Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

46
Presented by: Doug Jambor Turner and Associates

description

Data breaches and security issues plague financial institutions constantly. They are important to safeguard against for the protection of confidential information housed at institutions and for the regulatory exams that expect detailed security plans in place. Douglas Jambor, Vice President and Director of Technology Consulting at Turner & Associates, provides insight into the topic of data breaches and penetration testing. He reviews these security topics, discusses how to implement a plan in the case of a security breach, and how to limit data breach risk exposures to your organization.

Transcript of Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Page 1: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Presented by: Doug Jambor

Turner and Associates

Page 2: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Financial information company that provides credit and risk management solutions to financial institutions

Data and applications used by thousands of financial institutions and accounting firms across North America

Awards ◦ Named to Inc. 500 lit of fastest growing privately

held companies in the U.S.

◦ Named to Deloitte Technology Fast 500

Page 3: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Turner and Associates, Inc., was formed in 1994 in Columbus, Ohio to address the financial needs of small businesses and the lending functions of Banks.

Page 4: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Data Breaches ◦ Lessons Learned

◦ Key Takeaways

Page 5: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

So, what are data breaches?

◦ Unintended disclosure of sensitive information

◦ Cyber Attacks

◦ Payment card fraud

Page 6: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Data breaches are also caused by:

◦ Malicious insiders

◦ Physical data loss

◦ Portable device loss

Page 7: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Lastly, data breaches could be caused by:

◦ Hardware loss

◦ Unknown data loss

Page 8: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

History of the 10 largest data breaches:

1. Shanghai Roadway (March, 2012) 150 Million records

2. Heartland Payment Systems (January, 2009) 130 Million records

3. T.J. Maxx (January 2007) 94 Million Records

Page 9: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

History of the 10 largest data breaches:

4. TRW / Sears Roebuck (June,1984) 90 Million records

5. Sony Corporation (April, 2011) 77 Million records

6. Unknown Company (August, 2008) 50 Million Records

Page 10: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

History of the 10 largest data breaches:

7. Card Systems (June, 2005) 40 Million records

8. Tianya (December, 2011) 40 Million records

9. Steam On-line Gaming (November, 2011) 35 Million Records

Page 11: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

History of the 10 largest data breaches:

10. SK Communications (July, 2011) 35 Million records

Page 12: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

2011 was a game changer

◦ Four of the top

10 biggest data

breaches happened

this year

Page 13: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

2011 was a game changer

◦ Hackivism come

through the doors

Page 14: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Page 15: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Larry Ponemon

2012 RSA

Conference in

San Francisco

Page 16: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Page 17: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Can we stop data breaches? ◦ No

Page 18: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

What are the primary motives behind data breaches? ◦ Criminal element & $$$

◦ Verizon 2012 DBIR:

Page 19: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Who is behind data breaches? ◦ Verizon 2012

DBIR:

Page 20: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

How do data breaches occur? ◦ Verizon 2012

DBIR:

Page 21: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

What commonalities exist between data

breaches? ◦ Verizon 2012 DBIR:

Page 22: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Industry groups represented by percent of breaches ◦ Verizon 2012 DBIR:

Page 23: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Industry groups represented by percent of breaches ◦ Verizon 2012 DBIR:

Page 24: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Threat agents over time by percent of breaches ◦ Verizon

2012 DBIR:

Page 25: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Compromised assets by percent of breaches and records ◦ Verizon

2012 DBIR:

Page 26: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Timespan of events by percent of breaches ◦ Verizon

2012 DBIR:

Page 27: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

So why are data breaches so damaging?

◦ They impact your organization’s bottom line

◦ Average cost is almost $18K per day

◦ All industries are susceptible data breaches

Page 28: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Average annualized cyber crime cost weighted by attack frequency ◦ Ponemon:

Page 29: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Percentage cost for external consequences ◦ Ponemon:

Page 30: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Responding to a data breach - percentage cost by internal activity centers ◦ Ponemon:

Page 31: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

What should we consider prior to a data breach? ◦ Ensure you have developed and tested an Incident

Response Plan

Page 32: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Incident Response Plan

Step one ◦ Build a response team

Page 33: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Incident Response Plan

Step two ◦ Assign a lead/liaison

Page 34: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Incident Response Plan

Step three ◦ Ensure everyone knows their job tasks

Page 35: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Incident Response Plan

Step four ◦ Create the contact list

Page 36: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Incident Response Plan

Step five ◦ Create a checklist

Page 37: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Incident Response Plan

Step six ◦ Document the entire process

Page 38: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Incident Response Plan

Step seven ◦ Notify customers

Page 39: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

How do you limit your exposure to a data breach? ◦ Perform due diligence on pen testers, internal

auditors, and critical vendors

Page 40: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

How do you limit your exposure to a data breach? ◦ Read penetration test EL

Page 41: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

How do you limit your exposure to a data breach? ◦ Smaller institutions

Page 42: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

How do you limit your exposure to a data breach? ◦ Perform gap analysis of the SANS 20 Critical

Security Controls

Page 43: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

How do you limit your exposure to a data breach? ◦ If you see bad behavior, call it out

Page 44: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

How do you limit your exposure to a data breach? ◦ Invest in security

Page 45: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Data breaches described in today’s webinar have been publicly reported and easily available over the Internet.

Major Sources include: ◦ http://www.ponemon.org

◦ http://datalossdb.org/

◦ https://www.privacyrights.org/

◦ http://www.databreaches.net/

◦ http://www.ftc.gov/

◦ Verizon 2012 Data Breach Investigations Report

Page 46: Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor

Website: www.sageworksinc.com

Phone: (919)-851-7474 ext. 693

Helpful links and resources: ◦ www.sageworksanalyst.com/resources.aspx

◦ web.sageworksinc.com/bank-webinars/

Find us on twitter: sageworksdata