24 hours after a breach

26

Upload: lifars

Post on 17-Feb-2017

6.835 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: 24 Hours After a Breach
Page 2: 24 Hours After a Breach

The First 24 Hours After a BreachBy Ondrej KREHEL

Paul Kubler

2

Page 3: 24 Hours After a Breach

3

ONDREJ KREHEL CISSP, CEH, CEI FOUNDER & CEODIGITAL FORENSICS LEADLIFARS, LLCTwitter: @LIFARSLLC

LIFARS is a NYC-based Digital Forensics, Incident Response, and Cybersecurity Intelligence firm.

Page 4: 24 Hours After a Breach

4

PAUL KUBLERCISSP, EnCE, CCNA, Sec+, ACEDigital Forensics Examiner

LIFARS, LLCTwitter: @LIFARSLLC

LIFARS is a NYC-based Digital Forensics, Incident Response, and Cybersecurity Intelligence firm.

Page 5: 24 Hours After a Breach
Page 6: 24 Hours After a Breach

6

Digital Firefighter

Page 7: 24 Hours After a Breach

Agenda

1 Getting the Call

2 Arrival on the Scene

3 Crisis Management

4 Evidence Collection & Remediation

5 Q&A

Page 8: 24 Hours After a Breach

Ever Wonder What Happened Before You Saw These in the News?

Page 9: 24 Hours After a Breach

Part 1: Getting the Call

Page 10: 24 Hours After a Breach

Getting the Call» Detection of a Breach• By the internal IT/security team• By an outside organization

» State of Panic• Unprepared to deal with a breach• Try to contain the attack internally

Page 11: 24 Hours After a Breach
Page 12: 24 Hours After a Breach

Getting the Call (continued)

» Internal IT team is heavily utilized• External assistance required

» Race against time• High pressure to stop “cyberbleeding” and minimize

the impact• Effectively engage a third party emergency response

team

Page 13: 24 Hours After a Breach

Part 2: Arrival on the Scene

Page 14: 24 Hours After a Breach

Arrival on the Scene» Emergency response team arrives• Investigation and remediation begins

» Primary objectives• Understand attacker profile and motives• Assess compromised systems state• Secure digital evidence• Involve key decision tenants

Page 15: 24 Hours After a Breach

IT’S ABOUT TIME FOR SOME…

“INVESTIGATION”

Page 16: 24 Hours After a Breach

Arrival on the Scene» Damage Assessment• Of business and technological areas• Reveals how deeply the attacker was able to

penetrate the network• Examination of lateral movement of the attacker

Page 17: 24 Hours After a Breach

Part 3: Crisis Management

Page 18: 24 Hours After a Breach

Crisis ManagementExecutive table follows a data breach plan and prepares:» PR/Privacy/Legal actions needed to cover the

enterprise responses to: • The public• The regulators• The partners

» Wrong message can trigger an avalanche

Page 19: 24 Hours After a Breach
Page 20: 24 Hours After a Breach

Crisis Management» Data Breach:• Is a C-Suite exercise that tests:

- Coherence and conciseness of the incident response preparedness

- Ability of the enterprise to function in crisis mode• Unfortunately is a live exercise (and comes at a

high price)

Page 21: 24 Hours After a Breach

Part 4: Evidence Collection & Remediation

Page 22: 24 Hours After a Breach

Evidence Collection & Remediation» Forensic team collects available evidence• Performs initial analysis• Preserves additional evidence

» Informs the board of initial findings• Actions need to be weighted carefully• Aggressive moves can have negative effects

(attackers still inside the network)

Page 23: 24 Hours After a Breach
Page 24: 24 Hours After a Breach

Evidence Collection & Remediation» With hackers in the system• Each blocking action needs to be closely monitored• Remediation can detected by attacker and evidence

and data put at risk» Securing the environment can take years• Scheduling necessary changes with key internal

tenants is a difficult task

Page 25: 24 Hours After a Breach

Q&A

Page 26: 24 Hours After a Breach

THANK YOU