SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
A study conducted by Verizon Business

2009 DATA BREACH INVESTIGATIONS REPORT
Brief by Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT
This brief will cover the
following:


   • My Conclusions
   • Quick Facts
   • Key Highlights
   • Findings, Conclusions,
     and Countermeasures
   • TVM-Doing More For
     Less
   • Summary of
     Recommendations
   •Q&A
QUICK FACTS
All results are based on firsthand evidence collected
during 90 data breach investigations occurring in 2008
conducted by Verizon Business.

  Only confirmed breaches are included. (not “data-at-
risk”)

  Most of the statistics presented refer to the percentage
of cases, the percentage of records breached, or simply
the number of cases.

  The authors make no claim that the findings of this
report are representative of all data breaches in all
organizations at all times.
Roughly 20 percent of cases involved more than one
breach

  Nearly half of the caseload had distinct patterns and
commonalities

 A little over 1/3 of the cases were made public (so far)
KEY HIGHLIGHTS
FINDINGS, CONCLUSIONS, AND
COUNTERMEASURES
Align process with policy
Achieve “Essential” then worry about “Excellent”
Secure Business Partner Connections
Create a Data Retention Plan
Control data with transaction zones
Monitor event logs
Create an Incident Response Plan
Increase awareness
Engage in mock incident testing
Changing default credentials is key
Avoid shared credentials
User Account Review
Application Testing and Code Review
Smarter Patch Management Strategies
Human Resources Termination Procedures
Enable Application Logs and Monitor
Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT
Principal - R!SC

Visit us at www.it-risc.com
Contact us at heldakhakhni@it-risc.com

Más contenido relacionado

Destacado

How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startupLoic Le Meur
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakShelly Sanchez Terrell
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerLuminary Labs
 

Destacado (6)

AITP-Verizon Data Breach 2009
AITP-Verizon Data Breach 2009AITP-Verizon Data Breach 2009
AITP-Verizon Data Breach 2009
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startup
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Similar a Data Breach 2009 ISACA HI

2016 Cost of Data Breach Study Global Analysis .docx
2016 Cost of Data Breach Study  Global Analysis .docx2016 Cost of Data Breach Study  Global Analysis .docx
2016 Cost of Data Breach Study Global Analysis .docxfelicidaddinwoodie
 
45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docxalinainglis
 
Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms
Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms
Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms Proformative, Inc.
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBsCarbonite
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCAegify Inc.
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCxmeteorite
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 linDanie Schoeman
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgCMR WORLD TECH
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughFraudBusters
 
Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudySymantec
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382CMR WORLD TECH
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasilJoão Rufino de Sales
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationIBM Security
 
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnline
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnlineThe 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnline
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnlineRapidSSLOnline.com
 

Similar a Data Breach 2009 ISACA HI (20)

2016 Cost of Data Breach Study Global Analysis .docx
2016 Cost of Data Breach Study  Global Analysis .docx2016 Cost of Data Breach Study  Global Analysis .docx
2016 Cost of Data Breach Study Global Analysis .docx
 
45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx45The Security Survey An OverviewA security survey is a.docx
45The Security Survey An OverviewA security survey is a.docx
 
HEMISPHERE SMB Case Study
HEMISPHERE SMB Case StudyHEMISPHERE SMB Case Study
HEMISPHERE SMB Case Study
 
Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms
Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms
Foreign Exchange Exposure Management: Benchmarking the Practices of 275 Firms
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
BREACH LEVEL INDEX
BREACH LEVEL INDEXBREACH LEVEL INDEX
BREACH LEVEL INDEX
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 lin
 
PCI COMPLIANCE REPORT
PCI COMPLIANCE REPORTPCI COMPLIANCE REPORT
PCI COMPLIANCE REPORT
 
Verizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xgVerizon rp pci report-2015-en_xg
Verizon rp pci report-2015-en_xg
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Whitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach StudyWhitepaper: 2013 Cost of Data Breach Study
Whitepaper: 2013 Cost of Data Breach Study
 
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382 Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
Gl na _ wp _ ponemon -2013 -cost-of-a-data-breach -report_dai_na_cta72382
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasil
 
The Economics of IT Risk and Reputation
The Economics of IT Risk and ReputationThe Economics of IT Risk and Reputation
The Economics of IT Risk and Reputation
 
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnline
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnlineThe 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnline
The 2013 Cost of Data Breach Study is out from Symantec - RapidSSLOnline
 

Data Breach 2009 ISACA HI

  • 1. A study conducted by Verizon Business 2009 DATA BREACH INVESTIGATIONS REPORT Brief by Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT
  • 2. This brief will cover the following: • My Conclusions • Quick Facts • Key Highlights • Findings, Conclusions, and Countermeasures • TVM-Doing More For Less • Summary of Recommendations •Q&A
  • 3.
  • 5. All results are based on firsthand evidence collected during 90 data breach investigations occurring in 2008 conducted by Verizon Business. Only confirmed breaches are included. (not “data-at- risk”) Most of the statistics presented refer to the percentage of cases, the percentage of records breached, or simply the number of cases. The authors make no claim that the findings of this report are representative of all data breaches in all organizations at all times.
  • 6. Roughly 20 percent of cases involved more than one breach Nearly half of the caseload had distinct patterns and commonalities A little over 1/3 of the cases were made public (so far)
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Align process with policy Achieve “Essential” then worry about “Excellent” Secure Business Partner Connections Create a Data Retention Plan Control data with transaction zones Monitor event logs Create an Incident Response Plan Increase awareness Engage in mock incident testing Changing default credentials is key Avoid shared credentials User Account Review Application Testing and Code Review Smarter Patch Management Strategies Human Resources Termination Procedures Enable Application Logs and Monitor
  • 35.
  • 36. Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT Principal - R!SC Visit us at www.it-risc.com Contact us at heldakhakhni@it-risc.com