SlideShare una empresa de Scribd logo
1 de 32
Protecting The
Castle
Michael Scheidell, CCISO
Security Priva(eers®
© 2014 Security Priva(eers®
Michael Scheidell
CCISO, SMIEEE
• Senior Member, IEEE
• Senior Member, ISSA
• Patents and awards in Network Security
• Founded Three South Florida Tech
Companies
• Honored by South Florida Business Journal
• Member FBI’s InfraGard
• Member US Secret Service Miami Electronic
Crimes Task Force (MECTF)
© 2014 Security Priva(eers®
• Protecting the Castle
• Boiling Frog
• Ostrich
• 2005, TJMAX, 18 months
• 2013, Target, 18 days
• CC Details for sale
• Mag Stripe vs SmartCard
• What’s in YOUR Wallet
• What’s Yours is Mine
• Small Business at Risk
• Storing Private Details
• Virtual vs Physical World
Agenda
© 2014 Security Priva(eers®
Build up the
Castle Walls
A Network Firewall is like the
Castle Walls.
No one goes in, no one goes
out without permission
If unauthorized access is
attempted they are blocked
automatically
© 2014 Security Priva(eers®
Install a Moat
A moat protects the Firewall
FireEye APT Systems help
identify dangerous inbound
attachments, downloaded, em
ailed or via USB/CDrom
© 2014 Security Priva(eers®
Guards Protect
the Moat
• 24/7 Monitoring
• Managed Network Security
• SOC (Secure Op Center)
© 2014 Security Priva(eers®
Guards Inside
The Castle
Can’t keep everyone out.
Why bother with Internet?
Once they get in, now what?
Antivirus Software is like the
Guards inside the Castle
© 2014 Security Priva(eers®
Boiling Frog
Put a frog in lukewarm water
and heat it up slowly and frog
will stay until it is cooked in
boiling water
© 2014 Security Priva(eers®
Boiling Frog
Put a frog in lukewarm water
and heat it up slowly and frog
will stay until it is cooked in
boiling water
Put a frog in boiling water and
it will jump out immediately
TJMAX suspected Wifi
Breach, but the data was
taken slowly
Target CIO sat in slowly rising
temperature from November
2013 till March 2014
© 2014 Security Priva(eers®
Ostrich
When an Ostrich is frightened
it will bury it’s head in the sand
TJMAX knew WiFi had
security risks but ignored them
(didn’t separate out WiFi from
corporate network, didn’t
encrypt database)
Target knew malware was
being installed. They paid
$1.6M for FireEye APT
detection system.
© 2014 Security Priva(eers®
© 2014 Security Priva(eers®
Protecting the Castle
The castle walls don’t need
protecting
The network doesn’t need
protecting
Protect the Crown Jewels
Focus on the highest value
items
© 2014 Security Priva(eers llc®
• July 2005, Two High School Graduates and two dropouts
hack TJ Max’s Wifi Network (WEP encryption)
• August 2005, They get access to databases, CC details, etc
• September 2005, TJMAX upgrades Wifi to WPA, begins
monitoring for suspicious activities
• December 2006, TJMAX detects intrusion, calls LE
• January, 2007, TJMAX makes announcement: 45.7M
2005, TJ MAX
Hackers were inside for 18 months
© 2014 Security Priva(eers llc®
2013, Target
• June, Target Installs FireEye APT detection System
• Nov 8th, ZDNET Interviews Target’s CIO
• Nov 27th, Hackers Access Target’s network via HVAC Vendor
• Nov 30th, Attack caught by FireEye, Alerts Ignored
• Dec 2nd, Export of data started, FireEye Alerts Ignored
• Dec 13th, Report by Security Researcher Brian Krebs
• Dec 15th, Data export stopped (110m Records enough?)
– 40m Credit Card ‘dumps’, 70m other customer records
• Dec 18th, Target Reports to LE, uploads to VirusTotal.com
• Dec 19th, Target publically acknowledges breach
• Dec 21st, JP Morgan notifies customers
• Dec 23th, Target General Counsel in Conference Call
• Jan 15th, Target Allocates $5M for ‘Consumer Education’
• Feb 6th, HVAC Vendor Identified (weak password, free AV version)
• March 5th, CIO Resigns
© 2014 Security Priva(eers llc®
What did they miss?
• TJMAX saw problems with their WiFi
– They monitored network for 13 months
• Target Spent $1.6M on FireEye
– There were multiple early warnings
• Did they both need more security?
© 2014 Security Priva(eers llc®
What would you rather have?
Rookie with a 357 10 Year vet with a 38?
© 2014 Security Priva(eers®
$90 Billion Spent
© 2014 Security Priva(eers®
What is
missing? • People
• Processes
• Procedures
• Training
Without TRAINED
people, following specific
procedures and
processes, anything can
happen.
If you have no destination, any
path will lead you there.
Target: Finally looking for a
CISO
© 2014 Security Priva(eers llc®
CC Details for Sale
© 2014 Security Priva(eers llc®
CC Details for Sale
© 2014 Security Priva(eers®
APT: Advanced Persistent Threat
© 2014 Security Priva(eers®
No Skill
Needed
Can’t Hack?
For $2800 you can buy the
memory scraping software
found at Target.
Even that too hard for you?
Can you unplug a USB
keyboard?
Got an Amazon Prime
Account?
© 2014 Security Priva(eers llc®
Mag Stripe vs SmartCard
Mag Stripe Card SmartCard with Chip
© 2014 Security Priva(eers llc®
Mag Stripe vs SmartCard
Mag Stripe Card Card with Chip
© 2014 Security Priva(eers®
What’s in
YOUR Wallet?
• Ask for Chip & Signature if
you need a replacement
card.
• Still has Mag Strip
• Will work in US and 99% of
international
• Safer ONLY IF USED IN
CHIP ENABLED
SYSTEMS
© 2014 Security Priva(eers®
Small Business at Risk
• Inventory your business
• Ask IT person what data is
being stored
• Are you storing CC
numbers?
• What about employee
payroll information?
• Workman’s Comp Faxes?
• Red Pill vs Blue Pill?
© 2014 Security Priva(eers llc®
Small Business at Risk
• Computers
– Patching
– Passwords (weak, old, administrator)
– Game programs, malware, spyware
• Web sites
– Patching
– Passwords
– Temp files (Office docs with PPI)
© 2014 Security Priva(eers®
What is
missing?
• People
• Policies
• Processes
• Procedures
• Training
Without TRAINED
people, following specific
procedures and
processes, anything can
happen.
• Inform your employees
• Train them on privacy
• Have written policies
• Hire right
• Lead by example
© 2014 Security Priva(eers llc®
Virtual vs Physical World
• Do you think Virtual Security?
• CCD cameras / Computer Logs
• Guard, ID / Login & Password
• Safe Storage / Encryption
• Cover your Tracks / Shreader
© 2014 Security Priva(eers®
Guard Gate
Do you store information on
visitors?
Name, SS or DL number?
Photo copy of their ID?
© 2014 Security Priva(eers llc®
Frog and Ostrich
• The human is the only animal stupid
enough to let itself be boiled or put its
head in the sand
• The frog jumps out as soon as
temperature increases 2 degrees
• Ostriches are searching for food
• One of the fastest runners in nature
© 2014 Security Priva(eers llc®
Contact Information
Michael Scheidell, CCISO, SMIEEE
Managing Director, Security Priva(eers
IT Risk Assessments / IT Security Consulting
Retained Chief Information Security Officer
michael@securityprivateers.com
@Scheidell/ (561) 948-1305
http://www.securityprivateers.com

Más contenido relacionado

La actualidad más candente

Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threatsZscaler
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Guy Alfassi - CSA Conference Highlights
Guy Alfassi -  CSA Conference HighlightsGuy Alfassi -  CSA Conference Highlights
Guy Alfassi - CSA Conference HighlightsCSAIsrael
 
SOC Fundamental Roles & Skills
SOC Fundamental Roles & SkillsSOC Fundamental Roles & Skills
SOC Fundamental Roles & SkillsHarry McLaren
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Harry McLaren
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesSecurity Innovation
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Harry McLaren
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBlue Coat
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarCipherCloud
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?Zscaler
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero TrustPriyanka Aash
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Informationjenkoon
 

La actualidad más candente (20)

Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Guy Alfassi - CSA Conference Highlights
Guy Alfassi -  CSA Conference HighlightsGuy Alfassi -  CSA Conference Highlights
Guy Alfassi - CSA Conference Highlights
 
SOC Fundamental Roles & Skills
SOC Fundamental Roles & SkillsSOC Fundamental Roles & Skills
SOC Fundamental Roles & Skills
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
 
Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies Modern Security Operations & Common Roles/Competencies
Modern Security Operations & Common Roles/Competencies
 
Big Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat ProtectionBig Data Security Intelligence and Analytics for Advanced Threat Protection
Big Data Security Intelligence and Analytics for Advanced Threat Protection
 
Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Cloud vs. On-Premises Security: Can you afford not to switch?
Cloud vs. On-Premises Security:  Can you afford not to switch?Cloud vs. On-Premises Security:  Can you afford not to switch?
Cloud vs. On-Premises Security: Can you afford not to switch?
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust(SACON) Vandana Verma - Living In A World of Zero Trust
(SACON) Vandana Verma - Living In A World of Zero Trust
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
 

Similar a Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS

Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security PresentationIdeba
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityThom. Poole
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptxLuckySaigon1
 
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationAddressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationKareo
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!Kevin Fisher
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryKevin Murphy
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information SecurityVineet Sood
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 

Similar a Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS (20)

Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
 
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationAddressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
 
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!DRC  - Cybersecurity Concepts 2015 - 5 Basics you must know!
DRC - Cybersecurity Concepts 2015 - 5 Basics you must know!
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Law seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industryLaw seminars intl cybersecurity in the power industry
Law seminars intl cybersecurity in the power industry
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Protecting the Castle: CYBER CRIME HAS BECOME THE NUMBER ONE PROPERTY CRIME IN AMERICA AND IN 2014 1 IN 7 WILL BE VICTIMS

  • 1. Protecting The Castle Michael Scheidell, CCISO Security Priva(eers®
  • 2. © 2014 Security Priva(eers® Michael Scheidell CCISO, SMIEEE • Senior Member, IEEE • Senior Member, ISSA • Patents and awards in Network Security • Founded Three South Florida Tech Companies • Honored by South Florida Business Journal • Member FBI’s InfraGard • Member US Secret Service Miami Electronic Crimes Task Force (MECTF)
  • 3. © 2014 Security Priva(eers® • Protecting the Castle • Boiling Frog • Ostrich • 2005, TJMAX, 18 months • 2013, Target, 18 days • CC Details for sale • Mag Stripe vs SmartCard • What’s in YOUR Wallet • What’s Yours is Mine • Small Business at Risk • Storing Private Details • Virtual vs Physical World Agenda
  • 4. © 2014 Security Priva(eers® Build up the Castle Walls A Network Firewall is like the Castle Walls. No one goes in, no one goes out without permission If unauthorized access is attempted they are blocked automatically
  • 5. © 2014 Security Priva(eers® Install a Moat A moat protects the Firewall FireEye APT Systems help identify dangerous inbound attachments, downloaded, em ailed or via USB/CDrom
  • 6. © 2014 Security Priva(eers® Guards Protect the Moat • 24/7 Monitoring • Managed Network Security • SOC (Secure Op Center)
  • 7. © 2014 Security Priva(eers® Guards Inside The Castle Can’t keep everyone out. Why bother with Internet? Once they get in, now what? Antivirus Software is like the Guards inside the Castle
  • 8. © 2014 Security Priva(eers® Boiling Frog Put a frog in lukewarm water and heat it up slowly and frog will stay until it is cooked in boiling water
  • 9. © 2014 Security Priva(eers® Boiling Frog Put a frog in lukewarm water and heat it up slowly and frog will stay until it is cooked in boiling water Put a frog in boiling water and it will jump out immediately TJMAX suspected Wifi Breach, but the data was taken slowly Target CIO sat in slowly rising temperature from November 2013 till March 2014
  • 10. © 2014 Security Priva(eers® Ostrich When an Ostrich is frightened it will bury it’s head in the sand TJMAX knew WiFi had security risks but ignored them (didn’t separate out WiFi from corporate network, didn’t encrypt database) Target knew malware was being installed. They paid $1.6M for FireEye APT detection system.
  • 11. © 2014 Security Priva(eers®
  • 12. © 2014 Security Priva(eers® Protecting the Castle The castle walls don’t need protecting The network doesn’t need protecting Protect the Crown Jewels Focus on the highest value items
  • 13. © 2014 Security Priva(eers llc® • July 2005, Two High School Graduates and two dropouts hack TJ Max’s Wifi Network (WEP encryption) • August 2005, They get access to databases, CC details, etc • September 2005, TJMAX upgrades Wifi to WPA, begins monitoring for suspicious activities • December 2006, TJMAX detects intrusion, calls LE • January, 2007, TJMAX makes announcement: 45.7M 2005, TJ MAX Hackers were inside for 18 months
  • 14. © 2014 Security Priva(eers llc® 2013, Target • June, Target Installs FireEye APT detection System • Nov 8th, ZDNET Interviews Target’s CIO • Nov 27th, Hackers Access Target’s network via HVAC Vendor • Nov 30th, Attack caught by FireEye, Alerts Ignored • Dec 2nd, Export of data started, FireEye Alerts Ignored • Dec 13th, Report by Security Researcher Brian Krebs • Dec 15th, Data export stopped (110m Records enough?) – 40m Credit Card ‘dumps’, 70m other customer records • Dec 18th, Target Reports to LE, uploads to VirusTotal.com • Dec 19th, Target publically acknowledges breach • Dec 21st, JP Morgan notifies customers • Dec 23th, Target General Counsel in Conference Call • Jan 15th, Target Allocates $5M for ‘Consumer Education’ • Feb 6th, HVAC Vendor Identified (weak password, free AV version) • March 5th, CIO Resigns
  • 15. © 2014 Security Priva(eers llc® What did they miss? • TJMAX saw problems with their WiFi – They monitored network for 13 months • Target Spent $1.6M on FireEye – There were multiple early warnings • Did they both need more security?
  • 16. © 2014 Security Priva(eers llc® What would you rather have? Rookie with a 357 10 Year vet with a 38?
  • 17. © 2014 Security Priva(eers® $90 Billion Spent
  • 18. © 2014 Security Priva(eers® What is missing? • People • Processes • Procedures • Training Without TRAINED people, following specific procedures and processes, anything can happen. If you have no destination, any path will lead you there. Target: Finally looking for a CISO
  • 19. © 2014 Security Priva(eers llc® CC Details for Sale
  • 20. © 2014 Security Priva(eers llc® CC Details for Sale
  • 21. © 2014 Security Priva(eers® APT: Advanced Persistent Threat
  • 22. © 2014 Security Priva(eers® No Skill Needed Can’t Hack? For $2800 you can buy the memory scraping software found at Target. Even that too hard for you? Can you unplug a USB keyboard? Got an Amazon Prime Account?
  • 23. © 2014 Security Priva(eers llc® Mag Stripe vs SmartCard Mag Stripe Card SmartCard with Chip
  • 24. © 2014 Security Priva(eers llc® Mag Stripe vs SmartCard Mag Stripe Card Card with Chip
  • 25. © 2014 Security Priva(eers® What’s in YOUR Wallet? • Ask for Chip & Signature if you need a replacement card. • Still has Mag Strip • Will work in US and 99% of international • Safer ONLY IF USED IN CHIP ENABLED SYSTEMS
  • 26. © 2014 Security Priva(eers® Small Business at Risk • Inventory your business • Ask IT person what data is being stored • Are you storing CC numbers? • What about employee payroll information? • Workman’s Comp Faxes? • Red Pill vs Blue Pill?
  • 27. © 2014 Security Priva(eers llc® Small Business at Risk • Computers – Patching – Passwords (weak, old, administrator) – Game programs, malware, spyware • Web sites – Patching – Passwords – Temp files (Office docs with PPI)
  • 28. © 2014 Security Priva(eers® What is missing? • People • Policies • Processes • Procedures • Training Without TRAINED people, following specific procedures and processes, anything can happen. • Inform your employees • Train them on privacy • Have written policies • Hire right • Lead by example
  • 29. © 2014 Security Priva(eers llc® Virtual vs Physical World • Do you think Virtual Security? • CCD cameras / Computer Logs • Guard, ID / Login & Password • Safe Storage / Encryption • Cover your Tracks / Shreader
  • 30. © 2014 Security Priva(eers® Guard Gate Do you store information on visitors? Name, SS or DL number? Photo copy of their ID?
  • 31. © 2014 Security Priva(eers llc® Frog and Ostrich • The human is the only animal stupid enough to let itself be boiled or put its head in the sand • The frog jumps out as soon as temperature increases 2 degrees • Ostriches are searching for food • One of the fastest runners in nature
  • 32. © 2014 Security Priva(eers llc® Contact Information Michael Scheidell, CCISO, SMIEEE Managing Director, Security Priva(eers IT Risk Assessments / IT Security Consulting Retained Chief Information Security Officer michael@securityprivateers.com @Scheidell/ (561) 948-1305 http://www.securityprivateers.com