SlideShare una empresa de Scribd logo
1 de 18
Breach Response Planning: Hammer Out
Your Legal, Business and Technology
Differences, Before a Breach
Michael Scheidell, CISSP, CCISO, SMIEEE
Chief Information Security Officer
Miami Fraud & Breach Prevention Summit
Michael Scheidell, CISSP, CCISO, SMIEEE
• CISSP, Certified CISO
• Former Banking and Finance
Sector Chief, FBI InfraGard,
South Florida Members Alliance
• Delegate to NIST CSF workshop
• Senior Member, IEEE
• Privacy Expert
• Member ISSA, IAPP, ISACA, SFTA, CSA
• Patents in Network Security
• Founded 3 technology companies
• Recent Engagements: $2.2BN National
Pharmacy, Law Office, Banking Audits
@scheidell
561-948-1305 / michael@securityprivateers.com
http://www.securityprivateers.com
If you haven’t been breached yet:
•You have, but don’t know it (90%): PWC 1
•It WILL happen. (100%): RSA 2
1. http://www.scmagazineuk.com/pwc-almost-all-large-companies-suffered-a-data-breach-last-year/article/418343/
2. http://www.crn.com/news/security/232601663/coviello-rsa-security-breach-could-happen-to-anyone.htm
It Can’t happen to me
Frameworks / Standards / NIST CSF
IDENTIFY
PROTECT
DETECT
RESPOND
RECOVER
DETECT
Develop and implement the appropriate
activities to identify the occurrence of a
cybersecurity event.
•Anomalies and Events
•Security Continuous Monitoring
•Detection Process
RESPOND
Develop and implement the appropriate
activities to take action regarding a detected
cybersecurity event.
•Response Planning
•Communications
•Analysis
•Mitigation
•Improvements
RECOVER
Develop and implement the appropriate
activities to maintain plans for resilience and to
restore any capabilities or services that were
impaired due to a cybersecurity event.
•Recovery Planning
•Improvements
•Communications
Important elements of any breach plan
• Define ‘breach’
• DON’T SAY IT, but define it. (it is an EVENT or INCIDENT)
“A data breach is the intentional or unintentional release of secure
information to an untrusted environment.” Wikipedia 3
• Data breach laws start the disclosure ‘clock’ when you identify a
breach.
• If the help desk sends you an email “We have a breach”. The clock
starts then.
• Decide who has LEGAL authority to declare a breach
3. https://en.wikipedia.org/wiki/Data_breach
Legal
• Breach Definitions (different)
• List of Personally Identifiable Information
• Breach Disclosure to Law enforcement
• Breach ‘clock’ different: 30 days, 60 days
• When to do a national press release: 500
records!
• NOT JUST IT/TECH RELATED
Technology
•System Log Management
• At least a separate syslog server
• Record logon/off/failures
• Record Firewall Deny logs
• Record Windows security events
•Forensics
• Create a ‘jump kit’: data dump/inspection
• Contract with a forensics company
• Be prepared to investigate incident involving secure information
Business / Data Governance
• Who are the Governors?
• Who ‘owns’ the data?
• Who is responsible for it?
• Data Classification
• NOT AN IT OR SECURITY ISSUE, a GRC ISSUE
• Protect ALL data the same?
• Do you know WHAT constitutes sensitive data?
• Do you know WHERE your sensitive data is stored?
• FFIEC Demands Data Classification
Before the breach
• Take commercially reasonable measures
• Locate and Protect Data
• Keep Logs and Backups
• Security Awareness Training
• BreachIncident Reporting
• Know what you will do: PRACTICE
• Cultivate relationship with Law Enforcement (FBI / USSS)
During the Breach
• Document everything
• Get help
• Let Top Management know you have a breachincident
• If user/database/server/laptop/workstation had sensitive
information, be prepared for full forensics. DON’T TRY TO REMOVE
THE VIRUS, IT WILL JUST MAKE IT WORSE
• Think about what you could have done to prevent it. MAKE NOTES
• Consider shutting down the whole network (before it gets worse)
After the Breach
• Again: Notes: what could you have done
differently?
• Upper management, including data owners
should be involved in meetings
• Report should go to top management (the
governors!)
• Don’t point fingers (4 point back to you?)
• Report the breach (yes, it is a breach) according
to HIPAA/PCI/Contract/ 47 state data breach
laws.
Top options to deal with possibility:
References
• Michael Scheidell, Michael@securityprivateers.com / 561-948-1305
• FBI InfraGard Program: www.infragard.org
• NIST Cybersecurity Framework:
http://www.nist.gov/cyberframework/
• How to conduct a Data Classification assignment:
http://searchsecurity.techtarget.com/tip/How-to-conduct-a-data-
classification-assessment
• FFIEC.GOV: Incident Response: http://ithandbook.ffiec.gov/it-
booklets/information-security/security-monitoring/analysis-and-
response/intrusion-response.aspx

Más contenido relacionado

La actualidad más candente

A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
Qualys
 

La actualidad más candente (20)

Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Conquest Security Capabilities
Conquest Security CapabilitiesConquest Security Capabilities
Conquest Security Capabilities
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
CERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data ProtectionCERN 5 Things you should know about Data Protection
CERN 5 Things you should know about Data Protection
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 
HIPAA Compliance: What you need to know
HIPAA Compliance: What you need to knowHIPAA Compliance: What you need to know
HIPAA Compliance: What you need to know
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 

Similar a Not IF, but WHEN

Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Paul C. Van Slyke
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
NCC Group
 

Similar a Not IF, but WHEN (20)

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)Data compliance - get it right the first time (Black/White printable PDF)
Data compliance - get it right the first time (Black/White printable PDF)
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 

Más de Michael Scheidell

Más de Michael Scheidell (6)

Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting Secrets
 
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...Protecting the Castle:  CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME ...
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
 
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
Bring Your Own Policy:  Internet Use/BYOD Policy by consensus Bring Your Own Policy:  Internet Use/BYOD Policy by consensus
Bring Your Own Policy: Internet Use/BYOD Policy by consensus
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 

Not IF, but WHEN

  • 1. Breach Response Planning: Hammer Out Your Legal, Business and Technology Differences, Before a Breach Michael Scheidell, CISSP, CCISO, SMIEEE Chief Information Security Officer Miami Fraud & Breach Prevention Summit
  • 2. Michael Scheidell, CISSP, CCISO, SMIEEE • CISSP, Certified CISO • Former Banking and Finance Sector Chief, FBI InfraGard, South Florida Members Alliance • Delegate to NIST CSF workshop • Senior Member, IEEE • Privacy Expert • Member ISSA, IAPP, ISACA, SFTA, CSA • Patents in Network Security • Founded 3 technology companies • Recent Engagements: $2.2BN National Pharmacy, Law Office, Banking Audits @scheidell 561-948-1305 / michael@securityprivateers.com http://www.securityprivateers.com
  • 3.
  • 4. If you haven’t been breached yet: •You have, but don’t know it (90%): PWC 1 •It WILL happen. (100%): RSA 2 1. http://www.scmagazineuk.com/pwc-almost-all-large-companies-suffered-a-data-breach-last-year/article/418343/ 2. http://www.crn.com/news/security/232601663/coviello-rsa-security-breach-could-happen-to-anyone.htm
  • 6. Frameworks / Standards / NIST CSF IDENTIFY PROTECT DETECT RESPOND RECOVER
  • 7. DETECT Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. •Anomalies and Events •Security Continuous Monitoring •Detection Process
  • 8. RESPOND Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. •Response Planning •Communications •Analysis •Mitigation •Improvements
  • 9. RECOVER Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. •Recovery Planning •Improvements •Communications
  • 10. Important elements of any breach plan • Define ‘breach’ • DON’T SAY IT, but define it. (it is an EVENT or INCIDENT) “A data breach is the intentional or unintentional release of secure information to an untrusted environment.” Wikipedia 3 • Data breach laws start the disclosure ‘clock’ when you identify a breach. • If the help desk sends you an email “We have a breach”. The clock starts then. • Decide who has LEGAL authority to declare a breach 3. https://en.wikipedia.org/wiki/Data_breach
  • 11. Legal • Breach Definitions (different) • List of Personally Identifiable Information • Breach Disclosure to Law enforcement • Breach ‘clock’ different: 30 days, 60 days • When to do a national press release: 500 records! • NOT JUST IT/TECH RELATED
  • 12. Technology •System Log Management • At least a separate syslog server • Record logon/off/failures • Record Firewall Deny logs • Record Windows security events •Forensics • Create a ‘jump kit’: data dump/inspection • Contract with a forensics company • Be prepared to investigate incident involving secure information
  • 13. Business / Data Governance • Who are the Governors? • Who ‘owns’ the data? • Who is responsible for it? • Data Classification • NOT AN IT OR SECURITY ISSUE, a GRC ISSUE • Protect ALL data the same? • Do you know WHAT constitutes sensitive data? • Do you know WHERE your sensitive data is stored? • FFIEC Demands Data Classification
  • 14. Before the breach • Take commercially reasonable measures • Locate and Protect Data • Keep Logs and Backups • Security Awareness Training • BreachIncident Reporting • Know what you will do: PRACTICE • Cultivate relationship with Law Enforcement (FBI / USSS)
  • 15. During the Breach • Document everything • Get help • Let Top Management know you have a breachincident • If user/database/server/laptop/workstation had sensitive information, be prepared for full forensics. DON’T TRY TO REMOVE THE VIRUS, IT WILL JUST MAKE IT WORSE • Think about what you could have done to prevent it. MAKE NOTES • Consider shutting down the whole network (before it gets worse)
  • 16. After the Breach • Again: Notes: what could you have done differently? • Upper management, including data owners should be involved in meetings • Report should go to top management (the governors!) • Don’t point fingers (4 point back to you?) • Report the breach (yes, it is a breach) according to HIPAA/PCI/Contract/ 47 state data breach laws.
  • 17. Top options to deal with possibility:
  • 18. References • Michael Scheidell, Michael@securityprivateers.com / 561-948-1305 • FBI InfraGard Program: www.infragard.org • NIST Cybersecurity Framework: http://www.nist.gov/cyberframework/ • How to conduct a Data Classification assignment: http://searchsecurity.techtarget.com/tip/How-to-conduct-a-data- classification-assessment • FFIEC.GOV: Incident Response: http://ithandbook.ffiec.gov/it- booklets/information-security/security-monitoring/analysis-and- response/intrusion-response.aspx