SlideShare a Scribd company logo
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Cybersecurity Incident Response
Strategies and Tactics
TIMOTHY OPSITNICK
EXECUTIVE VICE PRESIDENT & GENERAL COUNSEL
ERIC VANDERBURG
VICE PRESIDENT, CYBERSECURITY
RIMS 2017 Northeast Ohio Regional Conference
October 5, 2017
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
About Us
TCDI founded in 1988
Microsoft Certified Partner since 2003
Services include:
◦ Digital forensics
◦ Cybersecurity
◦ eDiscovery
Minority owned enterprise
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Over 40 certifications
Published author
Licensed private investigator
Expert witness and thought leader
18 years in cybersecurity
Specializations include:
Risk management
Governance and compliance
Security strategy
TIMOTHY OPSITNICK
EXECUTIVE VICE PRESIDENT AND
GENERAL COUNSEL
ERIC VANDERBURG
VICE PRESIDENT, CYBERSECURITY
E-Discovery special master
Expert witness
Advisory board member for the
Georgetown University Law
Center’s CLE and the American
College of e-Neutrals
Numerous publications and legal
education seminars
Member of the Sedona
Conference Working Group
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Introduction
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Impact of Cybersecurity Incidents
Loss of Valuable Information
Direct Financial Loss
Unfavorable Media Exposure/Damage to Reputation
Outages and Disruption
Data breach
Notification
Lawsuits
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Statistics
◦ 87% responded to at least one incident in the past year
◦ 20% responded to at least 100 incidents
◦ 68% identified malware as the root cause of incidents
◦ 50% reported employee personal information (ex. SSN)
was prioritized
*The Show Must Go On! The 2017 SANS Incident Response Survey
87% reported
incidents
identified
malware
as cause
◦ 82% reported that remediation activities
took place within one month of containment
◦ 33% take place within 24 hours68%
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Pre Response Planning
Identify data types and locations
Identify legal obligations
◦Regulatory
◦Contractual
Create and implement security policies
◦Incident Response Plan
◦Other Policies
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Analysis of legal obligations
National laws and directives
GDPR / EU directives
State / province laws
Civil liabilities
Legally-advisable practices
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Business value of IR
Protects proprietary / classified information
Reduces impact to business operations
Minimizes public relations damages
Reduces costs of response
Ensures data is collected for evidentiary
purposes
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Incident Response Planning
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
The Team
IT Compliance Privacy
Human
Resources
Security / Risk
Management
Third-party
Cyber Security
team
Legal
Public
Relations
Physical
Security
Senior
management
Law
Enforcement
Liaison
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Counsel and Privilege
Early involvement affects whether communications
will be considered privileged
◦Early assessments are frank
◦Privilege law is complex
Law in area developing
Regulatory and legal requirements complex, e.g.
notice
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Activating the team and the plan
Initial scoping, typically IT
Trigger
◦Confidentiality or privacy of information effected/or in
care
◦Integrity of systems or data
◦Availability of systems or data
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Incident Response Readiness
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Scenario planning
◦Document procedures for likely incidents
◦Document steps for a non-specific incident
◦Is geographic diversity needed?
◦Determine notification procedure
©2017 Technology Concepts & Design, Inc. All Rights Reserved.
Employee theft
of intellectual
property and
misconduct
An employee removes internal client
information for sale to a competitor
A disgruntled employee destroys
data critical to business success
An employee downloads illegal
software containing a backdoor
©2017 Technology Concepts & Design, Inc. All Rights Reserved.
Data breach
Large upload of files to unknown
destination
Confidential information on public
sources
Files mistakenly sent to the wrong
customer
©2017 Technology Concepts & Design, Inc. All Rights Reserved.
Malware or
ransomware
Ransomware encrypts central data repository
Botnet causes company email and domain to be
blacklisted due to spam and searches
Malware makes hundreds of machines unusable
Company receives notices of Denial of Service (DoS)
attacks originating from the corporate network.
©2017 Technology Concepts & Design, Inc. All Rights Reserved.
Lost or stolen
device
Employee loses an encrypted laptop while on
vacation.
Backup tapes are stolen from an employee’s
vehicle while they are in a restaurant.
The phone of the CEO’s assistant is stolen at a
coffee shop and the phone was unlocked at
the time.
©2017 Technology Concepts & Design, Inc. All Rights Reserved.
Key system
failure
Power outage in the server room in the
middle of the day.
Non-redundant firewall failure
©2017 Technology Concepts & Design, Inc. All Rights Reserved.
Data loss or
corruption
Multiple hard drives fail in the main database
server.
Administrator accidentally deletes the wrong
virtual machine.
A restore overwrites production data rather
than going to an alternate location.
Encryption keys expire
©2017 Technology Concepts & Design, Inc. All Rights Reserved.
Social
engineering
Company instructed to change payment
information.
Fake CEO emails instruct AR to make
payments to an account.
Employees divulge passwords to a
person claiming to be from IT.
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Table top exercises
PROCESS
◦IR team assembles
◦Facilitator describes
scenario
◦Plans are invoked and
tested
◦ Review actions
◦ Completion and Success criteria
◦ Notification methods and
messages
VALUE
◦New Insight gained
◦Plans updated
◦Team more comfortable
with the process
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Security testing
Penetration testing
Vulnerability management
Red teaming
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Locking systems down
Configuration audits and System hardening
Hardening Zone Purpose
User Configuration Least privilege, secondary logon
Network Configuration IP4 vs IP6, encryption, static/dynamic
Features and Roles Configuration Add what you need, remove what you don't. GUI?
Update Installation Address vendor-addressed vulnerabilities
NTP Configuration Clock synchronization
Firewall Configuration Minimize your external footprint.
Remote Access Configuration Authorization, types (RDP, SSH, admin tools)
Service Configuration Minimize your attack surface.
Logging and Monitoring Know what's happening on your system.
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Improving detection capability
SIEM
Anomaly detection
End user training
Motivation and Accountability
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Vendor or third party coordination and
planning
Identify required third-parties
Establish expectations and contractual
agreements
Make vendors aware of internal procedures
Solicit feedback
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Awareness training
Acceptable use
◦Email, Internet, Social
Passwords
Incident indicators
Malware
Social engineering
Data handling
Other policy elements
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Process and system implementation
Preservation
Log management and retention
Business continuity
Auditing
Prepare resources
◦Human
◦Technical
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Incident Response Execution
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Incident response phases
Identification
Containment
Investigation
Eradication
Recovery
Reflection
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Identification
◦Use of dormant accounts
◦Log alteration
◦Presence of malicious code
◦Notification by partner or peer
◦Notification by hacker
◦Loss of availability
◦Corrupt files
◦Data breach
◦Violation of policy
◦Violation of law
Report Incident indicators (Employees or automated systems)
Validate indicators
Indicators
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Containment
Assemble the IR team
Quarantine
◦Disable accounts, disconnect from network, isolate VM
Preserve Evidence
Expand IR resources as necessary
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Investigation
Interviewing
Analysis
◦ Logs
◦ Memory
◦ Forensic images
◦ Public data
Documentation
◦ IP address of compromised
system
◦ Time frame
◦ Malicious ports
◦ Flow records
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Eradication
Resolution
◦ List action items
◦ Rank in terms of risk level and time required
◦ Prioritize
◦ Coordinate and track remediation to completion
Validation
◦ Confirm measures successfully remediated the incident
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Recovery
Remediate vulnerabilities
Restore services
Restore data (Ensure that backups are clean)
Follow notification procedures in IRP
Restore confidence
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Reflection
Refine plans and processes
Create new IRPs
Debrief
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Reflection (continued)
Debrief (After-action
review)
◦Rankless discussion
◦Goals
◦Were goals achievable?
◦Successes
◦Pitfalls
◦Lessons learned
◦Action items and
responsibilities
◦Positive summary
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Key Issues
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Preserving chain of custody and evidence
As soon as the team begins its work, must start and
maintain a strict chain of custody
Chain of custody documents that evidence was under
strict control and that no unauthorized person was
given the opportunity to corrupt the evidence
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
When and if to engage Law enforcement
Nature of data compromised
Nature of incident (theft vs. external hacking vs. employee misconduct)
Regulatory scheme or statute applies to data or operations
Country or residence of persons involved in compromise or persons whose
information implicated
Your industry
Specific benefit
Policy of Good Corporate Citizen
Prior relationship established
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Communications
Alternate
In person
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Engaging vendors
Pre selected
Experience
New entries in market
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Notice
Insurance carriers
Impacted individuals
Regulators
Credit reporting agencies
© 2017 Technology Concepts & Design, Inc. All Rights Reserved.
Questions?

More Related Content

What's hot

Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
IBM Security
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
PECB
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Berezha Security Group
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
Brad Deflin
 
Cyber security
Cyber securityCyber security
Cyber security
Vaibhav Jain
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
William McBorrough
 
Smarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with LessSmarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with Less
Omar Khawaja
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
Khawar Nehal khawar.nehal@atrc.net.pk
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
F-Secure Corporation
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
Omar Khawaja
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
centralohioissa
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
 

What's hot (20)

Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Smarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with LessSmarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with Less
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 

Similar to Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Vanderburg

Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
Fujitsu Middle East
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
Doug Copley
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
NetworkCollaborators
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
Ron Pascuzzi
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Sqrrl
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
CA Technologies
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
Spanning Cloud Apps
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
Interset
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Russia
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Citrix
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Splunk
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
James Wier
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 

Similar to Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Vanderburg (20)

Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Bridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software SolutionsBridgera enterprise IoT Software Solutions
Bridgera enterprise IoT Software Solutions
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 

More from Eric Vanderburg

Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
Eric Vanderburg
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
Eric Vanderburg
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
Eric Vanderburg
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Eric Vanderburg
 
Untangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessUntangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security Awareness
Eric Vanderburg
 
Physical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric VanderburgPhysical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric Vanderburg
Eric Vanderburg
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
Eric Vanderburg
 

More from Eric Vanderburg (20)

Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
 
Untangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessUntangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security Awareness
 
Physical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric VanderburgPhysical security primer - JURINNOV - Eric Vanderburg
Physical security primer - JURINNOV - Eric Vanderburg
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOV
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Vanderburg

  • 1. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Cybersecurity Incident Response Strategies and Tactics TIMOTHY OPSITNICK EXECUTIVE VICE PRESIDENT & GENERAL COUNSEL ERIC VANDERBURG VICE PRESIDENT, CYBERSECURITY RIMS 2017 Northeast Ohio Regional Conference October 5, 2017
  • 2. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. About Us TCDI founded in 1988 Microsoft Certified Partner since 2003 Services include: ◦ Digital forensics ◦ Cybersecurity ◦ eDiscovery Minority owned enterprise
  • 3. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Over 40 certifications Published author Licensed private investigator Expert witness and thought leader 18 years in cybersecurity Specializations include: Risk management Governance and compliance Security strategy TIMOTHY OPSITNICK EXECUTIVE VICE PRESIDENT AND GENERAL COUNSEL ERIC VANDERBURG VICE PRESIDENT, CYBERSECURITY E-Discovery special master Expert witness Advisory board member for the Georgetown University Law Center’s CLE and the American College of e-Neutrals Numerous publications and legal education seminars Member of the Sedona Conference Working Group
  • 4. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Introduction
  • 5. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Impact of Cybersecurity Incidents Loss of Valuable Information Direct Financial Loss Unfavorable Media Exposure/Damage to Reputation Outages and Disruption Data breach Notification Lawsuits
  • 6. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Statistics ◦ 87% responded to at least one incident in the past year ◦ 20% responded to at least 100 incidents ◦ 68% identified malware as the root cause of incidents ◦ 50% reported employee personal information (ex. SSN) was prioritized *The Show Must Go On! The 2017 SANS Incident Response Survey 87% reported incidents identified malware as cause ◦ 82% reported that remediation activities took place within one month of containment ◦ 33% take place within 24 hours68%
  • 7. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Pre Response Planning Identify data types and locations Identify legal obligations ◦Regulatory ◦Contractual Create and implement security policies ◦Incident Response Plan ◦Other Policies
  • 8. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Analysis of legal obligations National laws and directives GDPR / EU directives State / province laws Civil liabilities Legally-advisable practices
  • 9. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Business value of IR Protects proprietary / classified information Reduces impact to business operations Minimizes public relations damages Reduces costs of response Ensures data is collected for evidentiary purposes
  • 10. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Incident Response Planning
  • 11. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. The Team IT Compliance Privacy Human Resources Security / Risk Management Third-party Cyber Security team Legal Public Relations Physical Security Senior management Law Enforcement Liaison
  • 12. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Counsel and Privilege Early involvement affects whether communications will be considered privileged ◦Early assessments are frank ◦Privilege law is complex Law in area developing Regulatory and legal requirements complex, e.g. notice
  • 13. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Activating the team and the plan Initial scoping, typically IT Trigger ◦Confidentiality or privacy of information effected/or in care ◦Integrity of systems or data ◦Availability of systems or data
  • 14. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Incident Response Readiness
  • 15. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Scenario planning ◦Document procedures for likely incidents ◦Document steps for a non-specific incident ◦Is geographic diversity needed? ◦Determine notification procedure
  • 16. ©2017 Technology Concepts & Design, Inc. All Rights Reserved. Employee theft of intellectual property and misconduct An employee removes internal client information for sale to a competitor A disgruntled employee destroys data critical to business success An employee downloads illegal software containing a backdoor
  • 17. ©2017 Technology Concepts & Design, Inc. All Rights Reserved. Data breach Large upload of files to unknown destination Confidential information on public sources Files mistakenly sent to the wrong customer
  • 18. ©2017 Technology Concepts & Design, Inc. All Rights Reserved. Malware or ransomware Ransomware encrypts central data repository Botnet causes company email and domain to be blacklisted due to spam and searches Malware makes hundreds of machines unusable Company receives notices of Denial of Service (DoS) attacks originating from the corporate network.
  • 19. ©2017 Technology Concepts & Design, Inc. All Rights Reserved. Lost or stolen device Employee loses an encrypted laptop while on vacation. Backup tapes are stolen from an employee’s vehicle while they are in a restaurant. The phone of the CEO’s assistant is stolen at a coffee shop and the phone was unlocked at the time.
  • 20. ©2017 Technology Concepts & Design, Inc. All Rights Reserved. Key system failure Power outage in the server room in the middle of the day. Non-redundant firewall failure
  • 21. ©2017 Technology Concepts & Design, Inc. All Rights Reserved. Data loss or corruption Multiple hard drives fail in the main database server. Administrator accidentally deletes the wrong virtual machine. A restore overwrites production data rather than going to an alternate location. Encryption keys expire
  • 22. ©2017 Technology Concepts & Design, Inc. All Rights Reserved. Social engineering Company instructed to change payment information. Fake CEO emails instruct AR to make payments to an account. Employees divulge passwords to a person claiming to be from IT.
  • 23. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Table top exercises PROCESS ◦IR team assembles ◦Facilitator describes scenario ◦Plans are invoked and tested ◦ Review actions ◦ Completion and Success criteria ◦ Notification methods and messages VALUE ◦New Insight gained ◦Plans updated ◦Team more comfortable with the process
  • 24. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Security testing Penetration testing Vulnerability management Red teaming
  • 25. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Locking systems down Configuration audits and System hardening Hardening Zone Purpose User Configuration Least privilege, secondary logon Network Configuration IP4 vs IP6, encryption, static/dynamic Features and Roles Configuration Add what you need, remove what you don't. GUI? Update Installation Address vendor-addressed vulnerabilities NTP Configuration Clock synchronization Firewall Configuration Minimize your external footprint. Remote Access Configuration Authorization, types (RDP, SSH, admin tools) Service Configuration Minimize your attack surface. Logging and Monitoring Know what's happening on your system.
  • 26. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Improving detection capability SIEM Anomaly detection End user training Motivation and Accountability
  • 27. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Vendor or third party coordination and planning Identify required third-parties Establish expectations and contractual agreements Make vendors aware of internal procedures Solicit feedback
  • 28. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Awareness training Acceptable use ◦Email, Internet, Social Passwords Incident indicators Malware Social engineering Data handling Other policy elements
  • 29. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Process and system implementation Preservation Log management and retention Business continuity Auditing Prepare resources ◦Human ◦Technical
  • 30. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Incident Response Execution
  • 31. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Incident response phases Identification Containment Investigation Eradication Recovery Reflection
  • 32. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Identification ◦Use of dormant accounts ◦Log alteration ◦Presence of malicious code ◦Notification by partner or peer ◦Notification by hacker ◦Loss of availability ◦Corrupt files ◦Data breach ◦Violation of policy ◦Violation of law Report Incident indicators (Employees or automated systems) Validate indicators Indicators
  • 33. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Containment Assemble the IR team Quarantine ◦Disable accounts, disconnect from network, isolate VM Preserve Evidence Expand IR resources as necessary
  • 34. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Investigation Interviewing Analysis ◦ Logs ◦ Memory ◦ Forensic images ◦ Public data Documentation ◦ IP address of compromised system ◦ Time frame ◦ Malicious ports ◦ Flow records
  • 35. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Eradication Resolution ◦ List action items ◦ Rank in terms of risk level and time required ◦ Prioritize ◦ Coordinate and track remediation to completion Validation ◦ Confirm measures successfully remediated the incident
  • 36. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Recovery Remediate vulnerabilities Restore services Restore data (Ensure that backups are clean) Follow notification procedures in IRP Restore confidence
  • 37. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Reflection Refine plans and processes Create new IRPs Debrief
  • 38. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Reflection (continued) Debrief (After-action review) ◦Rankless discussion ◦Goals ◦Were goals achievable? ◦Successes ◦Pitfalls ◦Lessons learned ◦Action items and responsibilities ◦Positive summary
  • 39. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Key Issues
  • 40. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Preserving chain of custody and evidence As soon as the team begins its work, must start and maintain a strict chain of custody Chain of custody documents that evidence was under strict control and that no unauthorized person was given the opportunity to corrupt the evidence
  • 41. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. When and if to engage Law enforcement Nature of data compromised Nature of incident (theft vs. external hacking vs. employee misconduct) Regulatory scheme or statute applies to data or operations Country or residence of persons involved in compromise or persons whose information implicated Your industry Specific benefit Policy of Good Corporate Citizen Prior relationship established
  • 42. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Communications Alternate In person
  • 43. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Engaging vendors Pre selected Experience New entries in market
  • 44. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Notice Insurance carriers Impacted individuals Regulators Credit reporting agencies
  • 45. © 2017 Technology Concepts & Design, Inc. All Rights Reserved. Questions?