SlideShare una empresa de Scribd logo
1 de 35
Descargar para leer sin conexión
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Cybercrime – Stealing in the
Connected Age
Treasury Alliance Group LLC
www.treasuryalliance.com
January 28, 2016
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Cybercrime – A Growing Threat
Source: Ponemon Institute, HP
2015 Cost of Cybercrime Study
Year over year net change in cybercrime
©2016 – Treasury Alliance Group LLC – All Rights Reserved
CYBERCRIME
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Malware
•  21 million new malware samples in 3rd quarter of
2015
–  “Ransomware” is a growing problem
–  75% are Trojans
•  33% of all PCs around the globe are now infected
–  China 45%
–  Turkey 43%
–  Peru 41%
–  Russia 38%
–  Taiwan 38%
•  US is still the top hosting country of phishing-based
Trojans and keyloggers – largely due to the number
of websites and domains hosted in the US
Source: Anti-Phishing Work Group
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Ransomware
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Vector of Malware Installation
The Rule of 20
Source: U.S. Secret Service
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Phishing
The creation and use of e-
mails and websites designed
to look like e-mails and
websites of well-known
legitimate businesses to
deceive Internet users into
disclosing their bank and
financial account information
or other personal data such as
usernames and passwords
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Phishing Illustrated
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Key Tells
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Phishing Attacks by Industry
Source: Anti-Phishing Work Group
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Pharming
Phishing’s evil twin – If you
won’t answer our email,
we’ll get you to come to
us!
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Pharming Illustrated
92.100.01.01
98.155.01.01
98.155.01.01
www.nicebank.com
©2016 – Treasury Alliance Group LLC – All Rights Reserved
BYOD – A Growing Issue
Source: Tech Pro Research
©2016 – Treasury Alliance Group LLC – All Rights Reserved
An Increasingly Mobile Universe
•  Potential rise of infested mobile apps. Don’t rely on mobile vendors’ app
vetting processes. Do your corporate diligence. Installing an app on your
phone may expose access to ALL of your phone data and ongoing activities,
including contact books, email, login information, browsing history, GPS
location history, security codes that you enter for conference calls, etc.
•  Onset of bring-your-own-device cultures. The mobile revolution has partly
benefited corporate mobile costs by inviting privately chosen devices into
corporate networks. However, this poses security risks stemming not only
from the nature of mobile, but also from the scope of devices on the
network. Hardware and software have known and lurking vulnerabilities.
More variety creates more exposure.
•  Mobile vulnerabilities are multi-dimensional. Phones with data access to the
corporate network can expose data, network authentication information,
network application access, remote sessions, browsing data, and even DNS
information. These exploits can be escalated to the land-based network.
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Smishing and Vishing
•  The rise of mobile creates new channels for the same
old tricks.
•  Sending you a fake SMS alert (Smishing) or voice mail
(Vishing) to create panic, so that you reveal useful
security information.
•  Objective is to confirm authenticity of your mobile
information (i.e.. the target phone is actually yours) and
to encourage a subversive action by you.
•  Example: “Your account has been compromised.
Immediately call 1-800-IAM-FAKE to help us investigate
this security breach. Alternatively, immediately log in
with your normal bank account user name and password
at www.authenticbank.fakesecurity.com.”
©2016 – Treasury Alliance Group LLC – All Rights Reserved
•  Corporate version of ID Theft
•  Mimics internal fraud
•  Funds are often gone before you are aware
there is a problem
•  “Mules”, who often think they are doing
legitimate business, are used to move the
money out of the country
•  Originally aimed at large companies but now
cybercrooks are targeting smaller businesses,
municipalities and non-profits
Corporate Account Takeover
©2016 – Treasury Alliance Group LLC – All Rights Reserved
COST OF CYBERCRIME
©2016 – Treasury Alliance Group LLC – All Rights Reserved
What are Cybercriminals After?
•  Usernames and passwords, obviously, but there’s
MUCH more
•  Information about the hardware and software you
are running:
•  Trade secrets and trade data – corporate espionage
•  Personally Identifiable Information
–  Social Security Number
–  Drivers License Number
–  Card Numbers
–  Bank Account Numbers
–  Etc. etc.
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Data Breaches
953
1241
3220
2345
3014
0
500
1,000
1,500
2,000
2,500
3,000
3,500
2010 2011 2012 2013 2014
0
200
400
600
800
1,000
1,200
Incidents
RecordsExposed
Millions
Incidents
Records
©2016 – Treasury Alliance Group LLC – All Rights Reserved
True Cost
•  Remediation
•  Legal costs
•  Regulatory costs and fines
•  Loss of customers
•  Reputation
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Total Cost
Source: Ponemon Institute, HP
2015 Cost of Cybercrime Study
Cost expressed in US dollars (000,000), n = 252 separate companies
©2016 – Treasury Alliance Group LLC – All Rights Reserved
BEST PRACTICES
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Best Practices
•  Educate your staff
•  Use pop-up blockers and anti-virus software and maintain
them!
•  Never respond to emails or pop-ups asking for personal
(corporate) info
•  Be suspicious of unknown or unexpected emails
•  Never open email attachments unless you already know
what’s in them
•  Lock unattended workstations
•  Use limited purpose workstations for financial transactions
•  Cyber risk policy and action plan
•  Insurance
•  Report suspicious activity
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Better to do it now …
before you have a problem!
Improve Your Authentication
•  Don’t use the same password for different login
levels.
•  Change your passwords regularly.
•  Use complex passwords, even if not enforced.
•  Consider using encrypted password “vaults” or
managers to store and machine-enter authentication
strings.
•  Be aware of symptoms of key-logging.
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Password Vaults
•  Store passwords
•  Create strong passwords
•  Device agnostic / cross-platform capabilities
•  Single password for access
©2016 – Treasury Alliance Group LLC – All Rights Reserved
•  Incident Response Plan
–  Specify the response team
–  Notification channels
–  Escalation Procedures
–  Identify regulatory requirements
–  Don’t forget PR
–  Test at least annually
•  Data Privacy Policy
–  Identify access to all PII and related information
–  Specify security policies and procedures
–  Review vendor agreements and processes
–  Board level approval
Cyber Risk Management Plan
©2016 – Treasury Alliance Group LLC – All Rights Reserved
CYBER LIABILITY
28
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Cyber Insurance
•  First Party
–  Notification
–  Credit Monitoring
–  Business Interruption
–  Extortion
–  Crises Management/PR
•  Third Party
–  Invasion of Privacy Rights
–  Media Intellectual Property
–  Failure to implement, maintain or enforce reasonable security
policies
–  Unfair, Deceptive and unlawful business practices
–  Regulatory Actions
Source: Oswald Insurance
©2016 – Treasury Alliance Group LLC – All Rights Reserved
•  First Party Coverages (Losses/expenses incurred by insured)
•  Event Management Expense: Coverage for notification costs,
credit monitoring/restoration services, legal assistance, forensic
investigation costs, and costs to hire PR firm to minimize harm
•  Cyber Extortion: Costs incurred to investigate and terminate an
extortion threat to commit an intentional computer attack against
the insured
•  Information Asset: Covers replacement costs as a result of
damage to or theft of insured’s information assets due to a
covered computer attack (Data Restoration)
•  Business Interruption: Coverage for loss (costs and lost income) in
the wake of a computer attack that interrupts or suspends your
business
First Party Privacy Insurance Coverage
©2016 – Treasury Alliance Group LLC – All Rights Reserved
•  Third Party Liability (Economic damages suffered by others)
•  Network Security Liability: Coverage for damages and defense costs
resulting from breaches in network security; i.e. computer virus,
unauthorized access, denial-of service, identity theft
•  Privacy Liability: Coverage for failure to protect or wrongful disclosure of
PI or PHI, whether or not due to failure of network security
•  Privacy Regulatory Proceeding Coverage: Covers costs resulting from
civil, administrative or regulatory proceedings alleging violation of
privacy laws
•  Electronic (Website) Media Liability Coverage: Coverage for content-
based injuries such as libel, slander, defamation, copyright
Third Party Privacy Insurance Coverage
©2016 – Treasury Alliance Group LLC – All Rights Reserved
OOPS
32
©2016 – Treasury Alliance Group LLC – All Rights Reserved
When It Happens
And it will happen!
•  Notify - Notify your bank immediately and
consider suspending funds transfer capabilities
until you know the scope of the problem.
•  Report - Contact appropriate law enforcement
and file a report.
•  Record - Make a written record of what
happened, what was lost, and the steps you
took to report the incident and attempt to
recover the funds involved.
©2016 – Treasury Alliance Group LLC – All Rights Reserved
CONCLUSIONS
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Conclusions
•  Cybercrime is a growing problem around the world
•  Convenience of easy access complicates the
problem
•  The total cost can be immense
•  There are things that you should be doing to protect
yourself
–  Policies and procedures
–  Training
–  Action plans
–  Insurance
–  Board involvement
•  Cybercrime is not just an IT issue, it should be part
of your overall enterprise risk planning
©2016 – Treasury Alliance Group LLC – All Rights Reserved
Daniel L. Blumen, CTP, Partner
Phone (630) 717-9728
dlblumen@treasuryalliance.com
Mark K. Webster, CCM, CPA, Partner
Phone (216) 932-1678
mark.webster@treasuryalliance.com
Treasury Alliance Group LLC
www.treasuryalliance.com
Contact Information
Page 37

Más contenido relacionado

La actualidad más candente

Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics Chris Stallard
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Business Days
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBsMary Brophy
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor RollCASCouncil
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19Citrin Cooperman
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Business Days
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastMohamed N. El-Guindy
 

La actualidad más candente (20)

Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Small Business Tip Card
Small Business Tip CardSmall Business Tip Card
Small Business Tip Card
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll2016 IRS Free e-File Audit & Honor Roll
2016 IRS Free e-File Audit & Honor Roll
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
TRU Snacks Webinar Series - Navigating Cybersecurity Risk in the Age of COVID-19
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 

Destacado

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Introduction to web designing
Introduction to web designingIntroduction to web designing
Introduction to web designingRajat Shah
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Introduction to developing modern web apps
Introduction to developing modern web appsIntroduction to developing modern web apps
Introduction to developing modern web appsFabricio Epaminondas
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile MalwareUpwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile MalwarePriyanka Aash
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 

Destacado (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
File mangement
File mangementFile mangement
File mangement
 
Unit 2
Unit 2Unit 2
Unit 2
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
Introduction to Web Designing
Introduction to Web DesigningIntroduction to Web Designing
Introduction to Web Designing
 
Introduction to web designing
Introduction to web designingIntroduction to web designing
Introduction to web designing
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Introduction to developing modern web apps
Introduction to developing modern web appsIntroduction to developing modern web apps
Introduction to developing modern web apps
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile MalwareUpwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar a Cybercrime - Stealing in the Connected Age

What a locked down law firm looks like updated
What a locked down law firm looks like updatedWhat a locked down law firm looks like updated
What a locked down law firm looks like updatedDenim Group
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsDavid McHale
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Caston Thomas
 

Similar a Cybercrime - Stealing in the Connected Age (20)

What a locked down law firm looks like updated
What a locked down law firm looks like updatedWhat a locked down law firm looks like updated
What a locked down law firm looks like updated
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen Accounts
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 

Último

The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure servicePooja Nehwal
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 

Último (20)

The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 

Cybercrime - Stealing in the Connected Age

  • 1. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Cybercrime – Stealing in the Connected Age Treasury Alliance Group LLC www.treasuryalliance.com January 28, 2016
  • 2. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Cybercrime – A Growing Threat Source: Ponemon Institute, HP 2015 Cost of Cybercrime Study Year over year net change in cybercrime
  • 3. ©2016 – Treasury Alliance Group LLC – All Rights Reserved CYBERCRIME
  • 4. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Malware •  21 million new malware samples in 3rd quarter of 2015 –  “Ransomware” is a growing problem –  75% are Trojans •  33% of all PCs around the globe are now infected –  China 45% –  Turkey 43% –  Peru 41% –  Russia 38% –  Taiwan 38% •  US is still the top hosting country of phishing-based Trojans and keyloggers – largely due to the number of websites and domains hosted in the US Source: Anti-Phishing Work Group
  • 5. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Ransomware
  • 6. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Vector of Malware Installation The Rule of 20 Source: U.S. Secret Service
  • 7. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Phishing The creation and use of e- mails and websites designed to look like e-mails and websites of well-known legitimate businesses to deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords
  • 8. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Phishing Illustrated
  • 9. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Key Tells
  • 10. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Phishing Attacks by Industry Source: Anti-Phishing Work Group
  • 11. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Pharming Phishing’s evil twin – If you won’t answer our email, we’ll get you to come to us!
  • 12. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Pharming Illustrated 92.100.01.01 98.155.01.01 98.155.01.01 www.nicebank.com
  • 13. ©2016 – Treasury Alliance Group LLC – All Rights Reserved BYOD – A Growing Issue Source: Tech Pro Research
  • 14. ©2016 – Treasury Alliance Group LLC – All Rights Reserved An Increasingly Mobile Universe •  Potential rise of infested mobile apps. Don’t rely on mobile vendors’ app vetting processes. Do your corporate diligence. Installing an app on your phone may expose access to ALL of your phone data and ongoing activities, including contact books, email, login information, browsing history, GPS location history, security codes that you enter for conference calls, etc. •  Onset of bring-your-own-device cultures. The mobile revolution has partly benefited corporate mobile costs by inviting privately chosen devices into corporate networks. However, this poses security risks stemming not only from the nature of mobile, but also from the scope of devices on the network. Hardware and software have known and lurking vulnerabilities. More variety creates more exposure. •  Mobile vulnerabilities are multi-dimensional. Phones with data access to the corporate network can expose data, network authentication information, network application access, remote sessions, browsing data, and even DNS information. These exploits can be escalated to the land-based network.
  • 15. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Smishing and Vishing •  The rise of mobile creates new channels for the same old tricks. •  Sending you a fake SMS alert (Smishing) or voice mail (Vishing) to create panic, so that you reveal useful security information. •  Objective is to confirm authenticity of your mobile information (i.e.. the target phone is actually yours) and to encourage a subversive action by you. •  Example: “Your account has been compromised. Immediately call 1-800-IAM-FAKE to help us investigate this security breach. Alternatively, immediately log in with your normal bank account user name and password at www.authenticbank.fakesecurity.com.”
  • 16. ©2016 – Treasury Alliance Group LLC – All Rights Reserved •  Corporate version of ID Theft •  Mimics internal fraud •  Funds are often gone before you are aware there is a problem •  “Mules”, who often think they are doing legitimate business, are used to move the money out of the country •  Originally aimed at large companies but now cybercrooks are targeting smaller businesses, municipalities and non-profits Corporate Account Takeover
  • 17. ©2016 – Treasury Alliance Group LLC – All Rights Reserved COST OF CYBERCRIME
  • 18. ©2016 – Treasury Alliance Group LLC – All Rights Reserved What are Cybercriminals After? •  Usernames and passwords, obviously, but there’s MUCH more •  Information about the hardware and software you are running: •  Trade secrets and trade data – corporate espionage •  Personally Identifiable Information –  Social Security Number –  Drivers License Number –  Card Numbers –  Bank Account Numbers –  Etc. etc.
  • 19. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Data Breaches 953 1241 3220 2345 3014 0 500 1,000 1,500 2,000 2,500 3,000 3,500 2010 2011 2012 2013 2014 0 200 400 600 800 1,000 1,200 Incidents RecordsExposed Millions Incidents Records
  • 20. ©2016 – Treasury Alliance Group LLC – All Rights Reserved True Cost •  Remediation •  Legal costs •  Regulatory costs and fines •  Loss of customers •  Reputation
  • 21. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Total Cost Source: Ponemon Institute, HP 2015 Cost of Cybercrime Study Cost expressed in US dollars (000,000), n = 252 separate companies
  • 22. ©2016 – Treasury Alliance Group LLC – All Rights Reserved BEST PRACTICES
  • 23. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Best Practices •  Educate your staff •  Use pop-up blockers and anti-virus software and maintain them! •  Never respond to emails or pop-ups asking for personal (corporate) info •  Be suspicious of unknown or unexpected emails •  Never open email attachments unless you already know what’s in them •  Lock unattended workstations •  Use limited purpose workstations for financial transactions •  Cyber risk policy and action plan •  Insurance •  Report suspicious activity
  • 24. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Better to do it now … before you have a problem! Improve Your Authentication •  Don’t use the same password for different login levels. •  Change your passwords regularly. •  Use complex passwords, even if not enforced. •  Consider using encrypted password “vaults” or managers to store and machine-enter authentication strings. •  Be aware of symptoms of key-logging.
  • 25. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Password Vaults •  Store passwords •  Create strong passwords •  Device agnostic / cross-platform capabilities •  Single password for access
  • 26. ©2016 – Treasury Alliance Group LLC – All Rights Reserved •  Incident Response Plan –  Specify the response team –  Notification channels –  Escalation Procedures –  Identify regulatory requirements –  Don’t forget PR –  Test at least annually •  Data Privacy Policy –  Identify access to all PII and related information –  Specify security policies and procedures –  Review vendor agreements and processes –  Board level approval Cyber Risk Management Plan
  • 27. ©2016 – Treasury Alliance Group LLC – All Rights Reserved CYBER LIABILITY 28
  • 28. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Cyber Insurance •  First Party –  Notification –  Credit Monitoring –  Business Interruption –  Extortion –  Crises Management/PR •  Third Party –  Invasion of Privacy Rights –  Media Intellectual Property –  Failure to implement, maintain or enforce reasonable security policies –  Unfair, Deceptive and unlawful business practices –  Regulatory Actions Source: Oswald Insurance
  • 29. ©2016 – Treasury Alliance Group LLC – All Rights Reserved •  First Party Coverages (Losses/expenses incurred by insured) •  Event Management Expense: Coverage for notification costs, credit monitoring/restoration services, legal assistance, forensic investigation costs, and costs to hire PR firm to minimize harm •  Cyber Extortion: Costs incurred to investigate and terminate an extortion threat to commit an intentional computer attack against the insured •  Information Asset: Covers replacement costs as a result of damage to or theft of insured’s information assets due to a covered computer attack (Data Restoration) •  Business Interruption: Coverage for loss (costs and lost income) in the wake of a computer attack that interrupts or suspends your business First Party Privacy Insurance Coverage
  • 30. ©2016 – Treasury Alliance Group LLC – All Rights Reserved •  Third Party Liability (Economic damages suffered by others) •  Network Security Liability: Coverage for damages and defense costs resulting from breaches in network security; i.e. computer virus, unauthorized access, denial-of service, identity theft •  Privacy Liability: Coverage for failure to protect or wrongful disclosure of PI or PHI, whether or not due to failure of network security •  Privacy Regulatory Proceeding Coverage: Covers costs resulting from civil, administrative or regulatory proceedings alleging violation of privacy laws •  Electronic (Website) Media Liability Coverage: Coverage for content- based injuries such as libel, slander, defamation, copyright Third Party Privacy Insurance Coverage
  • 31. ©2016 – Treasury Alliance Group LLC – All Rights Reserved OOPS 32
  • 32. ©2016 – Treasury Alliance Group LLC – All Rights Reserved When It Happens And it will happen! •  Notify - Notify your bank immediately and consider suspending funds transfer capabilities until you know the scope of the problem. •  Report - Contact appropriate law enforcement and file a report. •  Record - Make a written record of what happened, what was lost, and the steps you took to report the incident and attempt to recover the funds involved.
  • 33. ©2016 – Treasury Alliance Group LLC – All Rights Reserved CONCLUSIONS
  • 34. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Conclusions •  Cybercrime is a growing problem around the world •  Convenience of easy access complicates the problem •  The total cost can be immense •  There are things that you should be doing to protect yourself –  Policies and procedures –  Training –  Action plans –  Insurance –  Board involvement •  Cybercrime is not just an IT issue, it should be part of your overall enterprise risk planning
  • 35. ©2016 – Treasury Alliance Group LLC – All Rights Reserved Daniel L. Blumen, CTP, Partner Phone (630) 717-9728 dlblumen@treasuryalliance.com Mark K. Webster, CCM, CPA, Partner Phone (216) 932-1678 mark.webster@treasuryalliance.com Treasury Alliance Group LLC www.treasuryalliance.com Contact Information Page 37