SlideShare a Scribd company logo
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Not “If,” but “When”
A CEO’s Guide to Cyberbreach Response
Jason Porter, Vice President of AT&T Solutions
Todd Waskelis, Executive Director of AT&T Security Consulting
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.2
Cyberbreach response
The Problem The Solution
• 62% of organizations acknowledge a data
breach in 2015
• Only 34% of organizations believe they have
an effective cyberresponse plan
• The number of successful cyberattacks
continues to grow year over year
• It takes an average of 229 days for a breach
to be detected
• Multi-layered, end-to-end cybersecurity
program
• Comprehensive, cyberbreach response
plan
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.3
Cyberbreach response plan
• Put your plan together BEFORE
your organization is breached
(or before your next data breach)
• Don’t wait for the aftermath
to figure out your best course
of action
• While each successful cyberattack
may have its unique attributes –
amount of data stolen, impact on
business operations, type of attack
– an effective plan will still serve as
a good guideline
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.4
Put your team together
• Your cyberbreach response team
should be ready to spring into
action the moment the breach
is discovered
• The team should include more
than IT personnel
– C-suite
– IT
– Legal
– Cybersecurity
– Public Relations/Marketing/
Communications
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.5
Practice
• Conduct response drills and
tabletop exercises with your team
regularly
• Make sure your team members
have “backups”
• Consider training from external
cybersecurity experts
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.6
Short-term response
The first 24 hours
1. Activate the incident response
plan
2. Remove or isolate the infection
3. Assess legal implications
4. Determine root cause
5. Involve the legal team
6. Define critical business impact
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.7
Long-term planning
• Along with drills and tabletops,
conduct education and training for
the entire staff
– More than half of data breaches
involve employee error
– These errors are drastically reduced
after repeated training and testing
• Conduct tabletop exercises and
drills at least twice a year
• Invest in prevention and detection
technologies to help defend against
the day-to-day attacks
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Poll 1
Does your organization have a cyberbreach response plan?
A. Yes
B. No
C. Not Sure
8
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.9
The four types of organizations
Progressive Proactive Reactive Passive
• Highest level of
security readiness
• C-suite involvement
• Comprehensive
cybersecurity
prevention and
response strategy
• Above-average
security readiness
• C-suite awareness
• Basic steps are put
in place
• Below-average
security readiness
• C-suite pays little to
no attention to
cybersecurity or
incident response
• Least ready
• C-suite is “hands
off” in matters of IT
and cybersecurity
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.10
Consider consultants
• Fresh pair of eyes
• Expertise in finding gaps
• Extensive knowledge of trending
threats, industry-specific attacks,
etc.
• They can assess your current
cybersecurity program and
evaluate or help prepare your
response plan
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Poll 2
Has your organization ever worked with a cybersecurity consultant?
A. Yes
B. No
C. Not Sure
11
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.12
Preparing for the inevitable
• Impossible to predict when
you’ll be hit
• The likelihood of cyberattacks
continues to increase
• Rapid, thorough response will
determine whether your data
breach is a minor footnote
or a major disruption
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Q&A
12
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated
companies. All other marks are the property of their respective owners. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change.
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.14
For more information
Cybersecurity Insights Reports
www.att.com/cybersecurity-insights
Security Resource Center
SecurityResourceCenter.att.com
Presentation title here—edit on Slide Master
© 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property
and/or AT&T affiliated companies. All other marks are the property of their respective owners.

More Related Content

Similar to Not If, But When: A CEO's Guide to Cyberbreach Response

Enterprise Global Messaging
Enterprise Global MessagingEnterprise Global Messaging
Enterprise Global Messaging
Jonathan Spinney
 
AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...
AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...
AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...
Amazon Web Services
 
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
DataWorks Summit/Hadoop Summit
 
Near Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and InterpretationNear Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and Interpretation
DataWorks Summit/Hadoop Summit
 
TAG IoT Summit - Why You Need a Strategy for the Internet of Things
TAG IoT Summit - Why You Need a Strategy for the Internet of ThingsTAG IoT Summit - Why You Need a Strategy for the Internet of Things
TAG IoT Summit - Why You Need a Strategy for the Internet of Things
Eric Sineath
 
AT&T Mobile App Hackathon (Smart City) - Berkeley
AT&T Mobile App Hackathon (Smart City) - BerkeleyAT&T Mobile App Hackathon (Smart City) - Berkeley
AT&T Mobile App Hackathon (Smart City) - Berkeley
Ed Donahue
 
AT&T Competitive Analysis
AT&T Competitive AnalysisAT&T Competitive Analysis
AT&T Competitive Analysis
AdManScott
 
Jason Yu, AT&T
Jason Yu, AT&TJason Yu, AT&T
Jason Yu, AT&T
Hilary Ip
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vault
Mohamed Abdelhakim
 
Getting Your Piece of the Mobile Pi 2017
Getting Your Piece of the Mobile Pi 2017Getting Your Piece of the Mobile Pi 2017
Getting Your Piece of the Mobile Pi 2017
Doug Sillars
 
truxtun banta
truxtun bantatruxtun banta
truxtun banta
Krystal Banta
 
TrainT&T - Intern Coding Challenge
TrainT&T - Intern Coding ChallengeTrainT&T - Intern Coding Challenge
TrainT&T - Intern Coding Challenge
Sally Kim
 
Mobile Performance at London Web Perf Mettup
Mobile Performance at London Web Perf MettupMobile Performance at London Web Perf Mettup
Mobile Performance at London Web Perf Mettup
Doug Sillars
 
MDU 301 v3
MDU 301 v3MDU 301 v3
MDU 301 v3
A.J. Mada
 
Mobile App Security: How Secure is your Mobile App
Mobile App Security: How Secure is your Mobile AppMobile App Security: How Secure is your Mobile App
Mobile App Security: How Secure is your Mobile App
Doug Sillars
 
June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465
Kirill Goncharuk
 
Evolving HetNets & the Project Callaborators and Coordinators to Guide it
Evolving HetNets & the Project Callaborators and Coordinators  to Guide itEvolving HetNets & the Project Callaborators and Coordinators  to Guide it
Evolving HetNets & the Project Callaborators and Coordinators to Guide it
Paula Doublin
 
(NET202) Connectivity Using Software-Defined Networking & Advanced API
(NET202) Connectivity Using Software-Defined Networking & Advanced API(NET202) Connectivity Using Software-Defined Networking & Advanced API
(NET202) Connectivity Using Software-Defined Networking & Advanced API
Amazon Web Services
 
Android App performance - Europe 2015
Android App performance - Europe 2015Android App performance - Europe 2015
Android App performance - Europe 2015
Doug Sillars
 
High Performance Apps: Tips for Speed, Power and Data
High Performance Apps: Tips for Speed, Power and DataHigh Performance Apps: Tips for Speed, Power and Data
High Performance Apps: Tips for Speed, Power and Data
Doug Sillars
 

Similar to Not If, But When: A CEO's Guide to Cyberbreach Response (20)

Enterprise Global Messaging
Enterprise Global MessagingEnterprise Global Messaging
Enterprise Global Messaging
 
AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...
AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...
AWS re:Invent 2016: Cloud agility and faster connectivity with AT&T NetBond a...
 
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
 
Near Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and InterpretationNear Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and Interpretation
 
TAG IoT Summit - Why You Need a Strategy for the Internet of Things
TAG IoT Summit - Why You Need a Strategy for the Internet of ThingsTAG IoT Summit - Why You Need a Strategy for the Internet of Things
TAG IoT Summit - Why You Need a Strategy for the Internet of Things
 
AT&T Mobile App Hackathon (Smart City) - Berkeley
AT&T Mobile App Hackathon (Smart City) - BerkeleyAT&T Mobile App Hackathon (Smart City) - Berkeley
AT&T Mobile App Hackathon (Smart City) - Berkeley
 
AT&T Competitive Analysis
AT&T Competitive AnalysisAT&T Competitive Analysis
AT&T Competitive Analysis
 
Jason Yu, AT&T
Jason Yu, AT&TJason Yu, AT&T
Jason Yu, AT&T
 
At&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vaultAt&t cybersecurity introduction with alien vault
At&t cybersecurity introduction with alien vault
 
Getting Your Piece of the Mobile Pi 2017
Getting Your Piece of the Mobile Pi 2017Getting Your Piece of the Mobile Pi 2017
Getting Your Piece of the Mobile Pi 2017
 
truxtun banta
truxtun bantatruxtun banta
truxtun banta
 
TrainT&T - Intern Coding Challenge
TrainT&T - Intern Coding ChallengeTrainT&T - Intern Coding Challenge
TrainT&T - Intern Coding Challenge
 
Mobile Performance at London Web Perf Mettup
Mobile Performance at London Web Perf MettupMobile Performance at London Web Perf Mettup
Mobile Performance at London Web Perf Mettup
 
MDU 301 v3
MDU 301 v3MDU 301 v3
MDU 301 v3
 
Mobile App Security: How Secure is your Mobile App
Mobile App Security: How Secure is your Mobile AppMobile App Security: How Secure is your Mobile App
Mobile App Security: How Secure is your Mobile App
 
June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465
 
Evolving HetNets & the Project Callaborators and Coordinators to Guide it
Evolving HetNets & the Project Callaborators and Coordinators  to Guide itEvolving HetNets & the Project Callaborators and Coordinators  to Guide it
Evolving HetNets & the Project Callaborators and Coordinators to Guide it
 
(NET202) Connectivity Using Software-Defined Networking & Advanced API
(NET202) Connectivity Using Software-Defined Networking & Advanced API(NET202) Connectivity Using Software-Defined Networking & Advanced API
(NET202) Connectivity Using Software-Defined Networking & Advanced API
 
Android App performance - Europe 2015
Android App performance - Europe 2015Android App performance - Europe 2015
Android App performance - Europe 2015
 
High Performance Apps: Tips for Speed, Power and Data
High Performance Apps: Tips for Speed, Power and DataHigh Performance Apps: Tips for Speed, Power and Data
High Performance Apps: Tips for Speed, Power and Data
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Not If, But When: A CEO's Guide to Cyberbreach Response

  • 1. © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Not “If,” but “When” A CEO’s Guide to Cyberbreach Response Jason Porter, Vice President of AT&T Solutions Todd Waskelis, Executive Director of AT&T Security Consulting
  • 2. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.2 Cyberbreach response The Problem The Solution • 62% of organizations acknowledge a data breach in 2015 • Only 34% of organizations believe they have an effective cyberresponse plan • The number of successful cyberattacks continues to grow year over year • It takes an average of 229 days for a breach to be detected • Multi-layered, end-to-end cybersecurity program • Comprehensive, cyberbreach response plan
  • 3. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.3 Cyberbreach response plan • Put your plan together BEFORE your organization is breached (or before your next data breach) • Don’t wait for the aftermath to figure out your best course of action • While each successful cyberattack may have its unique attributes – amount of data stolen, impact on business operations, type of attack – an effective plan will still serve as a good guideline
  • 4. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.4 Put your team together • Your cyberbreach response team should be ready to spring into action the moment the breach is discovered • The team should include more than IT personnel – C-suite – IT – Legal – Cybersecurity – Public Relations/Marketing/ Communications
  • 5. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.5 Practice • Conduct response drills and tabletop exercises with your team regularly • Make sure your team members have “backups” • Consider training from external cybersecurity experts
  • 6. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.6 Short-term response The first 24 hours 1. Activate the incident response plan 2. Remove or isolate the infection 3. Assess legal implications 4. Determine root cause 5. Involve the legal team 6. Define critical business impact
  • 7. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.7 Long-term planning • Along with drills and tabletops, conduct education and training for the entire staff – More than half of data breaches involve employee error – These errors are drastically reduced after repeated training and testing • Conduct tabletop exercises and drills at least twice a year • Invest in prevention and detection technologies to help defend against the day-to-day attacks
  • 8. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Poll 1 Does your organization have a cyberbreach response plan? A. Yes B. No C. Not Sure 8
  • 9. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.9 The four types of organizations Progressive Proactive Reactive Passive • Highest level of security readiness • C-suite involvement • Comprehensive cybersecurity prevention and response strategy • Above-average security readiness • C-suite awareness • Basic steps are put in place • Below-average security readiness • C-suite pays little to no attention to cybersecurity or incident response • Least ready • C-suite is “hands off” in matters of IT and cybersecurity
  • 10. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.10 Consider consultants • Fresh pair of eyes • Expertise in finding gaps • Extensive knowledge of trending threats, industry-specific attacks, etc. • They can assess your current cybersecurity program and evaluate or help prepare your response plan
  • 11. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Poll 2 Has your organization ever worked with a cybersecurity consultant? A. Yes B. No C. Not Sure 11
  • 12. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.12 Preparing for the inevitable • Impossible to predict when you’ll be hit • The likelihood of cyberattacks continues to increase • Rapid, thorough response will determine whether your data breach is a minor footnote or a major disruption
  • 13. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Q&A 12 © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change.
  • 14. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.14 For more information Cybersecurity Insights Reports www.att.com/cybersecurity-insights Security Resource Center SecurityResourceCenter.att.com
  • 15. Presentation title here—edit on Slide Master © 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.