you will be breached

35
Are you prepared? What is your response plan? Mike Saunders – CISSP, GCIH, GPEN

Upload: mike-saunders

Post on 25-May-2015

362 views

Category:

Technology


2 download

DESCRIPTION

Your organization will be breached. It's a matter of when, not if. How you respond may be the difference between recovering and closing your doors. This talk is designed to help small businesses or businesses with small IT organizations to develop a viable incident response program. Presented at the 2013 ND IT Symposium on 5/1/2013.

TRANSCRIPT

Page 1: You will be breached

Are you prepared?

What is your response plan?

Mike Saunders – CISSP, GCIH, GPEN

Page 2: You will be breached

Agenda Definition of a breach

Background statistics on breaches

What a breach may look like

Preparing your response plan

Putting your plan into action

Links to resources

Page 3: You will be breached

Key Assumptions Small to medium-sized business (SMB)

25 – 500 employees

Few IT resources, few or none dedicated to IT security

Page 4: You will be breached

What Is a Breach? Breach means an intrusion into a computer system, i.e.

hacking or exposure of sensitive data

Causes of a breach:

crimes of opportunity

targeted attacks

viruses

web-delivered malware

malicious insiders

unintentional disclosures

Page 5: You will be breached

Breach Statistics 55% of SMBs surveyed were breached in the last year, 53%

more than once – Ponemon Institute

Verizon 2012 DBIR found 71.5% of incidents studied were in organizations of less than 100 employees

Up from 63% in 2011

2011 Symantec ISTR found 28% of targeted attacks were against companies with less than 500 employees

Page 6: You will be breached

Costs of a Breach Average cost of reported

breach: $5.5 million

Average cost per stolen record: $194

Symantec ISTR

Fines

Possible jail terms under HIPAA

Loss of customer and business partner confidence

Page 7: You will be breached

How Do I Know I’ve Been Breached?

www.digitaltrends.com

Page 8: You will be breached

Overt Defaced website

Page 9: You will be breached

Defaced Websites

bundlr.com

Page 10: You will be breached

Defaced Websites

sunbeltblog.blogspot.com

Page 11: You will be breached

Defaced Websites

news.cnet.com

Page 12: You will be breached

Overt Defaced website

Unauthorized bank transfers

Page 13: You will be breached

Unauthorized wire transfer

krebsonsecurity.com

Page 14: You will be breached

Compromised PayPal Account

yadiwibowo30.blogspot.com

Page 15: You will be breached

Overt Defaced website

Unauthorized bank transfers

Destruction of data

Data held hostage – “ransomware”

Page 16: You will be breached

Image of Ransomware

arstechnica.com

Page 17: You will be breached

Overt Defaced website

Unauthorized bank transfers

Destruction of data

Data held hostage – “ransomware”

Notification from outside entity

Page 18: You will be breached

Covert System slowness

Abnormal log entries

Strange notifications when visiting a website

Helpdesk may notice a pattern

Page 19: You will be breached

Malicious Java Applet

www.cso.com.au

Page 20: You will be breached

Fake AntiVirus Notification

blog.unmaskparasites.com

Page 21: You will be breached

No obvious indicators There may not be an obvious indicator of a breach

Detect through well-developed security intelligence program

66% of breaches went undiscovered for several months or longer

Verizon 2013 DBIR

Page 22: You will be breached

Benefits of Adequate Preparation Economic

Stop ongoing loss of data or business interruption

Reduce time to resolution after incident is discovered

Public Relations

PR plan helps reassure customers to prevent loss of confidence

Legal

Demonstrates due diligence

Page 23: You will be breached

Preparation: Getting Started Get management support!

Define your incident handling team members

Not just IT! IT, Security, Legal, HR, PR, Management, external IT vendor

Designate an incident leader. This person needs to be calm under fire

Page 24: You will be breached

Preparation: Basics Policies

Strong policies help enforce compliance and define roles and responsibilities

Incident Handling policies provide legal authority to investigate, “sniff” network traffic, monitor activities

Procedures

Clear, thorough, tested procedures help reduce confusion when tensions are high

Checklists

Notification procedures – legal, PR, law enforcement

Page 25: You will be breached

Preparation: Communications Define a communications plan

Email and phone may be down or compromised; make sure you have cell numbers

Identify alternate contacts

Don’t forget to include IT vendor, network provider, etc.

Test your calling tree at least annually

Keep paper copies and keep them up to date

Page 26: You will be breached

Preparation: Testing and Practice Perform incident handling

tabletop exercises

When problems are identified,be sure to update procedures

Page 27: You will be breached

Execution Document all steps in a notebook

Helps to have one person working, another keeping notes

Measure twice, cut once… First, do no harm…

In other words, don’t be too hasty

Step back to see the forestfor the trees

Page 28: You will be breached

Mistakes Happen Success does not consist in never making mistakes, but in

never making the same one a second time.

– George Bernard Shaw

Page 29: You will be breached

Lessons Learned Be sure to hold a lessons learned session after breach

Hold within two weeks

Identify what failed and why

Implement fixes and update documentation

Page 30: You will be breached

Resources Local law enforcement, including FBI

Professional Security Organizations

ISSA

https://sites.google.com/site/northdakotaissa/

InfraGard

http://infragard-nd.org

SANS Reading Room

http://www.sans.org/reading_room/

SANS Incident Handling Forms

http://www.sans.org/score/incidentforms/

Page 31: You will be breached

Summary All sizes of organizations are being attacked

Vast majority of attacks are from outsiders – 92%

Verizon 2013 DBIR

Hacking constitutes the majority of attacks – 52%

Verizon 2013 DBIR

Incident response plans are key to recovery and limiting liability

There is a vast array of resources available to help you build your plan

Page 32: You will be breached

Resources An Incident Handling Process for Small and Medium Businesses

http://www.sans.org/reading_room/whitepapers/incident/incident-handling-process-small-medium-businesses_1791

Creating a Computer Security Incident Response Team (CSIRT)

http://www.cert.org/csirts/Creating-A-CSIRT.html

NIST SP800-61 Rev. 2: Computer Security Incident Handling Guide

http://crsc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf

Corporate Incident Response – Why You Can’t Afford to Ignore It

http://www.mcafee.com/us/resources/white-papers/foundstone/wp-corp-incident-response.pdf

Page 33: You will be breached

References Ponemon Institute Survey for Hartford Steam Boiler

http://www.hsbwhistlestop.com/agents/express/2013/02/hsbSurvey.php

Verizon 2013 Data Breach Investigations Report

http://www.verizonenterprise.com/DBIR/2013/

Verizon 2012 Data Breach Investigations Report

http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

Symantec 2011 Internet Security Threat Report

http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf

Page 34: You will be breached

Contact Me [email protected]

@hardwaterhacker

http://hardwatersec.blogspot.com/

Page 35: You will be breached

Questions?