SlideShare a Scribd company logo
Read the attached case on GunnAllen's experience with computer security and discuss whether
their strategy was the right one or whether they could have done something better.
Please and thank you! Exclusive: Anatomy of A Brokerage IT Meltdown Regulators last year
issued the SECs first-ever privacy fine against broker-dealer GunnAllen for failing to protect
customer data. But former II staffers say regulators didn"t seem to know half of this cautionary
tale of outsourcing and oversight gone wrong. By Mathew J. Schwart,, InformationWeck
October 08,2012 URL: http://wwwinformationweek com/securitylattacks'exelusive-anatomy-of-
a-brokerage-itmelv/240008569 The network slowdown was one of the first clues that something
was amiss at GunnAllen Financial, a now defunct broker-dealer whose IT problems were only a
symptom of widespread mismanagement and deeper misconduct at the firm. It was the spring of
2005. Over a period of roughly seven business days, traffic had slowed to a crawl at the Tampa,
Fla.-based firm, which had outsourced its II department to The Revere Group. GunnAllen's
acting ClO, a Revere Group partner, asked a member of the IT team to investigate. Dan
Saceavino, a former Revere Group employee who at the time served at GunnAllen as the IT
manager in charge of the help desk, laptops, and desktops, says he and another network engineer
eventually pinpointed the cause of the slowdown: A senior network engineer had disabled the
company's WatchGuard firewalls and routed all of the broker-dealer's IP traffic--including trades
and VoIP calls-through his home cable modem. As a result, none of the company's trades,
emails, or phone calls were being archived, in violation of Securities and Exchange Commission
regulations. Despite the fact that at least five people at The Revere Group knew about the
engineer's action, it's unclear whether it was reported at the time to GunnAllen or regulators. The
SEC didn't reference the incident in a subsequent announcement about a settiement with
GunnAllen for unrelated privacy and data security violations, and interviews with former Revere
Group employees reveal that regulators may have known about only a fruction of the data
security failures at the firm. What follows is a chronicle of one firm's myriad IT and other
missteps over a period of at least four years, as related by former employees and various official
documents. It's a cautionary tale of what happens when a company tosses all IT responsibility
over a wall and rarely peeks back. It also reveals what happens when an II outsourcing vendor
gets in over its head, and it points to the failures of regulators to identify and clean up a corporate
mess on a grand seale While these missteps go back as far as seven years, they have continuing
relevance today in the context of how businesses oversee outsourcing, information security,
regulatory, and employee matters.
Rogue Home Router Why would a network engineer route all of his employer's traffic through
his home RoadRunner cable modem? "You can direct where your traffic is going, and we found
out that he'd sent the traffic home to ensure that his routing patterns at work were correct,"
Saccavino told InformationWeek in a recent interview. But after a week, Saccavino said, he'd
forgotten to turn it off. During the week or so in 2005 that all brokerage traffic was being piped
through the home router, the data being sent by GunnAllen's 200 or so employees included bank
routing information, account balances, account and social security numbers, and customers'
home addresses and driver's license numbers, says Roger Sago, a former Revere Group SQL
Server database administrator who was working at the GunnAllen offices at the time. Sago was
in charge of defining the data stream to and from Pershing (a unit of Bank of New York Mellon
that provides prime brokerage and other services to financial services organizations), which
involved thousands of transactions per day. "They transmitted it over the system, online, to the
clearinghouse, and if anyone had access to that data ... the ramifications would be huge," Sago
said. "There's enough data there that a person could run off and live forever off of what they
found." Sago contacted InformationWeek, saying that the SEC s 2011 settlement announcement
relating to prior information security and privacy failures at GunnAllen had failed to mention
additional security breaches at the firm. By way of background, Sago filed a civil action-since
settled-against The Revere Group and GunnAllen in December 2008, alleging that he'd been
unfairly laid off. During the course of that lawsuit, Sago says he leamed about the undisclosed
breaches from other former employees. Because such security breaches must be reported to the
relevant authorities, Sago says he brought them to the attention of The Revere Group and
GunnAllen lawyers involved in his case and asked them to respond within 30 days-and
preferably, to report the incidents to the relevant authorities. When neither responded, according
to Sago, he says he then alerted the Federal Trade Commission, the Financial Industry
Regulatory Authority (FINRA), the SEC, and attorneys general in the 42 states where GunnAllen
had conducted business. Negligence, Incompetence, or Sabotage? Other former IT staffers, in
interviews with InformationWeek, confirmed Sago's assertions, saying the home router incident
was indicative of a pattern of either security negligence or incompetence--or possibly sabotage--
at GunnAllen, much of which could be traced to the previously mentioned senior network
engineer. "The network would get screwy over the weekend ... then [he] would show up, and five
minutes in on a Monday, he'd fix the problem," Saceavino said. It's the opinion of Thomas
Lynott, a former senior systems engineer at Revere Group who worked at GunnAllen at the time,
that the network engineer's actions suggested a pattern of sabotage. "He'd purposefully break
things, then come in in the moming and be the hero," Lynott
claimed. "I ended up key-logging all the servers, and I logged him logging in from home at 2:30
in the morning, logging on to BlackBerry servers and breaking them." After the router incident
was brought to the attention of the acting CIO, the offending network engineer received a
"written warning and corrective action plan" from his manager, Jerome DiMarzio, the Revere
Group IT operations manager assigned to GunnAllen. DiMarzio reported to the acting CIO.
DiMarzio's "confidential memorandum" to the network engineer-dated August 24, 2005, and
copied to the acting GunnAllen CIO as well as a Revere Group HR official-outlines episodes
involving "insubordination and/or indifference" as well as "dereliction of duty," including failure
to obtain formal change control permission for undertaking BlackBerry server maintenance,
rebooting the Cisco Call Manager, rebooting the domain controller "without ensuring it had fully
recovered," and "changing the default gateway for Exchange." The memorandum, which
DiMarzio confirmed as legitimate, also accused the network engineer of "purposely pulling a
cable out of a production environment in order that you would not have to travel to Jacksonville
to attend an HP event at the request of the CIO." It also accused him of failing to identify the root
cause of problems, including a Microsof Exchange "data store corruption" and "BlackBerry
server MAPI profile loss," and failing to note that logging had been disabled on the company's
WatchGuard firewalls. Officials from The Revere Group, including president and COO Todd
Miller and CEO Michael Parks, didn't respond to multiple email requests from InformationWeek
to comment on the episodes detailed by the former employees. Our multiple calls to The Revere
Group seeking comment also weren't retumed. Keep Quiet Lynott said he'd been brought in to
clean up one case in which the engineer pulled tables from a server to crash it so he could skip an
offsite meeting. "But if you pull tables out, you can corrupt data, transactions, all sorts of stuff,"
Lynott said. "I don't know whether or not it was intentionally turmed off or due to incompetence,
but the end result was when I brought it to their attention, I was told to turn it on and not tell
anybody. We were told on so many occasions not to tell anyone anything." Another alleged
incident at GunnAllen involved a database that had been set to disable email logging, though
SEC regulations require broker-dealers to retain copies of all emails for seven years. "For email,
they did all the transaction logging, where they'd send all mail incoming and outgoing and they'd
log it all offsite," Lynott said. "There was a point in time for probably two months where no
one's email was logged. I brought it up in a meeting once and was told to shut up [by the acting
CIO]," he said. "The protocol from the CIO was to shut your mouth, don't say anything, and just
brush it under the rug," Lynott said.
The former acting ClO of GunnAllen didn't respond to our requests for comment, sent via
LinkedIn. Revere Group officials didn't respond to our request for the former CIO's current
contact information. Microsoft Threatens Shutdown Not all of GunnAllen's alleged IT missteps
had SEC implications. One incident detailed by two former employees involved unpaid
Microsoft SQL Server licenses. The Revere Group had been receiving from Microsoft license-
renewal bills for GunnAllen, which the acting CIO had ignored, according to the two former
employees. Ultimately, Microsoft issued a final warning with a bill for about $20,000, saying it
would disable the license at a specified date and time. "It was like an hour or two before the
deadline--before Microsoft shuts the SQL servers down, which would bring GunnAllen to its
knees," Saccavino recalled. That ultimatum led one of DiMarzio's employees to contact
Microsoft and share GunnAllen's licensing details. But two former employees say the acting CIO
at the time, when given the licensing news and bill by the employee, threatened to fire the
employee if he spoke of the matter again. In another incident, DiMarzio relates that an internal
network project plan he first delivered in the spring of 2005 to help GunnAllen comply with the
Sarbanes-Oxley Act was dismissed by the acting CIO. When, in January 2006, DiMarzio heard
that he was to be replaced, he reached out to a GunnAllen executive for perspective on the matter
and was allegedly told that the acting CIO's incentive plan included a bonus tied to the longevity
of the SOX project. DiMarzio says he also heard at the time that multiple GunnAllen executives,
fed up with the pace of the SOX work, were calling for The Revere Group's contract to be
canceled. DiMarzio said he immediately held a conference call with a Revere Group HR official,
as well as the acting CIO's boss at The Revere Group, to bring the concerns to their attention. He
also requested that the meeting participants not identify him to the acting CIO as the source of
the information. But the next week, DiMarzio said, he was called into the acting CIO's office and
told to sign a resignation letter in exchange for receiving severance benefits. DiMarzio said he
signed the letter and never looked back. In September 2008, Sago said, he too was dismissed by
The Revere Group. Revere ascribed the layoff to declining market conditions, though Sago said
that after strong work reviews during his 11 years with the company, he was offered only two
weeks of severance pay instead of the standard two weeks per year of employment. Sago rejected
the severance offer, filed a civil action for harassment, retaliation, and unfair treatment, and
entered into arbitration with his former employer in October 2009 , at which time he says he
learned about the home router incident, among other IT incidents. Ultimately, Sago and The
Revere Group settled out of court. Regulatory Sanctions GunnAllen's IT failures paralleled larger
business problems. Formerly known as Napex Financial Corp., GunnAllen was founded in 1996
by Donald Gunn and Richard "Allen" Frueh. GunnAllen
provided a place for brokers and dealers, who must be associated with a FINRA member firm in
order to trade, to hang their shingle. But by 2008 , senior members of the firm had come under
fire for not properly vetting those brokers or monitoring what they were doing in the name of
GunnAllen. Notably, 2008 was when FINRA fined GunnAllen $750,000 for a "trade allocation
scheme" conducted by former head trader Alexis J. Rivera. "In 2002 and 2003 , the firm, acting
through Rivera, engaged in a 'cherry picking' scheme in which Rivera allocated profitable stock
trades to his wife's personal account instead of to the accounts of firm customers," according to
FINRA. "Rivera garnered improper profits of more than $270,000 through this misconduct,
which violated the anti-fraud provisions of the federal securities laws and FINRA rules. Rivera
was barred in December 2006." FINRA accused GunnAllen's investment division of doing
business with companies, then failing to inform the broker-dealer's own compliance department
that those companies should be placed on a restricted or watch list for investments, as is required
by the agency. FINRA also said the brokerage failed to safeguard non-public information in its
investment division, meaning that other employees could have profited from insider information.
Finally, FINRA accused GunnAllen of "failing to preserve emails and instant messages." A lack
of top-down oversight of Michigan-based GunnAllen broker Frank Bluestein ultimately led to
the firm's demise. Bluestein resold investments on behalf of Ed May, who FINRA said "created
and marketed unregistered investments" to an estimated 1,500 investors under the company he
ran, E-M Management Co., LLC. In 2007, the SEC charged May with fraud, for allegedy
running a Ponzi scheme focused on a fictitious Las Vegas casino and fake telecommunications
equipment and leasing deals that took in more than $250 million before being discovered and
stopped. In 2009, the SEC also charged Bluestein with fraud. According to the SEC complaint,
from 2002 to 2007 Bluestein ran seminars that "lured elderly investors into refinancing the
mortgages on their homes," ultimately recruiting about 800 investors and securing $74 million in
investments. In April 2011, May plead guilty to 59 counts of mail fraud, received a 16-year
prison sentence, and was ordered to pay a $250,000 fine. Bluestein, however, denied all
knowledge of the Ponzi scheme, citing in his defense that he'd personally purchased the
investments being sold by May. Regardless, GunnAllen faced a volley of investor lawsuits after
the SEC's 2009 allegations. By March 2010, FINRA found that GunnAllen no longer had
sufficient net capital to trade and closed the firm, leading to the layoff of 400 employees. By
November 2010, GunnAllen had been liquidated. First-Ever Standalone SEC Privacy Fine
Although GunnAllen went bankrupt, regulators weren't done with it. The SEC in 2011 accused
two former employees--president Frederick O. Kraus and national sales manager David C.
Levine-of having inappropriately used GunnAllen customer data, and it fined them each
$20,000. The SEC also slammed GunnAllen's former chief compliance officer, Mark A. Ellis,
for having failed to put in place or enforce proper policies and procedures for protecting
customer information. It fined Ellis $15,000. The agency noted that the broker-dealer's written
policies were "vague" and turned out to be little more than a rewording of the actual SEC
regulations. As for the alleged security breaches related to InformationWeek by the former
Revere Group employees, a 2010 SEC enforcement action against former GunnAllen executives
detailed multiple security incidents, but not the full extent of the breaches alleged by the former
employees, which included at least one missing laptop containing financial information.
Likewise, the home router incident didn't even come to light until 2009, one year after FINRA
fined GunnAllen. New SEC Violations Emerge In June 2011 , Sago detailed the additional
security violations in a six-page letter to the SECs Miami office, which had conducted the
GunnAllen investigation. The agency's associate director of enforcement in Miami, who was in
charge of the investigation, didn't respond to multiple calls and emails seeking comment on
Sago's allegations, whether the investigation was still open, or whether the additional revelations
might lead to any new fines or sanctions against current or fommer employees of GunnAllen or
The Revere Group. A spokeswoman for the SEC, reached by phone, declined to comment on any
of those questions. In the bigger picture, it's unclear where the SEC was during all of this
activity. "How is it that GunnAllen was an examined entity and they had no security policy?"
said independent privacy expert Andrew M. Smith, an attorney at Morrison & Foerster. "Say
you're 25 years old, recently graduated college, you're an SEC inspector, what's the first thing
you're going to do? You're going to ask for their policies and procedures, and when you see that
it takes up less than a quarter of a page, there's going to be something wrong." Of course, that
perspective assumes that the SEC or FINRA had in fact audited GunnAllen's compliance. "Is it
possible that they never examined this broker-dealer? If so, that's fair enough," Smith says. In
fact, it's not clear if FINRA or the SEC ever audited GunnAllen's policies before they began their
relevant enforcement actions, or whether the additional security violation revelations detailed by
Sago in mid-2011 might lead the agencies to reopen their investigation. Officials at both FINRA
and the SEC declined to comment on any examinations or audits their agencies may have
conducted of GunnAllen. But FINRA's publicly accessible records for GunnAllen make no
mention of the agency having audited or examined the company before evidence of the Ponzi
scheme emerged. What could have been done to help the SEC spot brokerages with poor IT
policies? In 2008, the agency proposed amendments to Regulation S-P, also known as the
Safeguard Rule, to increase customer data protection requirements for the businesses it regulates.
According to Chris Wolf, an attorney who directs law firm Hogan Lovells' privacy and
information management practice. these include requiring "a written security program,
identification of specific employees to run it,
identification of documentation for reasonably foreseeable security risks, as well as
implementation of safeguards for managing those risks, as well as training, oversight, and so on,
including for providers." Wolf added, "It would also have a data breach notification obligation,
which currently does not exist." But those proposed amendments have remained stalled since
they were first proposed in March 2008. An SEC spokeswoman declined to comment on the
status of the proposed Reg S-P amendments, or whether the agency is still backing them. Life
After GunnAllen Knowing what they now know, would the Revere Group IT employees who
worked at GunnAllen have done anything differently? "Things probably should have been told
directly to GunnAllen, but we were in such fear of keeping our jobs," Lynott said. "Looking back
and thinking back now, I probably would have gone back and told the GunnAllen people. But
they may already have known." Ultimately, Lynott said, he quit The Revere Group. "I got to the
point where I morally couldn't go to work anymore," he said. One week after he left, he heard
that the network engineer who'd allegedly sabotaged the IT systems was fired. Saccavino,
meanwhile, said he suspects GunnAllen had no idea what was happening in the IT department.
"They weren't told the whole truth, and I don't think they were told even part of the truth," he
said. "Shame on them for not having a check and balance in place, but you can't blame them for
being the victim." Smith, the privacy expert, offered four takeaways for any company that
outsources its IT department: "One, you need to do your due diligence up front so you know that
your service provider can keep this safe. Two, you need to have contractual obligations that
allow you to keep this data safe, and audit that. Three, monitor so you know it's safe. And four, if
there's unauthorized access, have your service provider notify you promptly."

More Related Content

Similar to Read the attached case on GunnAllens experience with computer secur.pdf

gov.uscourts.nysd.447158.61.0.pdf
gov.uscourts.nysd.447158.61.0.pdfgov.uscourts.nysd.447158.61.0.pdf
gov.uscourts.nysd.447158.61.0.pdf
HRBExposed
 
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
FitCEO, Inc. (FCI)
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
Protected Harbor
 
40 of U.S. government Web sites fail security testRelatedRELA.docx
40 of U.S. government Web sites fail security testRelatedRELA.docx40 of U.S. government Web sites fail security testRelatedRELA.docx
40 of U.S. government Web sites fail security testRelatedRELA.docx
gilbertkpeters11344
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil GodwinClear Technologies
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
FitCEO, Inc. (FCI)
 
Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006
tom termini
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
todd521
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Dulanja Liyanage
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
OilPriceInformationService
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
NetIQ
 
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
Executive Leaders Network
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
Spark Security
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
tidwellveronique
 
B crisis
B crisisB crisis
B crisis
Jose Patrick
 
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
Raj Goel
 
How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card Breach
Teradata
 

Similar to Read the attached case on GunnAllens experience with computer secur.pdf (20)

gov.uscourts.nysd.447158.61.0.pdf
gov.uscourts.nysd.447158.61.0.pdfgov.uscourts.nysd.447158.61.0.pdf
gov.uscourts.nysd.447158.61.0.pdf
 
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
40 of U.S. government Web sites fail security testRelatedRELA.docx
40 of U.S. government Web sites fail security testRelatedRELA.docx40 of U.S. government Web sites fail security testRelatedRELA.docx
40 of U.S. government Web sites fail security testRelatedRELA.docx
 
3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin3 Reasons Why IT puts Us at Risk by Phil Godwin
3 Reasons Why IT puts Us at Risk by Phil Godwin
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006Bluedog Rescues the FTC - eWeek Magazine 103006
Bluedog Rescues the FTC - eWeek Magazine 103006
 
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docxRunning head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
Running head SOCIAL ENGINEERING1SOCIAL ENGINEERING 6As a .docx
 
Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016Cybersecurity White Paper 05_2016
Cybersecurity White Paper 05_2016
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
The Great Data Migration, Dealing With Cybersecurity and Privacy in Legacy Da...
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
B crisis
B crisisB crisis
B crisis
 
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
2011 10 19 Raj Goel Isc2 Secure Boston Cloud Computing Oversharing Over Colle...
 
How We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card BreachHow We Did It: The Case of the Credit Card Breach
How We Did It: The Case of the Credit Card Breach
 

More from AlphaVision2

Question content area top Part 1 Weights (kg) of poplar trees were o.pdf
Question content area top Part 1 Weights (kg) of poplar trees were o.pdfQuestion content area top Part 1 Weights (kg) of poplar trees were o.pdf
Question content area top Part 1 Weights (kg) of poplar trees were o.pdf
AlphaVision2
 
QUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdf
QUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdfQUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdf
QUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdf
AlphaVision2
 
Question-1 (courier Services) As an employee of a large courier and .pdf
Question-1 (courier Services) As an employee of a large courier and .pdfQuestion-1 (courier Services) As an employee of a large courier and .pdf
Question-1 (courier Services) As an employee of a large courier and .pdf
AlphaVision2
 
Question Content AreaCost flow is in the reverse order in which co.pdf
Question Content AreaCost flow is in the reverse order in which co.pdfQuestion Content AreaCost flow is in the reverse order in which co.pdf
Question Content AreaCost flow is in the reverse order in which co.pdf
AlphaVision2
 
QUESTION TWODescribe the various ecological issues facing project.pdf
QUESTION TWODescribe the various ecological issues facing project.pdfQUESTION TWODescribe the various ecological issues facing project.pdf
QUESTION TWODescribe the various ecological issues facing project.pdf
AlphaVision2
 
Recuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdf
Recuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdfRecuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdf
Recuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdf
AlphaVision2
 
Question 6The IT department of a company has just rolled out a vir.pdf
Question 6The IT department of a company has just rolled out a vir.pdfQuestion 6The IT department of a company has just rolled out a vir.pdf
Question 6The IT department of a company has just rolled out a vir.pdf
AlphaVision2
 
Receiving a COVID vaccine causes a persons immune system to produce.pdf
Receiving a COVID vaccine causes a persons immune system to produce.pdfReceiving a COVID vaccine causes a persons immune system to produce.pdf
Receiving a COVID vaccine causes a persons immune system to produce.pdf
AlphaVision2
 
Recapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdf
Recapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdfRecapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdf
Recapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdf
AlphaVision2
 
Read two op-eds on the issue of Voter ID. The first op-ed should be .pdf
Read two op-eds on the issue of Voter ID. The first op-ed should be .pdfRead two op-eds on the issue of Voter ID. The first op-ed should be .pdf
Read two op-eds on the issue of Voter ID. The first op-ed should be .pdf
AlphaVision2
 
Read the Resolving Ethical Business Challenges case at the covering .pdf
Read the Resolving Ethical Business Challenges case at the covering .pdfRead the Resolving Ethical Business Challenges case at the covering .pdf
Read the Resolving Ethical Business Challenges case at the covering .pdf
AlphaVision2
 
Read the book of First Corinthians, chapter 12. Among three top reas.pdf
Read the book of First Corinthians, chapter 12. Among three top reas.pdfRead the book of First Corinthians, chapter 12. Among three top reas.pdf
Read the book of First Corinthians, chapter 12. Among three top reas.pdf
AlphaVision2
 
Read Case Study below �How Secure Is BYOD� and answer the questions.pdf
Read Case Study below �How Secure Is BYOD� and answer the questions.pdfRead Case Study below �How Secure Is BYOD� and answer the questions.pdf
Read Case Study below �How Secure Is BYOD� and answer the questions.pdf
AlphaVision2
 
Rather than being sold on invention, VW realized that sometimes peop.pdf
Rather than being sold on invention, VW realized that sometimes peop.pdfRather than being sold on invention, VW realized that sometimes peop.pdf
Rather than being sold on invention, VW realized that sometimes peop.pdf
AlphaVision2
 
Question content area top Part 1 Brett Enterprises had the following.pdf
Question content area top Part 1 Brett Enterprises had the following.pdfQuestion content area top Part 1 Brett Enterprises had the following.pdf
Question content area top Part 1 Brett Enterprises had the following.pdf
AlphaVision2
 
Ravi es el director ejecutivo de una empresa de revistas. Quiere div.pdf
Ravi es el director ejecutivo de una empresa de revistas. Quiere div.pdfRavi es el director ejecutivo de una empresa de revistas. Quiere div.pdf
Ravi es el director ejecutivo de una empresa de revistas. Quiere div.pdf
AlphaVision2
 
Rate of Return if state occursState of EconomyProbabilitySto.pdf
Rate of Return if state occursState of EconomyProbabilitySto.pdfRate of Return if state occursState of EconomyProbabilitySto.pdf
Rate of Return if state occursState of EconomyProbabilitySto.pdf
AlphaVision2
 
Raphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdf
Raphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdfRaphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdf
Raphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdf
AlphaVision2
 
Rank the given minerals in terms of their rate of weathering from fa.pdf
Rank the given minerals in terms of their rate of weathering from fa.pdfRank the given minerals in terms of their rate of weathering from fa.pdf
Rank the given minerals in terms of their rate of weathering from fa.pdf
AlphaVision2
 
Random married men, all retired, were classified according to educat.pdf
Random married men, all retired, were classified according to educat.pdfRandom married men, all retired, were classified according to educat.pdf
Random married men, all retired, were classified according to educat.pdf
AlphaVision2
 

More from AlphaVision2 (20)

Question content area top Part 1 Weights (kg) of poplar trees were o.pdf
Question content area top Part 1 Weights (kg) of poplar trees were o.pdfQuestion content area top Part 1 Weights (kg) of poplar trees were o.pdf
Question content area top Part 1 Weights (kg) of poplar trees were o.pdf
 
QUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdf
QUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdfQUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdf
QUESTION 7 Buffleheads are small diving ducks that primarily eat aqu.pdf
 
Question-1 (courier Services) As an employee of a large courier and .pdf
Question-1 (courier Services) As an employee of a large courier and .pdfQuestion-1 (courier Services) As an employee of a large courier and .pdf
Question-1 (courier Services) As an employee of a large courier and .pdf
 
Question Content AreaCost flow is in the reverse order in which co.pdf
Question Content AreaCost flow is in the reverse order in which co.pdfQuestion Content AreaCost flow is in the reverse order in which co.pdf
Question Content AreaCost flow is in the reverse order in which co.pdf
 
QUESTION TWODescribe the various ecological issues facing project.pdf
QUESTION TWODescribe the various ecological issues facing project.pdfQUESTION TWODescribe the various ecological issues facing project.pdf
QUESTION TWODescribe the various ecological issues facing project.pdf
 
Recuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdf
Recuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdfRecuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdf
Recuerde la Aplicaci�n sobre la propiedad intelectual en las cuentas.pdf
 
Question 6The IT department of a company has just rolled out a vir.pdf
Question 6The IT department of a company has just rolled out a vir.pdfQuestion 6The IT department of a company has just rolled out a vir.pdf
Question 6The IT department of a company has just rolled out a vir.pdf
 
Receiving a COVID vaccine causes a persons immune system to produce.pdf
Receiving a COVID vaccine causes a persons immune system to produce.pdfReceiving a COVID vaccine causes a persons immune system to produce.pdf
Receiving a COVID vaccine causes a persons immune system to produce.pdf
 
Recapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdf
Recapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdfRecapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdf
Recapitulation via hypermorphosisRecapitulation via neoteny WQ3 P.pdf
 
Read two op-eds on the issue of Voter ID. The first op-ed should be .pdf
Read two op-eds on the issue of Voter ID. The first op-ed should be .pdfRead two op-eds on the issue of Voter ID. The first op-ed should be .pdf
Read two op-eds on the issue of Voter ID. The first op-ed should be .pdf
 
Read the Resolving Ethical Business Challenges case at the covering .pdf
Read the Resolving Ethical Business Challenges case at the covering .pdfRead the Resolving Ethical Business Challenges case at the covering .pdf
Read the Resolving Ethical Business Challenges case at the covering .pdf
 
Read the book of First Corinthians, chapter 12. Among three top reas.pdf
Read the book of First Corinthians, chapter 12. Among three top reas.pdfRead the book of First Corinthians, chapter 12. Among three top reas.pdf
Read the book of First Corinthians, chapter 12. Among three top reas.pdf
 
Read Case Study below �How Secure Is BYOD� and answer the questions.pdf
Read Case Study below �How Secure Is BYOD� and answer the questions.pdfRead Case Study below �How Secure Is BYOD� and answer the questions.pdf
Read Case Study below �How Secure Is BYOD� and answer the questions.pdf
 
Rather than being sold on invention, VW realized that sometimes peop.pdf
Rather than being sold on invention, VW realized that sometimes peop.pdfRather than being sold on invention, VW realized that sometimes peop.pdf
Rather than being sold on invention, VW realized that sometimes peop.pdf
 
Question content area top Part 1 Brett Enterprises had the following.pdf
Question content area top Part 1 Brett Enterprises had the following.pdfQuestion content area top Part 1 Brett Enterprises had the following.pdf
Question content area top Part 1 Brett Enterprises had the following.pdf
 
Ravi es el director ejecutivo de una empresa de revistas. Quiere div.pdf
Ravi es el director ejecutivo de una empresa de revistas. Quiere div.pdfRavi es el director ejecutivo de una empresa de revistas. Quiere div.pdf
Ravi es el director ejecutivo de una empresa de revistas. Quiere div.pdf
 
Rate of Return if state occursState of EconomyProbabilitySto.pdf
Rate of Return if state occursState of EconomyProbabilitySto.pdfRate of Return if state occursState of EconomyProbabilitySto.pdf
Rate of Return if state occursState of EconomyProbabilitySto.pdf
 
Raphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdf
Raphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdfRaphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdf
Raphael y Martina est�n comprometidos y planean viajar a Las Vegas.pdf
 
Rank the given minerals in terms of their rate of weathering from fa.pdf
Rank the given minerals in terms of their rate of weathering from fa.pdfRank the given minerals in terms of their rate of weathering from fa.pdf
Rank the given minerals in terms of their rate of weathering from fa.pdf
 
Random married men, all retired, were classified according to educat.pdf
Random married men, all retired, were classified according to educat.pdfRandom married men, all retired, were classified according to educat.pdf
Random married men, all retired, were classified according to educat.pdf
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Read the attached case on GunnAllens experience with computer secur.pdf

  • 1. Read the attached case on GunnAllen's experience with computer security and discuss whether their strategy was the right one or whether they could have done something better. Please and thank you! Exclusive: Anatomy of A Brokerage IT Meltdown Regulators last year issued the SECs first-ever privacy fine against broker-dealer GunnAllen for failing to protect customer data. But former II staffers say regulators didn"t seem to know half of this cautionary tale of outsourcing and oversight gone wrong. By Mathew J. Schwart,, InformationWeck October 08,2012 URL: http://wwwinformationweek com/securitylattacks'exelusive-anatomy-of- a-brokerage-itmelv/240008569 The network slowdown was one of the first clues that something was amiss at GunnAllen Financial, a now defunct broker-dealer whose IT problems were only a symptom of widespread mismanagement and deeper misconduct at the firm. It was the spring of 2005. Over a period of roughly seven business days, traffic had slowed to a crawl at the Tampa, Fla.-based firm, which had outsourced its II department to The Revere Group. GunnAllen's acting ClO, a Revere Group partner, asked a member of the IT team to investigate. Dan Saceavino, a former Revere Group employee who at the time served at GunnAllen as the IT manager in charge of the help desk, laptops, and desktops, says he and another network engineer eventually pinpointed the cause of the slowdown: A senior network engineer had disabled the company's WatchGuard firewalls and routed all of the broker-dealer's IP traffic--including trades and VoIP calls-through his home cable modem. As a result, none of the company's trades, emails, or phone calls were being archived, in violation of Securities and Exchange Commission regulations. Despite the fact that at least five people at The Revere Group knew about the engineer's action, it's unclear whether it was reported at the time to GunnAllen or regulators. The SEC didn't reference the incident in a subsequent announcement about a settiement with GunnAllen for unrelated privacy and data security violations, and interviews with former Revere Group employees reveal that regulators may have known about only a fruction of the data security failures at the firm. What follows is a chronicle of one firm's myriad IT and other missteps over a period of at least four years, as related by former employees and various official documents. It's a cautionary tale of what happens when a company tosses all IT responsibility over a wall and rarely peeks back. It also reveals what happens when an II outsourcing vendor gets in over its head, and it points to the failures of regulators to identify and clean up a corporate mess on a grand seale While these missteps go back as far as seven years, they have continuing relevance today in the context of how businesses oversee outsourcing, information security, regulatory, and employee matters. Rogue Home Router Why would a network engineer route all of his employer's traffic through
  • 2. his home RoadRunner cable modem? "You can direct where your traffic is going, and we found out that he'd sent the traffic home to ensure that his routing patterns at work were correct," Saccavino told InformationWeek in a recent interview. But after a week, Saccavino said, he'd forgotten to turn it off. During the week or so in 2005 that all brokerage traffic was being piped through the home router, the data being sent by GunnAllen's 200 or so employees included bank routing information, account balances, account and social security numbers, and customers' home addresses and driver's license numbers, says Roger Sago, a former Revere Group SQL Server database administrator who was working at the GunnAllen offices at the time. Sago was in charge of defining the data stream to and from Pershing (a unit of Bank of New York Mellon that provides prime brokerage and other services to financial services organizations), which involved thousands of transactions per day. "They transmitted it over the system, online, to the clearinghouse, and if anyone had access to that data ... the ramifications would be huge," Sago said. "There's enough data there that a person could run off and live forever off of what they found." Sago contacted InformationWeek, saying that the SEC s 2011 settlement announcement relating to prior information security and privacy failures at GunnAllen had failed to mention additional security breaches at the firm. By way of background, Sago filed a civil action-since settled-against The Revere Group and GunnAllen in December 2008, alleging that he'd been unfairly laid off. During the course of that lawsuit, Sago says he leamed about the undisclosed breaches from other former employees. Because such security breaches must be reported to the relevant authorities, Sago says he brought them to the attention of The Revere Group and GunnAllen lawyers involved in his case and asked them to respond within 30 days-and preferably, to report the incidents to the relevant authorities. When neither responded, according to Sago, he says he then alerted the Federal Trade Commission, the Financial Industry Regulatory Authority (FINRA), the SEC, and attorneys general in the 42 states where GunnAllen had conducted business. Negligence, Incompetence, or Sabotage? Other former IT staffers, in interviews with InformationWeek, confirmed Sago's assertions, saying the home router incident was indicative of a pattern of either security negligence or incompetence--or possibly sabotage-- at GunnAllen, much of which could be traced to the previously mentioned senior network engineer. "The network would get screwy over the weekend ... then [he] would show up, and five minutes in on a Monday, he'd fix the problem," Saceavino said. It's the opinion of Thomas Lynott, a former senior systems engineer at Revere Group who worked at GunnAllen at the time, that the network engineer's actions suggested a pattern of sabotage. "He'd purposefully break things, then come in in the moming and be the hero," Lynott claimed. "I ended up key-logging all the servers, and I logged him logging in from home at 2:30 in the morning, logging on to BlackBerry servers and breaking them." After the router incident
  • 3. was brought to the attention of the acting CIO, the offending network engineer received a "written warning and corrective action plan" from his manager, Jerome DiMarzio, the Revere Group IT operations manager assigned to GunnAllen. DiMarzio reported to the acting CIO. DiMarzio's "confidential memorandum" to the network engineer-dated August 24, 2005, and copied to the acting GunnAllen CIO as well as a Revere Group HR official-outlines episodes involving "insubordination and/or indifference" as well as "dereliction of duty," including failure to obtain formal change control permission for undertaking BlackBerry server maintenance, rebooting the Cisco Call Manager, rebooting the domain controller "without ensuring it had fully recovered," and "changing the default gateway for Exchange." The memorandum, which DiMarzio confirmed as legitimate, also accused the network engineer of "purposely pulling a cable out of a production environment in order that you would not have to travel to Jacksonville to attend an HP event at the request of the CIO." It also accused him of failing to identify the root cause of problems, including a Microsof Exchange "data store corruption" and "BlackBerry server MAPI profile loss," and failing to note that logging had been disabled on the company's WatchGuard firewalls. Officials from The Revere Group, including president and COO Todd Miller and CEO Michael Parks, didn't respond to multiple email requests from InformationWeek to comment on the episodes detailed by the former employees. Our multiple calls to The Revere Group seeking comment also weren't retumed. Keep Quiet Lynott said he'd been brought in to clean up one case in which the engineer pulled tables from a server to crash it so he could skip an offsite meeting. "But if you pull tables out, you can corrupt data, transactions, all sorts of stuff," Lynott said. "I don't know whether or not it was intentionally turmed off or due to incompetence, but the end result was when I brought it to their attention, I was told to turn it on and not tell anybody. We were told on so many occasions not to tell anyone anything." Another alleged incident at GunnAllen involved a database that had been set to disable email logging, though SEC regulations require broker-dealers to retain copies of all emails for seven years. "For email, they did all the transaction logging, where they'd send all mail incoming and outgoing and they'd log it all offsite," Lynott said. "There was a point in time for probably two months where no one's email was logged. I brought it up in a meeting once and was told to shut up [by the acting CIO]," he said. "The protocol from the CIO was to shut your mouth, don't say anything, and just brush it under the rug," Lynott said. The former acting ClO of GunnAllen didn't respond to our requests for comment, sent via LinkedIn. Revere Group officials didn't respond to our request for the former CIO's current contact information. Microsoft Threatens Shutdown Not all of GunnAllen's alleged IT missteps had SEC implications. One incident detailed by two former employees involved unpaid Microsoft SQL Server licenses. The Revere Group had been receiving from Microsoft license-
  • 4. renewal bills for GunnAllen, which the acting CIO had ignored, according to the two former employees. Ultimately, Microsoft issued a final warning with a bill for about $20,000, saying it would disable the license at a specified date and time. "It was like an hour or two before the deadline--before Microsoft shuts the SQL servers down, which would bring GunnAllen to its knees," Saccavino recalled. That ultimatum led one of DiMarzio's employees to contact Microsoft and share GunnAllen's licensing details. But two former employees say the acting CIO at the time, when given the licensing news and bill by the employee, threatened to fire the employee if he spoke of the matter again. In another incident, DiMarzio relates that an internal network project plan he first delivered in the spring of 2005 to help GunnAllen comply with the Sarbanes-Oxley Act was dismissed by the acting CIO. When, in January 2006, DiMarzio heard that he was to be replaced, he reached out to a GunnAllen executive for perspective on the matter and was allegedly told that the acting CIO's incentive plan included a bonus tied to the longevity of the SOX project. DiMarzio says he also heard at the time that multiple GunnAllen executives, fed up with the pace of the SOX work, were calling for The Revere Group's contract to be canceled. DiMarzio said he immediately held a conference call with a Revere Group HR official, as well as the acting CIO's boss at The Revere Group, to bring the concerns to their attention. He also requested that the meeting participants not identify him to the acting CIO as the source of the information. But the next week, DiMarzio said, he was called into the acting CIO's office and told to sign a resignation letter in exchange for receiving severance benefits. DiMarzio said he signed the letter and never looked back. In September 2008, Sago said, he too was dismissed by The Revere Group. Revere ascribed the layoff to declining market conditions, though Sago said that after strong work reviews during his 11 years with the company, he was offered only two weeks of severance pay instead of the standard two weeks per year of employment. Sago rejected the severance offer, filed a civil action for harassment, retaliation, and unfair treatment, and entered into arbitration with his former employer in October 2009 , at which time he says he learned about the home router incident, among other IT incidents. Ultimately, Sago and The Revere Group settled out of court. Regulatory Sanctions GunnAllen's IT failures paralleled larger business problems. Formerly known as Napex Financial Corp., GunnAllen was founded in 1996 by Donald Gunn and Richard "Allen" Frueh. GunnAllen provided a place for brokers and dealers, who must be associated with a FINRA member firm in order to trade, to hang their shingle. But by 2008 , senior members of the firm had come under fire for not properly vetting those brokers or monitoring what they were doing in the name of GunnAllen. Notably, 2008 was when FINRA fined GunnAllen $750,000 for a "trade allocation scheme" conducted by former head trader Alexis J. Rivera. "In 2002 and 2003 , the firm, acting through Rivera, engaged in a 'cherry picking' scheme in which Rivera allocated profitable stock
  • 5. trades to his wife's personal account instead of to the accounts of firm customers," according to FINRA. "Rivera garnered improper profits of more than $270,000 through this misconduct, which violated the anti-fraud provisions of the federal securities laws and FINRA rules. Rivera was barred in December 2006." FINRA accused GunnAllen's investment division of doing business with companies, then failing to inform the broker-dealer's own compliance department that those companies should be placed on a restricted or watch list for investments, as is required by the agency. FINRA also said the brokerage failed to safeguard non-public information in its investment division, meaning that other employees could have profited from insider information. Finally, FINRA accused GunnAllen of "failing to preserve emails and instant messages." A lack of top-down oversight of Michigan-based GunnAllen broker Frank Bluestein ultimately led to the firm's demise. Bluestein resold investments on behalf of Ed May, who FINRA said "created and marketed unregistered investments" to an estimated 1,500 investors under the company he ran, E-M Management Co., LLC. In 2007, the SEC charged May with fraud, for allegedy running a Ponzi scheme focused on a fictitious Las Vegas casino and fake telecommunications equipment and leasing deals that took in more than $250 million before being discovered and stopped. In 2009, the SEC also charged Bluestein with fraud. According to the SEC complaint, from 2002 to 2007 Bluestein ran seminars that "lured elderly investors into refinancing the mortgages on their homes," ultimately recruiting about 800 investors and securing $74 million in investments. In April 2011, May plead guilty to 59 counts of mail fraud, received a 16-year prison sentence, and was ordered to pay a $250,000 fine. Bluestein, however, denied all knowledge of the Ponzi scheme, citing in his defense that he'd personally purchased the investments being sold by May. Regardless, GunnAllen faced a volley of investor lawsuits after the SEC's 2009 allegations. By March 2010, FINRA found that GunnAllen no longer had sufficient net capital to trade and closed the firm, leading to the layoff of 400 employees. By November 2010, GunnAllen had been liquidated. First-Ever Standalone SEC Privacy Fine Although GunnAllen went bankrupt, regulators weren't done with it. The SEC in 2011 accused two former employees--president Frederick O. Kraus and national sales manager David C. Levine-of having inappropriately used GunnAllen customer data, and it fined them each $20,000. The SEC also slammed GunnAllen's former chief compliance officer, Mark A. Ellis, for having failed to put in place or enforce proper policies and procedures for protecting customer information. It fined Ellis $15,000. The agency noted that the broker-dealer's written policies were "vague" and turned out to be little more than a rewording of the actual SEC regulations. As for the alleged security breaches related to InformationWeek by the former Revere Group employees, a 2010 SEC enforcement action against former GunnAllen executives detailed multiple security incidents, but not the full extent of the breaches alleged by the former
  • 6. employees, which included at least one missing laptop containing financial information. Likewise, the home router incident didn't even come to light until 2009, one year after FINRA fined GunnAllen. New SEC Violations Emerge In June 2011 , Sago detailed the additional security violations in a six-page letter to the SECs Miami office, which had conducted the GunnAllen investigation. The agency's associate director of enforcement in Miami, who was in charge of the investigation, didn't respond to multiple calls and emails seeking comment on Sago's allegations, whether the investigation was still open, or whether the additional revelations might lead to any new fines or sanctions against current or fommer employees of GunnAllen or The Revere Group. A spokeswoman for the SEC, reached by phone, declined to comment on any of those questions. In the bigger picture, it's unclear where the SEC was during all of this activity. "How is it that GunnAllen was an examined entity and they had no security policy?" said independent privacy expert Andrew M. Smith, an attorney at Morrison & Foerster. "Say you're 25 years old, recently graduated college, you're an SEC inspector, what's the first thing you're going to do? You're going to ask for their policies and procedures, and when you see that it takes up less than a quarter of a page, there's going to be something wrong." Of course, that perspective assumes that the SEC or FINRA had in fact audited GunnAllen's compliance. "Is it possible that they never examined this broker-dealer? If so, that's fair enough," Smith says. In fact, it's not clear if FINRA or the SEC ever audited GunnAllen's policies before they began their relevant enforcement actions, or whether the additional security violation revelations detailed by Sago in mid-2011 might lead the agencies to reopen their investigation. Officials at both FINRA and the SEC declined to comment on any examinations or audits their agencies may have conducted of GunnAllen. But FINRA's publicly accessible records for GunnAllen make no mention of the agency having audited or examined the company before evidence of the Ponzi scheme emerged. What could have been done to help the SEC spot brokerages with poor IT policies? In 2008, the agency proposed amendments to Regulation S-P, also known as the Safeguard Rule, to increase customer data protection requirements for the businesses it regulates. According to Chris Wolf, an attorney who directs law firm Hogan Lovells' privacy and information management practice. these include requiring "a written security program, identification of specific employees to run it, identification of documentation for reasonably foreseeable security risks, as well as implementation of safeguards for managing those risks, as well as training, oversight, and so on, including for providers." Wolf added, "It would also have a data breach notification obligation, which currently does not exist." But those proposed amendments have remained stalled since they were first proposed in March 2008. An SEC spokeswoman declined to comment on the status of the proposed Reg S-P amendments, or whether the agency is still backing them. Life
  • 7. After GunnAllen Knowing what they now know, would the Revere Group IT employees who worked at GunnAllen have done anything differently? "Things probably should have been told directly to GunnAllen, but we were in such fear of keeping our jobs," Lynott said. "Looking back and thinking back now, I probably would have gone back and told the GunnAllen people. But they may already have known." Ultimately, Lynott said, he quit The Revere Group. "I got to the point where I morally couldn't go to work anymore," he said. One week after he left, he heard that the network engineer who'd allegedly sabotaged the IT systems was fired. Saccavino, meanwhile, said he suspects GunnAllen had no idea what was happening in the IT department. "They weren't told the whole truth, and I don't think they were told even part of the truth," he said. "Shame on them for not having a check and balance in place, but you can't blame them for being the victim." Smith, the privacy expert, offered four takeaways for any company that outsources its IT department: "One, you need to do your due diligence up front so you know that your service provider can keep this safe. Two, you need to have contractual obligations that allow you to keep this data safe, and audit that. Three, monitor so you know it's safe. And four, if there's unauthorized access, have your service provider notify you promptly."