SlideShare a Scribd company logo
1 of 19
Download to read offline
Presenting Today
Geoff Hancock
CEO
Advanced Cyber Security
Group
@GeoffHanCyber
Follow along on Twitter: #BizWebinar @BizLibrary
Erin Boettge
Content Marketing Manager,
BizLibrary
eboettge@bizlibrary.com
• Removed 100 gigs of data
• Included personal information about Sony Pictures
employees and their families, e-mails between
employees, information about executive salaries,
and copies of then-unreleased Sony films
• Gained access to the network through phishing
and an employee selling her administrator
credentials
• Stole and destroyed the data
Sony
Sony Breach—Guardians of Peace
Target
• 110 million records
stolen
• Associated costs topped
$200 million
• Target says it committed
$10m to update
technology
• Target CEO Gregg
Steinhafel resigned
Target
• Stole the credentials of Target's HVAC vendor,
Fazio Mechanical Services
• Infected the vendor with general-purpose
malware Citadel through an email phishing
campaign
• Had to slow down to do reconnaissance
JP Morgan
• Stole 83m customers' personal
information
• Obtained list of applications and
programs running on
JP Morgan’s computers
• Gained information to target
specific people—and extra
insight into the stock market
JP Morgan
• Stole the login credentials of an
employee
• Able to do so because:
• Did not have double (two-factor,
second one-time password)
authentication scheme
• Security team apparently
neglected to upgrade one
network server
Office of Personal Management (OPM)
• Stole 22.5 million records
• Accessed poorly
configured, outdated
systems
• Gained access via an
administrator’s info
Contractors breached:
 USIS
 Keypoint Government Solutions
Office Of Personal Management
Malware was found, but insertion was identified as
10 months prior to the first breach (2013).
IMPACT
• SF86 forms stolen
• Classified information stolen
Attackers’ Process
• Investigate victim
• Determine most
effective malware
• Determine and execute insertion technique
• Secure beachhead and establish access
• Move across system
• Identify valuable data
• Exfiltrate information
How The Attackers Get In
• Phishing
• Social engineering
• Known vulnerabilities
• USB sticks
• Ransomware
• IT Configurations
• Distributed Denial of
Service (DDoS)
• Passwords
Fog of More
What can organizations do?
Humans in the Loop: Cyber Hygiene
• Use email securely
• Identify phishing
• Change passwords (make them
complex)
• Practice wireless security
• Understand social engineering
• Use social media judiciously
• Be alert to insider threats
• Secure the supply chain
Technical Cyber Hygiene
• Change IT configurations
• Utilize Defense in Depth
• Put in place firewalls and endpoint monitoring
• Use encryption
• Look up the SMB list
For more information
see CISecurity.org
A Tale of Two Breaches
Video Series
• PCI DSS Compliance for Restaurant
Employees
• A Tale of Two Breaches
• Cybersecurity and Social Media
• Protecting Against Insider Threats
• Protecting Personal Data
• Protecting Against Malware
• Social Engineering
• Wireless Security
• Mobile Device Security
• Phishing
• Password Security
• Using Email Securely
Computing Securely in the Cloud
The best assessment of your
leadership comes from
those you lead.
Has a new day dawned where Cloud Computing
and security are in perfect alignment? Well, for
now, let's just say we're closer to that lofty goal
than we had been. With broad acceptance, and
the adoption of Cloud platforms by more and
more organizations, it seems we've reached a
point where we may be feeling a bit better about
Cloud security. That being said, as we're all aware,
there's still much to learn and still a need to
proceed cautiously with Cloud ventures.
Try out these video lessons
and more!
Let us know through the poll if you’d like a free trial of
BizLibrary’s online course collection.
www.bizlibrary.com/free-trial

More Related Content

What's hot

Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wirelessFedora Leo
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesMike Ryan
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentationPrinceBanton1
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads PresentationDansha
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Abhinav Biswas
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityRob Dudley
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risksrisksmith
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Abhinav Biswas
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 

What's hot (20)

Building a data network (wired and wireless
Building a data network (wired and wirelessBuilding a data network (wired and wireless
Building a data network (wired and wireless
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for Businesses
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Prince banton cybercrime presentation
Prince banton cybercrime presentationPrince banton cybercrime presentation
Prince banton cybercrime presentation
 
Humming Heads Presentation
Humming Heads PresentationHumming Heads Presentation
Humming Heads Presentation
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
 
A Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application SecurityA Comedy of Errors in Web Application Security
A Comedy of Errors in Web Application Security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Cyber and Data Risks
Cyber and Data RisksCyber and Data Risks
Cyber and Data Risks
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)Dark - Side of Internet of Things (IOT)
Dark - Side of Internet of Things (IOT)
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 

Viewers also liked

Why SIMPLE Wins: Escape the Complexity Trap and Get to Work that Matters
Why SIMPLE Wins: Escape the Complexity Trap and Get to Work that MattersWhy SIMPLE Wins: Escape the Complexity Trap and Get to Work that Matters
Why SIMPLE Wins: Escape the Complexity Trap and Get to Work that MattersBizLibrary
 
How to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training ProgramHow to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training ProgramBizLibrary
 
Harassment Prevention: From the Illegal to the Currently Legal to the Percept...
Harassment Prevention: From the Illegal to the Currently Legal to the Percept...Harassment Prevention: From the Illegal to the Currently Legal to the Percept...
Harassment Prevention: From the Illegal to the Currently Legal to the Percept...BizLibrary
 
Yes You Do Have a Crystal Ball: HR in 2020 and Beyond
Yes You Do Have a Crystal Ball: HR in 2020 and BeyondYes You Do Have a Crystal Ball: HR in 2020 and Beyond
Yes You Do Have a Crystal Ball: HR in 2020 and BeyondBizLibrary
 
Effective Time Management Techniques to Teach Your Employees
Effective Time Management Techniques to Teach Your EmployeesEffective Time Management Techniques to Teach Your Employees
Effective Time Management Techniques to Teach Your EmployeesBizLibrary
 
The State of Performance Management: What’s Broken and How to Fix It
The State of Performance Management: What’s Broken and How to Fix ItThe State of Performance Management: What’s Broken and How to Fix It
The State of Performance Management: What’s Broken and How to Fix ItBizLibrary
 
6 Ways to Improve Employee Engagement and Create a Culture of Learning
6 Ways to Improve Employee Engagement and Create a Culture of Learning6 Ways to Improve Employee Engagement and Create a Culture of Learning
6 Ways to Improve Employee Engagement and Create a Culture of LearningBizLibrary
 
Using Effectance to Better Motivate Yourself and Others: How to make work mor...
Using Effectance to Better Motivate Yourself and Others: How to make work mor...Using Effectance to Better Motivate Yourself and Others: How to make work mor...
Using Effectance to Better Motivate Yourself and Others: How to make work mor...BizLibrary
 
Unlocking Potential to Lead and Influence
Unlocking Potential to Lead and InfluenceUnlocking Potential to Lead and Influence
Unlocking Potential to Lead and InfluenceBizLibrary
 
BoosterLearning: The Holy Grail for All Forms of Training
BoosterLearning: The Holy Grail for All Forms of TrainingBoosterLearning: The Holy Grail for All Forms of Training
BoosterLearning: The Holy Grail for All Forms of TrainingBizLibrary
 
Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...
Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...
Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...BizLibrary
 
Make Change Work: Leadership Strategies to Build Support and Overcome Resistance
Make Change Work: Leadership Strategies to Build Support and Overcome ResistanceMake Change Work: Leadership Strategies to Build Support and Overcome Resistance
Make Change Work: Leadership Strategies to Build Support and Overcome ResistanceBizLibrary
 
The New VUCA World: Creating Alignment for Stability
The New VUCA World: Creating Alignment for StabilityThe New VUCA World: Creating Alignment for Stability
The New VUCA World: Creating Alignment for StabilityBizLibrary
 
Onboard, Not Overboard: 5 Ways to Accelerate New Hire Training
Onboard, Not Overboard: 5 Ways to Accelerate New Hire TrainingOnboard, Not Overboard: 5 Ways to Accelerate New Hire Training
Onboard, Not Overboard: 5 Ways to Accelerate New Hire TrainingBizLibrary
 
Push or Pull Learning
Push or Pull LearningPush or Pull Learning
Push or Pull LearningBizLibrary
 
Sink or Swim: Supporting the Transition to New Manager
Sink or Swim: Supporting the Transition to New ManagerSink or Swim: Supporting the Transition to New Manager
Sink or Swim: Supporting the Transition to New ManagerBizLibrary
 
Driving It Home: Real Change is Not an Even, It's a Process
Driving It Home: Real Change is Not an Even, It's a ProcessDriving It Home: Real Change is Not an Even, It's a Process
Driving It Home: Real Change is Not an Even, It's a ProcessBizLibrary
 
Stop Waiting for Your Invitation: Drive Growth and Engage Strategically Today
Stop Waiting for Your Invitation: Drive Growth and Engage Strategically TodayStop Waiting for Your Invitation: Drive Growth and Engage Strategically Today
Stop Waiting for Your Invitation: Drive Growth and Engage Strategically TodayBizLibrary
 
Creating a Mindset for Change and Innovation
Creating a Mindset for Change and InnovationCreating a Mindset for Change and Innovation
Creating a Mindset for Change and InnovationBizLibrary
 
Measuring the Impact of Employee Soft Skills Training
Measuring the Impact of Employee Soft Skills TrainingMeasuring the Impact of Employee Soft Skills Training
Measuring the Impact of Employee Soft Skills TrainingBizLibrary
 

Viewers also liked (20)

Why SIMPLE Wins: Escape the Complexity Trap and Get to Work that Matters
Why SIMPLE Wins: Escape the Complexity Trap and Get to Work that MattersWhy SIMPLE Wins: Escape the Complexity Trap and Get to Work that Matters
Why SIMPLE Wins: Escape the Complexity Trap and Get to Work that Matters
 
How to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training ProgramHow to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training Program
 
Harassment Prevention: From the Illegal to the Currently Legal to the Percept...
Harassment Prevention: From the Illegal to the Currently Legal to the Percept...Harassment Prevention: From the Illegal to the Currently Legal to the Percept...
Harassment Prevention: From the Illegal to the Currently Legal to the Percept...
 
Yes You Do Have a Crystal Ball: HR in 2020 and Beyond
Yes You Do Have a Crystal Ball: HR in 2020 and BeyondYes You Do Have a Crystal Ball: HR in 2020 and Beyond
Yes You Do Have a Crystal Ball: HR in 2020 and Beyond
 
Effective Time Management Techniques to Teach Your Employees
Effective Time Management Techniques to Teach Your EmployeesEffective Time Management Techniques to Teach Your Employees
Effective Time Management Techniques to Teach Your Employees
 
The State of Performance Management: What’s Broken and How to Fix It
The State of Performance Management: What’s Broken and How to Fix ItThe State of Performance Management: What’s Broken and How to Fix It
The State of Performance Management: What’s Broken and How to Fix It
 
6 Ways to Improve Employee Engagement and Create a Culture of Learning
6 Ways to Improve Employee Engagement and Create a Culture of Learning6 Ways to Improve Employee Engagement and Create a Culture of Learning
6 Ways to Improve Employee Engagement and Create a Culture of Learning
 
Using Effectance to Better Motivate Yourself and Others: How to make work mor...
Using Effectance to Better Motivate Yourself and Others: How to make work mor...Using Effectance to Better Motivate Yourself and Others: How to make work mor...
Using Effectance to Better Motivate Yourself and Others: How to make work mor...
 
Unlocking Potential to Lead and Influence
Unlocking Potential to Lead and InfluenceUnlocking Potential to Lead and Influence
Unlocking Potential to Lead and Influence
 
BoosterLearning: The Holy Grail for All Forms of Training
BoosterLearning: The Holy Grail for All Forms of TrainingBoosterLearning: The Holy Grail for All Forms of Training
BoosterLearning: The Holy Grail for All Forms of Training
 
Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...
Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...
Steps to Success: Improving the Overall Effectiveness of Your Employee Traini...
 
Make Change Work: Leadership Strategies to Build Support and Overcome Resistance
Make Change Work: Leadership Strategies to Build Support and Overcome ResistanceMake Change Work: Leadership Strategies to Build Support and Overcome Resistance
Make Change Work: Leadership Strategies to Build Support and Overcome Resistance
 
The New VUCA World: Creating Alignment for Stability
The New VUCA World: Creating Alignment for StabilityThe New VUCA World: Creating Alignment for Stability
The New VUCA World: Creating Alignment for Stability
 
Onboard, Not Overboard: 5 Ways to Accelerate New Hire Training
Onboard, Not Overboard: 5 Ways to Accelerate New Hire TrainingOnboard, Not Overboard: 5 Ways to Accelerate New Hire Training
Onboard, Not Overboard: 5 Ways to Accelerate New Hire Training
 
Push or Pull Learning
Push or Pull LearningPush or Pull Learning
Push or Pull Learning
 
Sink or Swim: Supporting the Transition to New Manager
Sink or Swim: Supporting the Transition to New ManagerSink or Swim: Supporting the Transition to New Manager
Sink or Swim: Supporting the Transition to New Manager
 
Driving It Home: Real Change is Not an Even, It's a Process
Driving It Home: Real Change is Not an Even, It's a ProcessDriving It Home: Real Change is Not an Even, It's a Process
Driving It Home: Real Change is Not an Even, It's a Process
 
Stop Waiting for Your Invitation: Drive Growth and Engage Strategically Today
Stop Waiting for Your Invitation: Drive Growth and Engage Strategically TodayStop Waiting for Your Invitation: Drive Growth and Engage Strategically Today
Stop Waiting for Your Invitation: Drive Growth and Engage Strategically Today
 
Creating a Mindset for Change and Innovation
Creating a Mindset for Change and InnovationCreating a Mindset for Change and Innovation
Creating a Mindset for Change and Innovation
 
Measuring the Impact of Employee Soft Skills Training
Measuring the Impact of Employee Soft Skills TrainingMeasuring the Impact of Employee Soft Skills Training
Measuring the Impact of Employee Soft Skills Training
 

Similar to Lessons Learned from the Top Four Cyber Security Breaches & How Your Company Can Apply Them Now

Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxdhananjay80
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraKapil Mehrotra
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxJohn Donahue
 
Security & Privacy in Today's IT Environment
Security & Privacy in Today's IT EnvironmentSecurity & Privacy in Today's IT Environment
Security & Privacy in Today's IT EnvironmentTechSoup
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 

Similar to Lessons Learned from the Top Four Cyber Security Breaches & How Your Company Can Apply Them Now (20)

Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security & Privacy in Today's IT Environment
Security & Privacy in Today's IT EnvironmentSecurity & Privacy in Today's IT Environment
Security & Privacy in Today's IT Environment
 
This Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is DifferentThis Time, It’s Personal: Why Security and the IoT Is Different
This Time, It’s Personal: Why Security and the IoT Is Different
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 

More from BizLibrary

5 Ways to Improve Connection and Engagement with Remote Teams
5 Ways to Improve Connection and Engagement with Remote Teams5 Ways to Improve Connection and Engagement with Remote Teams
5 Ways to Improve Connection and Engagement with Remote TeamsBizLibrary
 
Training Program of Dreams: If You Market It, They Will Come
Training Program of Dreams: If You Market It, They Will ComeTraining Program of Dreams: If You Market It, They Will Come
Training Program of Dreams: If You Market It, They Will ComeBizLibrary
 
Microaggressions what are they and how can i avoid using them
Microaggressions what are they and how can i avoid using themMicroaggressions what are they and how can i avoid using them
Microaggressions what are they and how can i avoid using themBizLibrary
 
Addressing Mental Health in the Workplace
Addressing Mental Health in the WorkplaceAddressing Mental Health in the Workplace
Addressing Mental Health in the WorkplaceBizLibrary
 
How to Develop Agility Within Your Training Program to Help Your Learners Suc...
How to Develop Agility Within Your Training Program to Help Your Learners Suc...How to Develop Agility Within Your Training Program to Help Your Learners Suc...
How to Develop Agility Within Your Training Program to Help Your Learners Suc...BizLibrary
 
7 Steps to Create a Competency-Based Training Program
7 Steps to Create a Competency-Based Training Program7 Steps to Create a Competency-Based Training Program
7 Steps to Create a Competency-Based Training ProgramBizLibrary
 
How Training Managers Can Use Self-Development to Improve Their Programs
How Training Managers Can Use Self-Development to Improve Their ProgramsHow Training Managers Can Use Self-Development to Improve Their Programs
How Training Managers Can Use Self-Development to Improve Their ProgramsBizLibrary
 
How to Prepare Your Organization for a Safe Re-Entry During COVID-19
How to Prepare Your Organization for a Safe Re-Entry During COVID-19How to Prepare Your Organization for a Safe Re-Entry During COVID-19
How to Prepare Your Organization for a Safe Re-Entry During COVID-19BizLibrary
 
How to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training ProgramHow to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training ProgramBizLibrary
 
The High EQ Leader: How Emotional Intelligence Can Impact Your Organization
The High EQ Leader: How Emotional Intelligence Can Impact Your OrganizationThe High EQ Leader: How Emotional Intelligence Can Impact Your Organization
The High EQ Leader: How Emotional Intelligence Can Impact Your OrganizationBizLibrary
 
Horizontal vs Vertical Career Pathing: How to Make Promotions Work
Horizontal vs Vertical Career Pathing: How to Make Promotions WorkHorizontal vs Vertical Career Pathing: How to Make Promotions Work
Horizontal vs Vertical Career Pathing: How to Make Promotions WorkBizLibrary
 
What Makes a Great Employee Benefits Package?
What Makes a Great Employee Benefits Package?What Makes a Great Employee Benefits Package?
What Makes a Great Employee Benefits Package?BizLibrary
 
L&D's Role in Closing the Soft Skills Gap
L&D's Role in Closing the Soft Skills GapL&D's Role in Closing the Soft Skills Gap
L&D's Role in Closing the Soft Skills GapBizLibrary
 
Training for Success: Balancing Compliance and Professional Development
Training for Success: Balancing Compliance and Professional DevelopmentTraining for Success: Balancing Compliance and Professional Development
Training for Success: Balancing Compliance and Professional DevelopmentBizLibrary
 
5 Ways to Prepare Your Organization for a Successful 2020
5 Ways to Prepare Your Organization for a Successful 20205 Ways to Prepare Your Organization for a Successful 2020
5 Ways to Prepare Your Organization for a Successful 2020BizLibrary
 
Learn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz library
Learn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz libraryLearn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz library
Learn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz libraryBizLibrary
 
9 Characteristics of Top Employee Training Programs
9 Characteristics of Top Employee Training Programs9 Characteristics of Top Employee Training Programs
9 Characteristics of Top Employee Training ProgramsBizLibrary
 
How to Develop High Potential Employees in Your Organization
How to Develop High Potential Employees in Your Organization How to Develop High Potential Employees in Your Organization
How to Develop High Potential Employees in Your Organization BizLibrary
 
How to Build a Learning Culture to Inspire Employee Growth
How to Build a Learning Culture to Inspire Employee GrowthHow to Build a Learning Culture to Inspire Employee Growth
How to Build a Learning Culture to Inspire Employee GrowthBizLibrary
 
From Peer to Leader: How to Develop Your First-Time Managers
From Peer to Leader: How to Develop Your First-Time ManagersFrom Peer to Leader: How to Develop Your First-Time Managers
From Peer to Leader: How to Develop Your First-Time ManagersBizLibrary
 

More from BizLibrary (20)

5 Ways to Improve Connection and Engagement with Remote Teams
5 Ways to Improve Connection and Engagement with Remote Teams5 Ways to Improve Connection and Engagement with Remote Teams
5 Ways to Improve Connection and Engagement with Remote Teams
 
Training Program of Dreams: If You Market It, They Will Come
Training Program of Dreams: If You Market It, They Will ComeTraining Program of Dreams: If You Market It, They Will Come
Training Program of Dreams: If You Market It, They Will Come
 
Microaggressions what are they and how can i avoid using them
Microaggressions what are they and how can i avoid using themMicroaggressions what are they and how can i avoid using them
Microaggressions what are they and how can i avoid using them
 
Addressing Mental Health in the Workplace
Addressing Mental Health in the WorkplaceAddressing Mental Health in the Workplace
Addressing Mental Health in the Workplace
 
How to Develop Agility Within Your Training Program to Help Your Learners Suc...
How to Develop Agility Within Your Training Program to Help Your Learners Suc...How to Develop Agility Within Your Training Program to Help Your Learners Suc...
How to Develop Agility Within Your Training Program to Help Your Learners Suc...
 
7 Steps to Create a Competency-Based Training Program
7 Steps to Create a Competency-Based Training Program7 Steps to Create a Competency-Based Training Program
7 Steps to Create a Competency-Based Training Program
 
How Training Managers Can Use Self-Development to Improve Their Programs
How Training Managers Can Use Self-Development to Improve Their ProgramsHow Training Managers Can Use Self-Development to Improve Their Programs
How Training Managers Can Use Self-Development to Improve Their Programs
 
How to Prepare Your Organization for a Safe Re-Entry During COVID-19
How to Prepare Your Organization for a Safe Re-Entry During COVID-19How to Prepare Your Organization for a Safe Re-Entry During COVID-19
How to Prepare Your Organization for a Safe Re-Entry During COVID-19
 
How to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training ProgramHow to Gain Leadership Buy-In for Your Training Program
How to Gain Leadership Buy-In for Your Training Program
 
The High EQ Leader: How Emotional Intelligence Can Impact Your Organization
The High EQ Leader: How Emotional Intelligence Can Impact Your OrganizationThe High EQ Leader: How Emotional Intelligence Can Impact Your Organization
The High EQ Leader: How Emotional Intelligence Can Impact Your Organization
 
Horizontal vs Vertical Career Pathing: How to Make Promotions Work
Horizontal vs Vertical Career Pathing: How to Make Promotions WorkHorizontal vs Vertical Career Pathing: How to Make Promotions Work
Horizontal vs Vertical Career Pathing: How to Make Promotions Work
 
What Makes a Great Employee Benefits Package?
What Makes a Great Employee Benefits Package?What Makes a Great Employee Benefits Package?
What Makes a Great Employee Benefits Package?
 
L&D's Role in Closing the Soft Skills Gap
L&D's Role in Closing the Soft Skills GapL&D's Role in Closing the Soft Skills Gap
L&D's Role in Closing the Soft Skills Gap
 
Training for Success: Balancing Compliance and Professional Development
Training for Success: Balancing Compliance and Professional DevelopmentTraining for Success: Balancing Compliance and Professional Development
Training for Success: Balancing Compliance and Professional Development
 
5 Ways to Prepare Your Organization for a Successful 2020
5 Ways to Prepare Your Organization for a Successful 20205 Ways to Prepare Your Organization for a Successful 2020
5 Ways to Prepare Your Organization for a Successful 2020
 
Learn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz library
Learn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz libraryLearn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz library
Learn to Actually Engage Your Employees Why 87 Trillion Isn't Enough biz library
 
9 Characteristics of Top Employee Training Programs
9 Characteristics of Top Employee Training Programs9 Characteristics of Top Employee Training Programs
9 Characteristics of Top Employee Training Programs
 
How to Develop High Potential Employees in Your Organization
How to Develop High Potential Employees in Your Organization How to Develop High Potential Employees in Your Organization
How to Develop High Potential Employees in Your Organization
 
How to Build a Learning Culture to Inspire Employee Growth
How to Build a Learning Culture to Inspire Employee GrowthHow to Build a Learning Culture to Inspire Employee Growth
How to Build a Learning Culture to Inspire Employee Growth
 
From Peer to Leader: How to Develop Your First-Time Managers
From Peer to Leader: How to Develop Your First-Time ManagersFrom Peer to Leader: How to Develop Your First-Time Managers
From Peer to Leader: How to Develop Your First-Time Managers
 

Recently uploaded

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 

Recently uploaded (20)

PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 

Lessons Learned from the Top Four Cyber Security Breaches & How Your Company Can Apply Them Now

  • 1.
  • 2. Presenting Today Geoff Hancock CEO Advanced Cyber Security Group @GeoffHanCyber Follow along on Twitter: #BizWebinar @BizLibrary Erin Boettge Content Marketing Manager, BizLibrary eboettge@bizlibrary.com
  • 3. • Removed 100 gigs of data • Included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries, and copies of then-unreleased Sony films • Gained access to the network through phishing and an employee selling her administrator credentials • Stole and destroyed the data Sony
  • 5. Target • 110 million records stolen • Associated costs topped $200 million • Target says it committed $10m to update technology • Target CEO Gregg Steinhafel resigned
  • 6. Target • Stole the credentials of Target's HVAC vendor, Fazio Mechanical Services • Infected the vendor with general-purpose malware Citadel through an email phishing campaign • Had to slow down to do reconnaissance
  • 7. JP Morgan • Stole 83m customers' personal information • Obtained list of applications and programs running on JP Morgan’s computers • Gained information to target specific people—and extra insight into the stock market
  • 8. JP Morgan • Stole the login credentials of an employee • Able to do so because: • Did not have double (two-factor, second one-time password) authentication scheme • Security team apparently neglected to upgrade one network server
  • 9. Office of Personal Management (OPM) • Stole 22.5 million records • Accessed poorly configured, outdated systems • Gained access via an administrator’s info Contractors breached:  USIS  Keypoint Government Solutions
  • 10. Office Of Personal Management Malware was found, but insertion was identified as 10 months prior to the first breach (2013). IMPACT • SF86 forms stolen • Classified information stolen
  • 11. Attackers’ Process • Investigate victim • Determine most effective malware • Determine and execute insertion technique • Secure beachhead and establish access • Move across system • Identify valuable data • Exfiltrate information
  • 12. How The Attackers Get In • Phishing • Social engineering • Known vulnerabilities • USB sticks • Ransomware • IT Configurations • Distributed Denial of Service (DDoS) • Passwords
  • 15. Humans in the Loop: Cyber Hygiene • Use email securely • Identify phishing • Change passwords (make them complex) • Practice wireless security • Understand social engineering • Use social media judiciously • Be alert to insider threats • Secure the supply chain
  • 16. Technical Cyber Hygiene • Change IT configurations • Utilize Defense in Depth • Put in place firewalls and endpoint monitoring • Use encryption • Look up the SMB list For more information see CISecurity.org
  • 17. A Tale of Two Breaches Video Series • PCI DSS Compliance for Restaurant Employees • A Tale of Two Breaches • Cybersecurity and Social Media • Protecting Against Insider Threats • Protecting Personal Data • Protecting Against Malware • Social Engineering • Wireless Security • Mobile Device Security • Phishing • Password Security • Using Email Securely
  • 18. Computing Securely in the Cloud The best assessment of your leadership comes from those you lead. Has a new day dawned where Cloud Computing and security are in perfect alignment? Well, for now, let's just say we're closer to that lofty goal than we had been. With broad acceptance, and the adoption of Cloud platforms by more and more organizations, it seems we've reached a point where we may be feeling a bit better about Cloud security. That being said, as we're all aware, there's still much to learn and still a need to proceed cautiously with Cloud ventures.
  • 19. Try out these video lessons and more! Let us know through the poll if you’d like a free trial of BizLibrary’s online course collection. www.bizlibrary.com/free-trial