
New York NXT Roadshow
 
The Cold Never Bothered You Anyway
The Cold Never Bothered You Anyway   The Cold Never Bothered You Anyway
The Cold Never Bothered You Anyway
 
What You Should be Doing with Master Schedule but May Not Know
What You Should be Doing with Master Schedule but May Not Know What You Should be Doing with Master Schedule but May Not Know
What You Should be Doing with Master Schedule but May Not Know
 
Trends in Affordability and Demand
Trends in Affordability and Demand   Trends in Affordability and Demand
Trends in Affordability and Demand
 
The Ripple Effect of Successful Implementation
The Ripple Effect of Successful ImplementationThe Ripple Effect of Successful Implementation
The Ripple Effect of Successful Implementation
 
Using Hacks to Create Consistent and Awesome Video Content for Your Admission...
Using Hacks to Create Consistent and Awesome Video Content for Your Admission...Using Hacks to Create Consistent and Awesome Video Content for Your Admission...
Using Hacks to Create Consistent and Awesome Video Content for Your Admission...
 
The New Financial Aid Family
The New Financial Aid FamilyThe New Financial Aid Family
The New Financial Aid Family
 
The entrepreneurs a true babson story
The entrepreneurs a true babson story   The entrepreneurs a true babson story
The entrepreneurs a true babson story
 
Introduction to Inbound Marketing for Independent Schools
Introduction to Inbound Marketing for Independent SchoolsIntroduction to Inbound Marketing for Independent Schools
Introduction to Inbound Marketing for Independent Schools
 
Turning your newly enrolled families into annual fund donors
Turning your newly enrolled families into annual fund donors   Turning your newly enrolled families into annual fund donors
Turning your newly enrolled families into annual fund donors
 
The school’s guide to modern design trends corwin bermudez
The school’s guide to modern design trends   corwin bermudezThe school’s guide to modern design trends   corwin bermudez
The school’s guide to modern design trends corwin bermudez
 
Raiser's Edge Database Cleanup Tips
Raiser's Edge Database Cleanup TipsRaiser's Edge Database Cleanup Tips
Raiser's Edge Database Cleanup Tips
 
Maintaining a Healthy Database in The Education Edge
Maintaining a Healthy Database in The Education EdgeMaintaining a Healthy Database in The Education Edge
Maintaining a Healthy Database in The Education Edge
 
Building Report Cards and Transcripts in The Education Edge
Building Report Cards and Transcripts in The Education EdgeBuilding Report Cards and Transcripts in The Education Edge
Building Report Cards and Transcripts in The Education Edge
 

Recently uploaded

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 

Recently uploaded (20)

The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 

Moving to the Cloud: A Security and Hosting Introduction

  • 1. Service Delivery Operations BBCON 2014 Ron Rainville – VP/Service Delivery Operations
  • 2. 2 Overview • Today’s Landscape • What is Blackbaud doing? • Protection thru technology • Protection thru people • Protection thru certifications • Protection thru process Blackbaud Confidential
  • 3. Today’s Landscape 3 Breaches in the News • Banks • Massive bank hack: What you need to know - CNN • Retailers • Home Depot hack could lead to $3 billion in fake charges – CBS News • Target store chain security breach • Healthcare • There is an epidemic of medical identity theft – USA Today • Universities • Ex-contractor says he hacked into U-Md. databases to alert others to security flaws – Washington Post • Governments • U.S. Probes Hacking of Government Computers at Personnel Agency – The Wall Street Journal
  • 4. Theft has been Automated and Targeted 4 A variety of adversaries • Script Kiddies • Organized Crime • Nation States The value of targeted data is rising • Cardholder data • Personally Identifiable Information (“PII”) • Protected Health Information (“PHI”) • Social network handles (Twitter, Facebook)
  • 5. 5 Attack Vectors Zero-Day Vulnerabilities • Vulnerabilities discovered by criminals within software, sold in Black Markets to the highest bidder Social Engineering • Targeted campaigns against key resources within an organization for the purpose of gaining access to confidential information Insider Threat • Disgruntled employees looking to get even • User mistakes (e.g. bringing data home) Best source for statistics: Verizon Data Breach Investigations Report
  • 6. How Do Large Credit Card Breaches Happen? The Advanced Persistent Threat (“APT”) 6 Recon Infiltration Delivery & Exploitation Exfiltration Monetization Reconnaissance Adversaries probe targets for holes and vulnerabilities and/or steal credentials Infiltration Exploit these weaknesses to get inside Delivery & Exploitation Hook malware into processing streams Exfiltration Get data out as quietly as possible Monetization Data sold on the black market This can occur over months at a time
  • 7. 7 Impact Reputational • Brand damage • Customers will seek alternative choices Financial and Liability • Stock price tumbles • Cost of data breach • Legal issues • Post-mortem audits – regulatory (e.g. HIPAA) or contractual (PCI)
  • 8. So What is Blackbaud Doing?
  • 9. Protection thru Technology 9 Strong Perimeter • Firewalls • IDS Control • DDoS • 2FA Access Control • Granted on an as needed basis • Role separation Password/Account Management Environment Awareness • Log and activity monitoring Data Centers • All tier III+ certified No Special cases
  • 10. Protection thru People 10 Blackbaud Security Team • Dedicated to Security – complete focus • All personal heavily trained • High level of visibility Training • All employees receive security training – social engineering & best practices – annually and NEO • ITIL training Certifications • CISSP, GISM, GSEC, CCNA, CNSS, DoD 85 Partnerships • PCI/SOC: Brightline CPAs • Pen-testing: Praetorian (annual rotation) • PCI validation scans: Qualys • Ethical hacking and forensics: eMagined Security Consultants Vendor Management • all service providers we use are required to meet or exceed our security standards
  • 11. Protection thru Certifications 11 PCI – Credit Card • PCI level 1 – Annual Event, Brightline SSAE16 – PII, Best Practices – risk mitigation • SOC2, Level 2: based on Security, Availability, Confidentiality principles - Brightline • SOC1, Level 2: based on Financial Reporting for Ledger based products - Brightline ITIL Based • Annual Security Audit – 3rd Party, eMagined Security • Policy validation and Perimeter testing • Internal LAN – Ethical hacking; Credentialed and non-Credentialed
  • 12. Protection thru Process 12 Security Patching – all platforms • Monthly and on-demand • Heartbleed, Shellshock Change Management • Rigorous process • Completely documented • Multi-level management approval Event and Incident Management • Complete log and event monitoring and response • 7X24 NOCC • eMagined on retainer and used often – false positives Security Testing • Vulnerability management (monthly) • Penetration testing / ethical hacking (annually and after major changes)
  • 13. After all that… Are we completely Protected?

Editor's Notes

  1. Today’s Security Landscape is dominated by negative news. From major banks to government organizations, not a week goes by before another possible data breach is announced. Links: Banks - http://money.cnn.com/2014/08/28/technology/security/bank-hack/ Retailers - http://www.cbsnews.com/news/credit-monitoring-company-home-depot-breach-could-result-in-2b-in-fraud/ Healthcare - http://www.usatoday.com/story/money/personalfinance/2014/09/13/identity-theft-hacking-medical/15345643/ Universities - http://www.washingtonpost.com/local/crime/former-contractor-calls-himself-whistleblower-in-exposing-security-problems-at-u-md/2014/04/10/7312699e-c0b3-11e3-b195-dd0c1174052c_story.html Governments - http://online.wsj.com/articles/u-s-probes-hacking-of-government-computers-at-personnel-agency-1404970913
  2. How did we get to where we are in the Security Landscape? Who are the main perpetrators when it comes to breaches? 3 main categories of attackers. Script Kiddies – Unskilled individuals who copy, modify, and use scripts to attack computer systems. Most are simply looking for glory or notoriety. They usually go after low-level hanging fruit Facebook accounts, gaming credentials, etc. Organized Crime – This group is compromised of highly skilled individuals that are pooling skills, resources and infrastructure for buying, selling, and trading stolen data. - http://www.washingtonpost.com/blogs/the-switch/wp/2014/04/22/hackers-are-getting-better-at-offense-companies-arent-getting-better-at-defense/ Nation States – Countries that can provide unlimited resources to groups of people employed by them to gain access to highly sensitive information on their enemies. - http://www.cnbc.com/id/101845869#. At the same time, as hacks get more complex and require more resources, the value of data begins to increase. As with all markets, it all depends on supply and demand. “A Twitter account costs more to purchase than a stolen credit card because the former’s account credentials potentially have a greater yield. Immediately after a large breach, freshly acquired credit cards command a higher price—as there is greater possibility for the credit cards to still be active. But after time, prices fall because the market becomes flooded” - http://blogs.wsj.com/corporate-intelligence/2014/03/28/whats-more-valuable-a-stolen-twitter-account-or-a-stolen-credit-card/ PHI is valued in order to exploit the prescription drug market. A user can change their credit card number, but they can’t change their health records
  3. These are the most common. Other attack vectors include: Weak authentication (e.g. easy to guess or weak passwords) Unpatched vulnerabilities Weak cryptography Wireless network sniffing Spyware on end user machines (e.g. keyloggers) Too much access (improper permissions) Simple user error (e.g. publishing sensitive data to a web site) Physical attacks (e.g. PoS skimming)
  4. Some notes taken from the “Lessons for SDO document”: What can we in Blackbaud Service Delivery Operations learn from this to improve our defense in depth? PCI Compliance is not the end goal; it is just the beginning. Receiving a PCI certification is intended to indicate compliance- and in Target’s case it seemed that wasn’t true either. Be vigilant for unusual activity. System administrators must learn to recognize social engineering attacks as well as processes and files on systems that don’t belong. Control access. In Target’s case, two‑factor authentication could have been used for granting remote access by third party vendors, making it more difficult to for the attackers to gain access. Firewalls and DMZs are not enough. Control networks. Target lacked sufficient security segregation boundaries to contain their vendors. And attackers sent data outward over FTP, indicating outbound well known ports to foreign servers were unblocked at the firewall. Assume any account can be used for malicious purposes and mitigate accordingly. To mitigate risks, we need to follow password requirements, principle of least privilege, separation of duties, and ensure service accounts cannot be used for login purposes. Configure technical controls and follow up on alerting. File integrity monitoring and intrusion detection can be effective security tools but we need to configure these appropriately and have the expertise necessary to manage response. In Target’s case, they had outsourced alerting but when escalated back to Target’s Security Operations Team at their US HQ, alerts went ignored. Protect vendor related information as confidential and proprietary. Target’s vendor information was posted publicly. Third-party vendors must be held to our security standards. In the case of Target Stores, the HVAC vendor could have disrupted infection using industry standard real-time anti-malware software. Instead, they used free Malwarebytes anti-malware intended for individual consumer use which did not work in real‑time.
  5. The impact of a breach can be measured in two main categories: Customer perception and Company perception. Target’s customer-perception level dropped to a negative score of 23 following their breach announcement. That means 23% more shoppers have a negative perception of the brand than have a positive perception. - http://blogs.marketwatch.com/behindthestorefront/2013/12/30/targets-reputation-takes-another-hit/ AP Twitter hack causes panic on Wall Street and sends Dow plunging - http://www.theguardian.com/business/2013/apr/23/ap-tweet-hack-wall-street-freefall How Main Street will pay for Home Depot’s data breach - http://www.businessweek.com/articles/2014-09-16/home-depot-breach-why-small-merchants-will-pay
  6. BBPS and Sphere store card info
  7. policy was created upon Blackbaud’s business plan