Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest...

21
© 2020 Jack Henry & Associates, Inc. ® 1 © 2020 Jack Henry & Associates, Inc. ® Rick Phillips – Stickley on Security Viviana Campanaro – CISSP Gladiator Security & Compliance Sales Engineer Cybersecurity Webinar Series - Ransomware is Alive and Well: Are you? February 12, 2020

Transcript of Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest...

Page 1: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®1 © 2020 Jack Henry & Associates, Inc.®

Rick Phillips – Stickley on Security

Viviana Campanaro – CISSPGladiator Security & Compliance Sales Engineer

Cybersecurity Webinar Series -Ransomware is Alive and Well: Are you?

February 12, 2020

Page 2: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®2

Cybersecurity Webinar Series

• Multi-part, educational series• Proactive Cybersecurity: Staying Ahead of Threats

1. Assessing Your Biggest Security Risks Before It Is Too Late – October 29th

2. Machine Learning and the Latest Protection methods – December 12th

3. Cyber Threats and Trends for 2020 – January 14th

4. Ransomware is alive and well: are you? – February 12th

5. Gone Phishing: Tips, Tricks and Lessons Learned in the Battle of Social Engineering – March 18th

6. Unleashing the true value of GRC - April 29th

Page 3: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®3

Malware Landscape

Page 4: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®4

Landscape

Page 5: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®5

Why Are Attacks More Effective? Available Data

16 Billion

Page 6: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®6

Why Are Attacks More Effective? Revenue

Page 7: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®7

Page 8: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®8

Page 9: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®9

Chinese/North Korean Government Hacking Group

Page 10: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®10

The Anatomy of a Phishing Attack

Page 11: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®11

Page 12: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®12

Example.com213.48.212.85

Blacklist Service183.88.245.11

IP Lookup183.88.245.11

Page 13: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®13

Email Spoofing Pivots to Look-alike Domains

Stickleyonsecurity.com namewest.com/simple-typo

sticklyeonsecurity.comstickleoynsecurity.comstickleynosecurity.comstickleyosnecurity.comstickleyonescurity.comstickleyonsceurity.comstickleyonseucrity.comstickleyonsecruity.comstickleyonsecuirty.comstickleyonsecurtiy.com

stickleyonseucrity.com

1. Identify Target2. Purchase look-alike domain3. Follow all proper domain registration

processes including DMARC4. Park the domain for a couple months

to appear to be legitimate5. Research Target to determine who

will be impersonated6. Purchase email list of Target

employees7. Launch

Page 14: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®14

Page 15: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®15

Page 16: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®16

Page 17: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®17

How to prepare, protect and prevent

Page 18: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®18

Event Action Plan: Preparedness

1. Incident Response Plan2. Business Continuity Plan3. Failover Plan4. Backup Strategy

1. Ransomware, Data Breach

2. How do we keep serving

3. How are we going to recover

4. What will be the data gap

Page 19: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®19

Prevention Action Plan: Layered Security1. Infrastructure (firewall, email filter, anti-virus,

cloud backup, etc.)

2. Outside Email Warning Messages3. Domain Security (lock down look-alike and

typosquatting domains)

4. Employee Education that keeps pace with the evolving threat landscape

5. Phishing Simulation

Employee Training Methods

Annual or Quarterly Phishing only14-24% Click Rate

Monthly Phishing8-14% Click Rate

Monthly Phishing with Quarterly Education0-5% Click Rate

Page 20: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®20

Gladiator® Security Services

• Centurion Disaster Recovery• Disk to disk to cloud backup and recovery

• Gladiator Hosted Network Solutions• Virtual Desktop Infrastructure (VDI)• Disaster Avoidance services

• Gladiator Total Protect Suite• New advanced SIEM / SOAR• Machine Learning, Predictive & Prescriptive Analytics• Enhanced Threat Intel Platform, built solely for FI’s• IT Regulatory Compliance solutions

Page 21: Cybersecurity Webinar Series - Ransomware is Alive and ...€¦ · 1. Assessing Your Biggest Security Risks Before It Is Too Late –October 29 th 2. Machine Learning and the Latest

© 2020 Jack Henry & Associates, Inc.®21

Thank You

Rick PhillipsStickley on [email protected]

• Employee Education• Phishing Simulation• Domain Security• Automated Security Center

Viviana Campanaro, [email protected]