SlideShare a Scribd company logo
1 of 40
Data Security:
What every leader needs to know
Roger Hagedorn
Security Consultant
•CISSP - Certified Information Systems Security Professional
•GIAC Security Essentials (GSEC)
Member:
•(ISC)2 Twin Cities Area Chapter (isc2tc.org)
•Upper Midwest Security Alliance (UMSA) – Board Member
Agenda

•

Roger’s 5 Key Components of a
Security Program
What Can You Do Now?
How to Tell You’ve Been Breached
Action Steps if Breached
Please feel free to ask questions at any
time. This session is for you.

•
•
•
More Introductions
• Who are you and what brings you to this
presentation?
• What are your security concerns?
Why Are We Here?
Security Breaches so far in 2013:
Approximately 10.6 million records
compromised and 483 breaches reported.
According to statistics compiled by the Privacy Rights Clearinghouse

http://www.darkreading.com/database/lessons-learned-
Why Are We Here?
According to the Verizon 2013 Data Breach
Investigations Report (DBIR), organizations
with fewer than 100 employees comprised
31% of data breach incidents investigated in
2012.

http://www.verizonenterprise.com/DBIR/2013/
Why Are We Here?
Why do people hack?
•Notoriety—basic intrusions, early viruses
•Fame—creative or widespread malware
•Financial—theft and damage
•Political Reasons—hactivism
•National Interests—spying
Why Are We Here?
The “Professionalization” of CyberCrime in
the form of large, organized criminal
syndicates
•Exploit auction houses (WabiSabiLabi)
•Forums and IRC (#Vxers, cybermafia.cc)
•Botnet rental (5socks.net)
•Identity auctions (76service)

http://money.cnn.com/2011/07/27/technology/organi
/
Why Are We Here?
A Common Misconception:
“Our organization would never be a target of
hackers.”
– We do good work
– We’re too small to be noticed
– We have nothing of value
Why Are We Here?
What small organizations may not realize:
– Hackers use automated tools. They don’t
pick their targets; they find vulnerabilities.
– All organizations have things of value:
• Computing power (botnets)
• Email contacts (other potential victims)
• Personal information (identity theft)
Why We Are Here
This situation makes us all a target.
Key Components of a
Security Program
Key Components of a
Security Program
No. 1 is you.
Key Components of a
Security Program
Support from upper management is critical.
Without that, no program or initiative will be
fully successful. But with it, work processes
can be adjusted, staff can learn, funds can
be obtained, and attitudes can change.
Key Components of a
Security Program
No. 2 is Data.

https://www.icts.uiowa.edu/content/integrated-reposit
Key Components of a
Security Program
An in-depth understanding of an
organization’s data and how it’s protected.
Compare the “Good Old Days” to today. . .
Key Components of a
Security Program

http://education-portal.com/academy/lesson/what-is-cloud-comp
Key Components of a
Security Program

http://education-portal.com/academy/lesson/what-is-cloud-comp
Intermission
Plucked from the Sept. 27 headlines:
Last week's arrest of eight men in
connection with a £1.3 million ($2.08 million)
bank heist carried out with a remote-control
device they had the brass to plug into a
Barclays branch computer

http://nakedsecurity.sophos.com/2013/09/21/bank-robbers-pose-as-
Intermission
Plucked from the Sept. 27 headlines:
The arrest of 12 men in connection with a
scheme to
boobytrap computers at Santander, one of
the UK's largest banks, by rigging the same
type of remote-control device found in
Barclays - devices that enable remote bank
robbery.

http://nakedsecurity.sophos.com/2013/09/13/12-arrested-a
Key Components of a
Security Program
That in-depth understanding of your
organization’s data must include where it is
stored, how it is classified—e.g., public, inhouse only, confidential—who can access it,
and how this is being monitored.
Key Components of a
Security Program
It is not enough to safeguard important data
—from HR-related data to financial
information, and especially Personal Health
Information—it is necessary to be able to
demonstrate that appropriate controls are in
place and effective.
Key Components of a
Security Program
No. 3 is IT.
Now many people consider information
security an IT issue, which it is not because
it involves much more than IT, but it is true
that hardware and software controls are a
significant part of any security system.
Key Components of a
Security Program
But if your organization has one IT admin,
this is a challenge. Security is important but
only part of the job. There’s no dedicated
security analyst. There’s no way IT can
monitor everything. And it’s easy to waste
time on logs and events that aren’t
important. So what to monitor?
Key Components of a
Security Program
•
•
•
•
•
•
•

Active Directory and Servers
Firewall
Wireless access points
Anti-Malware
In-house applications
Data storage (file server, NAS or whatever)
Any cloud services?
Key Components of a
Security Program
Also part of IT’s role in security is the
implementation of some basic practices:
•
•
•
•
•

user accounts
strong passwords
locking screen-savers
use a firewall and VPN
update operating systems
and applications

•
•
•
•
•

WPA2 encryption for WiFi
separate guest WiFi
encrypt data
dispose of data
policies

See the SANS Institute’s 20 Security Controls
Key Components of a
Security Program
No. 4 is Policies and Procedures.
The scope and key elements of an overall
security policy need to be developed by a
team that pulls from several areas of the
organization, so that the diversity of
divisions, end-users, and procedures are
accounted for.
Key Components of a
Security Program
Then, from this broad basis, more granular
policies and procedures need to be
developed to deal with specific aspects of
the enterprise.
Key Components of a
Security Program
Example Policies:
•Computing Acceptable Use
•Remote Access
•Password Usage
•Data Retention and Destruction
•Flashdrive Usage
•Cloud Storage
Key Components of a
Security Program
Once the policies and procedures are in
place, they need to be regularly checked in
order to verify that they are being followed
and that they actually provide the security
controls needed; if not, then they will have to
be revised. And all policies and procedures
need to be revised on a regular basis,
generally annually.
Key Components of a
Security Program
No. 5 is Staff Involvement, especially
because staff are sometimes the weakest
link but can also be the first line of defense.
Key Components of a
Security Program
Offer training programs, newsletters, brown
bag lunch sessions, posters, campaigns,
informational lectures, news updates, and
the like. While regulations like HIPAA
mandate formal trainings, experience
suggests that a combination of approaches
works best.
What Can You Do Now?
Invest in prevention—implement Defense-inDepth
Educate your staff
Prepare an Incident Response Plan
Test your systems
Whitelist applications
How to Tell You’ve Been
Breached
The top indicators are:
•Unusual Outbound Network Traffic
•Anomalies in Privileged User Account
Activity
•Geographical Irregularities

http://www.darkreading.com/attacks-breaches/top-15-indicators-of-compromise/2401
Action Steps if Breached
•
•
•
•
•

Identify the Attack*
Quarantine the Damage**
Disinfect
Employ your Communication Strategy
Re-secure the Network
• If you are lucky. Most learn from outside sources after the fact.
** But first ask if this is actionable; if so, consult a forensic specialist
And
remember
to
•

•
•
•

Recap
Roger’s 5 Key Components:

– Support from Upper Management
– Know your Data
– IT Controls and Monitoring
– Policies and Procedures
– Staff Involvement
What Can You Do Now?
How to Tell You’ve Been Breached
Action Steps if Breached
Q and A
• Thanks very much for your attention.
• Any questions or commnents?
Roger Hagedorn
Email: roger@cultivatingsecurity.com
Blog: www.cultivatingsecurity.com
Information Security Resources
The SANS Institute’s 20 Security Controls
http://www.sans.org/critical-security-controls/
Information Security Policy Templates
http://www.sans.org/security-resources/policies/
The Australian Government’s 35 Controls
http://www.dsd.gov.au/infosec/top35mitigationstrategies.htm
The Center for Internet Security
http://www.cisecurity.org
Ten Steps to Planning an Effective Cyber-Incident Response
http://blogs.hbr.org/2013/07/ten-steps-to-planning-an-effect/
Information Security Resources
Top 15 Indicators Of Compromise
http://www.darkreading.com/attacks-breaches/top-15-indicators-ofcompromise/240162469?itc=edit_in_body_cross
SonicWALL Phishing IQ Test
http://www.sonicwall.com/furl/phishing/
Sophos 1-Minute Security Tips for the Workplace
http://www.youtube.com/playlist?list=PLD88EACF404839195

More Related Content

What's hot

NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseJason Luttrell, CISSP, CISM
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatResilient Systems
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechDell EMC World
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mindcentralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 

What's hot (20)

NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 

Viewers also liked

Enterprise Collaboration - 2
Enterprise Collaboration - 2Enterprise Collaboration - 2
Enterprise Collaboration - 2Nitin Kohli
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4Nitin Kohli
 
Troubadour 2
Troubadour 2Troubadour 2
Troubadour 2Reesranch
 
Enterprise Collaboration - 1
Enterprise Collaboration - 1Enterprise Collaboration - 1
Enterprise Collaboration - 1Nitin Kohli
 
Enterprise Collaboration - 3
Enterprise Collaboration - 3Enterprise Collaboration - 3
Enterprise Collaboration - 3Nitin Kohli
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

Viewers also liked (8)

Enterprise Collaboration - 2
Enterprise Collaboration - 2Enterprise Collaboration - 2
Enterprise Collaboration - 2
 
Enterprise Collaboration - 4
Enterprise Collaboration - 4Enterprise Collaboration - 4
Enterprise Collaboration - 4
 
Troubadour 2
Troubadour 2Troubadour 2
Troubadour 2
 
Enterprise Collaboration - 1
Enterprise Collaboration - 1Enterprise Collaboration - 1
Enterprise Collaboration - 1
 
Enterprise Collaboration - 3
Enterprise Collaboration - 3Enterprise Collaboration - 3
Enterprise Collaboration - 3
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Data Security: What Every Leader Needs to Know

It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowPECB
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docxstandfordabbot
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdfSoniaCristina49
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
I Series User Management
I Series User ManagementI Series User Management
I Series User ManagementSJeffrey23
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docxhyacinthshackley2629
 

Similar to Data Security: What Every Leader Needs to Know (20)

It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to knowISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
ISO/IEC 27001 & ISO/IEC 27002:2022: What you need to know
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Topic11
Topic11Topic11
Topic11
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
I Series User Management
I Series User ManagementI Series User Management
I Series User Management
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Data Security: What Every Leader Needs to Know

  • 1. Data Security: What every leader needs to know
  • 2. Roger Hagedorn Security Consultant •CISSP - Certified Information Systems Security Professional •GIAC Security Essentials (GSEC) Member: •(ISC)2 Twin Cities Area Chapter (isc2tc.org) •Upper Midwest Security Alliance (UMSA) – Board Member
  • 3. Agenda • Roger’s 5 Key Components of a Security Program What Can You Do Now? How to Tell You’ve Been Breached Action Steps if Breached Please feel free to ask questions at any time. This session is for you. • • •
  • 4. More Introductions • Who are you and what brings you to this presentation? • What are your security concerns?
  • 5. Why Are We Here? Security Breaches so far in 2013: Approximately 10.6 million records compromised and 483 breaches reported. According to statistics compiled by the Privacy Rights Clearinghouse http://www.darkreading.com/database/lessons-learned-
  • 6. Why Are We Here? According to the Verizon 2013 Data Breach Investigations Report (DBIR), organizations with fewer than 100 employees comprised 31% of data breach incidents investigated in 2012. http://www.verizonenterprise.com/DBIR/2013/
  • 7. Why Are We Here? Why do people hack? •Notoriety—basic intrusions, early viruses •Fame—creative or widespread malware •Financial—theft and damage •Political Reasons—hactivism •National Interests—spying
  • 8. Why Are We Here? The “Professionalization” of CyberCrime in the form of large, organized criminal syndicates •Exploit auction houses (WabiSabiLabi) •Forums and IRC (#Vxers, cybermafia.cc) •Botnet rental (5socks.net) •Identity auctions (76service) http://money.cnn.com/2011/07/27/technology/organi /
  • 9. Why Are We Here? A Common Misconception: “Our organization would never be a target of hackers.” – We do good work – We’re too small to be noticed – We have nothing of value
  • 10. Why Are We Here? What small organizations may not realize: – Hackers use automated tools. They don’t pick their targets; they find vulnerabilities. – All organizations have things of value: • Computing power (botnets) • Email contacts (other potential victims) • Personal information (identity theft)
  • 11. Why We Are Here This situation makes us all a target.
  • 12. Key Components of a Security Program
  • 13. Key Components of a Security Program No. 1 is you.
  • 14. Key Components of a Security Program Support from upper management is critical. Without that, no program or initiative will be fully successful. But with it, work processes can be adjusted, staff can learn, funds can be obtained, and attitudes can change.
  • 15. Key Components of a Security Program No. 2 is Data. https://www.icts.uiowa.edu/content/integrated-reposit
  • 16. Key Components of a Security Program An in-depth understanding of an organization’s data and how it’s protected. Compare the “Good Old Days” to today. . .
  • 17. Key Components of a Security Program http://education-portal.com/academy/lesson/what-is-cloud-comp
  • 18. Key Components of a Security Program http://education-portal.com/academy/lesson/what-is-cloud-comp
  • 19. Intermission Plucked from the Sept. 27 headlines: Last week's arrest of eight men in connection with a £1.3 million ($2.08 million) bank heist carried out with a remote-control device they had the brass to plug into a Barclays branch computer http://nakedsecurity.sophos.com/2013/09/21/bank-robbers-pose-as-
  • 20. Intermission Plucked from the Sept. 27 headlines: The arrest of 12 men in connection with a scheme to boobytrap computers at Santander, one of the UK's largest banks, by rigging the same type of remote-control device found in Barclays - devices that enable remote bank robbery. http://nakedsecurity.sophos.com/2013/09/13/12-arrested-a
  • 21. Key Components of a Security Program That in-depth understanding of your organization’s data must include where it is stored, how it is classified—e.g., public, inhouse only, confidential—who can access it, and how this is being monitored.
  • 22. Key Components of a Security Program It is not enough to safeguard important data —from HR-related data to financial information, and especially Personal Health Information—it is necessary to be able to demonstrate that appropriate controls are in place and effective.
  • 23. Key Components of a Security Program No. 3 is IT. Now many people consider information security an IT issue, which it is not because it involves much more than IT, but it is true that hardware and software controls are a significant part of any security system.
  • 24. Key Components of a Security Program But if your organization has one IT admin, this is a challenge. Security is important but only part of the job. There’s no dedicated security analyst. There’s no way IT can monitor everything. And it’s easy to waste time on logs and events that aren’t important. So what to monitor?
  • 25. Key Components of a Security Program • • • • • • • Active Directory and Servers Firewall Wireless access points Anti-Malware In-house applications Data storage (file server, NAS or whatever) Any cloud services?
  • 26. Key Components of a Security Program Also part of IT’s role in security is the implementation of some basic practices: • • • • • user accounts strong passwords locking screen-savers use a firewall and VPN update operating systems and applications • • • • • WPA2 encryption for WiFi separate guest WiFi encrypt data dispose of data policies See the SANS Institute’s 20 Security Controls
  • 27. Key Components of a Security Program No. 4 is Policies and Procedures. The scope and key elements of an overall security policy need to be developed by a team that pulls from several areas of the organization, so that the diversity of divisions, end-users, and procedures are accounted for.
  • 28. Key Components of a Security Program Then, from this broad basis, more granular policies and procedures need to be developed to deal with specific aspects of the enterprise.
  • 29. Key Components of a Security Program Example Policies: •Computing Acceptable Use •Remote Access •Password Usage •Data Retention and Destruction •Flashdrive Usage •Cloud Storage
  • 30. Key Components of a Security Program Once the policies and procedures are in place, they need to be regularly checked in order to verify that they are being followed and that they actually provide the security controls needed; if not, then they will have to be revised. And all policies and procedures need to be revised on a regular basis, generally annually.
  • 31. Key Components of a Security Program No. 5 is Staff Involvement, especially because staff are sometimes the weakest link but can also be the first line of defense.
  • 32. Key Components of a Security Program Offer training programs, newsletters, brown bag lunch sessions, posters, campaigns, informational lectures, news updates, and the like. While regulations like HIPAA mandate formal trainings, experience suggests that a combination of approaches works best.
  • 33. What Can You Do Now? Invest in prevention—implement Defense-inDepth Educate your staff Prepare an Incident Response Plan Test your systems Whitelist applications
  • 34. How to Tell You’ve Been Breached The top indicators are: •Unusual Outbound Network Traffic •Anomalies in Privileged User Account Activity •Geographical Irregularities http://www.darkreading.com/attacks-breaches/top-15-indicators-of-compromise/2401
  • 35. Action Steps if Breached • • • • • Identify the Attack* Quarantine the Damage** Disinfect Employ your Communication Strategy Re-secure the Network • If you are lucky. Most learn from outside sources after the fact. ** But first ask if this is actionable; if so, consult a forensic specialist
  • 37. • • • • Recap Roger’s 5 Key Components: – Support from Upper Management – Know your Data – IT Controls and Monitoring – Policies and Procedures – Staff Involvement What Can You Do Now? How to Tell You’ve Been Breached Action Steps if Breached
  • 38. Q and A • Thanks very much for your attention. • Any questions or commnents? Roger Hagedorn Email: roger@cultivatingsecurity.com Blog: www.cultivatingsecurity.com
  • 39. Information Security Resources The SANS Institute’s 20 Security Controls http://www.sans.org/critical-security-controls/ Information Security Policy Templates http://www.sans.org/security-resources/policies/ The Australian Government’s 35 Controls http://www.dsd.gov.au/infosec/top35mitigationstrategies.htm The Center for Internet Security http://www.cisecurity.org Ten Steps to Planning an Effective Cyber-Incident Response http://blogs.hbr.org/2013/07/ten-steps-to-planning-an-effect/
  • 40. Information Security Resources Top 15 Indicators Of Compromise http://www.darkreading.com/attacks-breaches/top-15-indicators-ofcompromise/240162469?itc=edit_in_body_cross SonicWALL Phishing IQ Test http://www.sonicwall.com/furl/phishing/ Sophos 1-Minute Security Tips for the Workplace http://www.youtube.com/playlist?list=PLD88EACF404839195