SlideShare una empresa de Scribd logo
1 de 55
Fired for Cause ≠ Trust
“Trust but Verify”
Ronald Reagan
Background
What can be done
Background
External v Insider
What needs protecting?
Sources of IP Theft
Causes of IP Theft
Timing of IP Theft
Examples
External Threat
Perimeter
Security
NetworkSecurity
Hacktivists
Nation States
Criminals
Corporate Espionage
External Threat
Perimeter
Security
NetworkSecurity
Hacktivists
Nation States
Criminals
Corporate Espionage
Cyber-Resilience
Cyber-Resilience
Internal Threat
PerimeterSecurity
NetworkSecurity
Internal Threat
PerimeterSecurity
NetworkSecurity
Your IP / information
• Customer information
• Staff information
• Business plans
• Trade secrets
• Operational information
• Proprietary Software
What needs protecting, and how is it at risk…
Your IP / information
• Customer information
• Staff information
• Business plans
• Trade secrets
• Operational information
• Proprietary Software
Common Internal Theft Vectors
• Email
• Webmail
• Portable media
• Instant messaging
• Cloud storage
• Secure web sites
What needs protecting, and how is it at risk…
How does internal theft factor into the current business landscape?
Numbers of incidents are rising for companies year on year…
Had a
significant
incident in 2017
Had more then
50 incidents
# of ALL
incidents related
to intellectual
property theft
34%
29%
22%
15%
Current
Employees
Former
Employees
Current
Contractors
Former
Contractors
The Sources of Internal IP Theft
The Cause of IP Theft
Accidental
Rarely part of an
investigation
Should be
addressed via
organizational
control(s)
The Cause of IP Theft
Accidental
Rarely part of an
investigation
Should be
addressed via
organizational
control(s)
Intentional
Financial
motivation
Disgruntled
Coercion
One Month
Resignation
or
Termination
One Month
Common Timing of IP Theft
One Month
Resignation
or
Termination
One Month
Common Timing of IP Theft
Example #1
C-Suite Employee suspected of wrongdoings
Employee Terminated
Employee Hands in Devices 2 days after termination
Forensic Analysis
Hard Drive Forensically wiped
Example #2
Employee (IT) suspected of wrongdoings
Employee Terminated
Forensic Analysis going back 3 years, across many devices – No “Smoking Gun”
Deleted Important Information, Removed Devices (USB’s)
Government initiatives to protect IP
• https://www.fbi.gov/news/stories/2015/jul
y/economic-espionage/economic-
espionage
Example #2 – FBI Behavioral Indicators
 Without authorization, takes proprietary home via thumb drives or e-mail.
 Inappropriately seeks or obtains proprietary or classified information on subjects not related to
their work duties.
 Interest in matters outside the scope of their duties, particularly those of interest to business
competitors.
 Remotely accesses the computer network while on vacation, sick leave, or at other odd times.
 Disregards company computer policies on installing personal software or hardware, accessing
restricted websites, conducting unauthorized searches, or downloading confidential information.
 Works odd hours without authorization; notable enthusiasm for overtime work, weekend work, or
unusual schedules when clandestine activities could be more easily conducted.
What Can Be Done
Mitigation and Investigation through digital forensic techniques
What are the relevant DF techniques
Identification
Capturing
ProcessingAnalysis
Reporting
Cross Referencing of
Activities
• Check an
employees
activity
during off-
work hours
• Comparing
Data over time
One Month
Resignation
or
Termination
One Month
• Comparing Data
from multiple
sources
What Can Be Done
Develop an Insider Program
“Trust but Verify”
Considerations
Ensure you have authority to proceed
Considerations
Ensure you have authority to proceed
Check corporate policies
Considerations
Ensure you have authority to proceed
Check corporate policies
Determine compliance requirements
Considerations
Ensure you have authority to proceed
Check corporate policies
Determine compliance requirements
Focus the scope of the investigation
Considerations
Ensure you have authority to proceed
Check corporate policies
Determine compliance requirements
Focus the scope of the investigation
Check privacy laws and legislations
What Can Be Done
Start with IT department
Understand the devices and systems that are issued
Learn what technology controls are in place
Understand your retention policies
Try to understand employee behaviours (digital and non-digital)
What Can Be Done
Form an “Insider Threat” team which is made up of
various people within or outside of your company
IT
Security
Digital Forensics
Fraud
HR
Legal
“Who”
“What”
“Why”
“When”
“How”
Levels of DF in an Insider Threat Program
Data Capture
Quick Look – Interviews
Deep Dive
Periodically gathering evidence and safeguard it
Data Capture
Quick Look
Deep Dive
Recovering Deleted Content
Rebuilding evidence
Comparison of artifacts
Paint the picture
Timeline
Be proactive
Promote these types of programs
Be transparent
Benefits
Switching investigative model from Post to Pre
Being better informed with quality data
Benefits
Switching investigative model from Post to Pre
Being better informed with quality data
Better for company, cost savings
Risk Reduction
ISO/IEC 27032
Training Courses
• Computer Forensics Introduction
1 Day Course
• Computer Forensics Foundation
2 Days Course
• Lead Forensics Examiner
5 Days Course
Exam and certification fees are included in the training price.
https://pecb.com/en/education-and-certification-for-
individuals/computer-forensics/lead-forensics-examiner
www.pecb.com/events
THANK YOU
ryanduquette@Hexigent.com
www.hexigent.com
www.linkedin.com/company/hexigent-consulting-inc-
www.twitter.com/@hexigent

Más contenido relacionado

La actualidad más candente

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesKroll
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsJon Bosco
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkPECB
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...centralohioissa
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...PECB
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 

La actualidad más candente (20)

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
 
Why GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC FrameworkWhy GDPR Must Be an Integral Part of Your GRC Framework
Why GDPR Must Be an Integral Part of Your GRC Framework
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Data security
Data securityData security
Data security
 
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...Approche intégrée de la gestion des risques, de la sécurité de l’information,...
Approche intégrée de la gestion des risques, de la sécurité de l’information,...
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 

Similar a Digital Forensics 101 – How is it used to protect an Organization’s Data?

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data BreachBrian Heidelberger
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The PhysicsJason Chapman
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision TreeMarc St-Pierre
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftCase IQ
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdfSurendhar57
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfSecond Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfELIJAH
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 

Similar a Digital Forensics 101 – How is it used to protect an Organization’s Data? (20)

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfSecond Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 

Más de PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

Más de PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Último

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Último (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Digital Forensics 101 – How is it used to protect an Organization’s Data?

Notas del editor

  1. I recently had a chat with a friend who is fairly senior in a large, well known software company (they obviously had some very significant Intellectual Property (IP)). Someone in the company was being fired for cause, and my friend and other co-workers suspected that he may take, or already had taken ‘IP’ from the business. Given their line of business, this was a concern. I mentioned that digital forensic companies can take a look at an employee’s computer or mobile phone and try to see if they are in fact walking out the door with company data and said that it was easier to deal with this type of thing before the person leaves, rather than waiting until they are gone. This message was taken to the leadership of the business, and in return an interesting, yet possibly short sighted, message came back, “We trust our employees not to take company data with them when they leave.”
  2. Placing trust in your employees is an important factor in not only attracting, but also retaining talented individuals, and for encouraging a positive and collaborative corporate culture.  However…verify what those employees are doing before they potentially walk out the door with your companies valued property (and I’m not talking about staplers). President Ronald Reagan, while discussing U.S. relations with the Soviet Union, famously would quote the Russian proverb, “Trust, but verify.” When it comes to retaining valuable intellectual property, organizations would do well to use that proverb as a mantra.
  3. The range of threat actors are diverse, and the ‘control’ and threat mitigation landscape and options are ever growing. Knowing what and who to combat, using what tools and methods is challenging. There are 4 main groups of these threat actors For the most part, they usually share one common goal – to get to or disrupt your data (your crown jewels). Their motivations are different, but from an external perspective they usually have the same hurdles to overcome before they get to it.
  4. First they have to find a chink in your armor, then get a foot hold in your environment, usually elevating their privileges and getting to the ‘good stuff’. They have to fight past your perimeter security features such as firewalls, and other systems, before bending around the network security authentication and threat mitigation tools that are in place. Once they find the crown jewels, they have to infiltrate the system itself that those jewels are on and get enough access rights to allow for addition, modification and deletion activity to take place. Basically….if the security folks do their job well...it’s often tough for the bad guys to get in.
  5. Hacker Group
  6. Nation States
  7. Cyber resilience or security is the current evolution of what was IT security. It went from IT security to Information security and now to Cyber security. The ownership of Cyber security has moved from being led and operated by IT, to Board ownership, involvement, direction and support The Risk has moved from only operational impacts to Reputational, compliance and financial losses The Investment has moved from being technical to more of a protective culture And the Threats have moved from external to both external and internal
  8. Basically things have changed. Organizations take ’cyber’ seriously, and we applaud that. One of the most common things we hear is that organizations want to stop ‘hackers’, and while that’s great, we need them to look inside their walls as well..
  9. That all being said though…Breaches have become more frequent and larger.
  10. Many breaches are due to insider human error – but this is NOT the insider threat we are talking about today. That is a whole other presentation.
  11. Remember that earlier slide – External threats? The one where we talked about bad guys having to navigate their way around a variety of security controls. If you’ve got a well developed security architecture, they need to apply a significant effort to get to those crown jewels. Sometimes, that level of effort is just not worth it and so they move onto the next guy. Which is great!
  12. However, lets look at this again.. From an internal perspective. Unlike those external bad guys who need to demonstrate all sorts of hacking ‘kung fu’ to get what they want, you’ve already equipped insiders with everything they need; a way to bypass firewalls, slide by security solutions and potentially go unnoticed by your threat identification and mitigation tools. Know what it is? A username and a password. Yup, you’ve given them the ability to get to those crown jewels and unlike the bad guys, they just have to worry about how to get the data out….
  13. IP of this nature used to be paper based, however most is now digital. It’s stored electronically and accessed with the many digital devices we use on a daily basis. Since most investigations focus establishing if, and how, someone did what they are suspected of doing, knowledge of the common methods used to remove sensitive information is vital to today’s investigative professional. Some of the more common methods include:
  14. Email exchange between a work account and a secondary email account Use of a personal webmail account, such as Gmail or yahoo; Use of portable media, USB’s being the most common; Instant Messaging programs (including social media programs such as Facebook and LinkedIn); Cloud storage such as Dropbox or ICloud; Using a secure website; Accessing a work computer via a remote session; Taking pictures of IP with a personal camera or phone.
  15. We compiled data from a number of studies that looked at not only internal theft factors, but also for business that had various cyber incidents. In 2015 – 80% of business surveyed had a significant incident. 32% had more than 50 incidents And 49 % of ALL incidents relate to IP theft (both External and Internal Threats)
  16. Current employees – Have the most access to information Former employees – may still have login credentials for things like webmail or friends inside company Current contractors – often are given access to a wide amount of information and are not usually monitored as much as current employees Former contractors - may still know how to get in to get info
  17. A friend worked for a large software company that was based in the US and she worked from home for almost 9 years. She often ran out of room on her work issued laptop and asked her manager if he was ok with getting her an external hard drive. He approved and she purchased a large hard drive, and promptly downloaded tons of material from the company server over a weekend. Fast forward almost 2 years and she resigns from the company. Fast forward another year and she found the hard drive in a box. Realizing that she still had company data, she gave me the hard drive and I forensically wiped it. The company authorized her to take IP, and never even tracked it.
  18. - Intentional (which is what we are here to talk abut today) - Financial Motivation - $, role, salary increase, contractor role - disgruntled - coercion (bride or threat)
  19. On the last slide I mentioned the 3 main intentional causes of IP theft. The first two (Disgruntled and Financial) have similar timing as to when the theft of IP occurs. Most of the timing revolves around an employee either resigning or being terminated. Resignation One month prior to giving notice people will start to gather data, If they stick around for a while, they might take data after resignation (not as common because people think that after resigning that the controls or monitoring on their systems will increase – often it does not). After they leave, systems are often left open – Webmail for example
  20. Termination If they suspect they will be terminated - Might be gathering data prior And again, after they leave systems are often left open Theft for reasons of coercion often can happen at any time.
  21. Eco.
  22. KE
  23. In July 2015, the FBI launched a campaign to educate businesses and industry leaders about protecting trade secrets and intellectual property. It focuses on external threats from foreign threat actors engaged in corporate espionage, but also highlights the need to develop insider threat programs. They also highlight some behaviours to look for when an insider is suspected of stealing company data
  24. Had our client acted upon their suspicions earlier, it would have saved them the time and resources to launch a full investigation and to pursue civil litigation. Some of these are digital behaviours and therefore you may be able to easily look into them, others are more personal in nature and you may need to work with others to figure out.
  25. Some of the digital forensic techniques that we all use during our digital investigations can also be used to help mitigating the theft of a company’s IP before it even happens.
  26. These standard techniques can be used as a whole, or individually.
  27. Cross referencing of artifact allows us to quickly compare IP with potential other activity which may suggest movement of that IP. For those who do not recognize this, it is Magnet Forensics timeline view. There are however other great tools on the market that allow similar functionality.
  28. Many digital forensic tools allow us to look at a users activity during certain times. 2 of those behavior indicators we chatted about earlier mentions activity after hours, on weekends or at other “strange times”. Again, this is IEF but there are others.
  29. Digital forensic methods allow us to compare data over time (using hash lists, etc). This can be very valuable during IP theft investigation (will talk more about this later).
  30. Was there any collusion within your company? Comparing data from various sources might allow you to figure out of people were working together (or if one person “used” someone else unknowingly to steal IP). There are many methods to do this. Hash analysis across systems and adding multiple systems into one case are just a few examples.
  31. As it mentioned in that article by the FBI, Businesses should develop an Insider threat programs. These programs can incorporate many aspects; from monitoring activity, to employee training, to full investigations.
  32. However, there are some things to consider before implementing any insider threat program. Big brother tactics often are not the best methods.
  33. We once again come back to this saying. Companies need to play a certain amount of trust in their employees. Many employees know that their emails and web activity can and may be monitored, however diving deeper into everything they do on their systems may breed an atmosphere of un-trust.
  34. There are also factors to consider when you’ve been asked to review the digital activity of an employee to understand what they’ve been doing with company data, or while using the company network.    Get permission   While the business might suspect foul play, and have asked you to investigate an employee’s digital footprints, it’s important that you fully understand what’s permissible before you do anything. Just because the staff member was using a company asset, that does not always translate to an open invitation to review everything they’ve been doing.   Before you begin your investigation, get a formal request from the business, appropriate sign off from management, make sure HR is involved, and keep all communication relative to the request. You may need to have legal counsel involved from the outset as well, as the matter could end up in court at some point, and you’ll need to prove everything you did, and why.  
  35.  Check company policies   Familiarise yourself with existing company policies and procedures and focus on those which detail what an employee is allowed to do (and more importantly, not do). Does content exist which deals with activity monitoring or reviews? Are employees, and specifically any which are in scope for your investigation, aware of these policies? Has the employee read the policies, or gone through awareness training, and signed off on their understanding? We have had a few cases where we have been hired for investigations only to find out half-way through it that the company did not have an acceptable use policy (in other words…the employees were never told what they can and cannot do).
  36.  Determine compliance requirements   Depending on what business your company is in, you may find that you’re obligated to comply with something that may either limit your ability to directly review activity, or put your company’s compliance status at risk should you proceed.   Check to make sure that what you’re looking to do is achievable, and that if the role of the employee is one that may permit them privileged access to highly confidential data, that your review does not compromise the companies good standing. If your company deals with federally classified data, check to see what that employee had access to. If it’s above your own clearance level, you may need to call in someone with appropriate clearance to handle the data. While you may not be looking to review any of that data itself, just your having a copy of it, or access to the system that holds it, may cause an issue.    
  37.  Focus the Scope of the Investigation   Many times we hear clients ask us to find ‘anything of relevance’. That’s not something that should be readily agreed to without first knowing the facts. Network and system logs will show general activity, and an in-depth forensic review of the systems and devices that an employee used could provide a very granular view of the what they did. While this is great news for most investigators, there can be some challenges. If you were to start looking at everything that was done, your review could take weeks or months. It could also take you down a path that has nothing at all to do with the original request.   Your investigation should be focussed. There should be rationale for what you’re doing, and the evidence you seek should be well defined. You ideally want a listing of what data the employee is suspected of removing, during what time period and what common terms, phrases or language could it contain. Knowing all of this will speed up the investigation, help your legal counsel be comfortable in knowing that you weren’t going on a ‘witch hunt’ (which can be a common argument by the defense in legal proceedings).  
  38. Check Privacy Laws and Legislations   Depending on the location of your company, you may have to consider various privacy laws and legislations before starting any employee investigation. Legislation is usually relevant to the location in which the work is being performed. If you’re being asked to review user activity for someone operating from a regional office in, e.g., Germany, the fact you are based at head office in, e.g. Toronto, does not mean that Canadian privacy laws will necessarily apply. In that example, the German (BDSG) has very strict guidelines as to what can and can’t be done with employee data contained on work systems (including the transferring of any data outside of national borders). It’s always best to check with not only your HR department but also your legal and/or compliance department before conducting any investigation on employee data. Not doing so may jeopardize the validity of your findings.  
  39. ‘Know thyself’ – that aphorism has been around since Plato’s time. It applies here. You need to understand how things work and look in the environment you’re investigating. Talk to your technology teams. What’s being used, by who, for what. BYOD . What controls are there? What can a user (specifically the one your investigating) do and not do. What kind of policies are there for retaining information about user activity. Before you start digging, it’s worth understanding these basics as it’ll keep you focused on task.
  40. We often work in our little silos and only get involved with other internal teams when there is a need (Breach, IP theft, etc). Be proactive and form working teams to help to not only mitigate the insider threat against your company IP, but whom can also act quickly if there is an incident.
  41. “Who” has access to information? Who do you suspect is taking data?   “What” information do they have access to? What avenues do they have access to?   “Why” would someone take company data with them?   “When” do you think this happened? “How do you think they took data?
  42. Ryan
  43. I just read the 2016 Verizon report and they state “Love your employees, bond at the company retreat, bring in bagels on Friday, but monitor the heck out of their authorized daily activity, especially ones with access to data such as financial accounts, PII, payment cards, medical records, etc). Might you miss anything by ONLY monitoring employees activities? Why not acquire their devices (either fully or targeted imaging) at random times? I mentioned earlier about being able to compare data over time. Some of our clients have us periodically (randomized times) image systems of those who has access to “the crown jewels”. We then safeguard (or our client safeguards) the images and if needed use those images for any potential future investigation. I mentioned the example where the C-suite employee wiped their drive. Having images of his system prior to his departure might have dramatically changed the outcome of that matter.
  44. Can use similar techniques within your company Exit interviews are a great way to learn about why an employee is leaving, and ways that the company can improve. However they can also be used to help determine if an employee may have taken company IP with them. HR staff can ask questions to learn more about where the employee kept company data, did they take it home, on what devices and when. While the interview is being conducted, and if warranted, digital forensic practitioners can discreetly do a quick review on the employee’s device(s) to look for any indicators of IP theft.
  45. If needed, you can conduct a deeper dive into the evidence. This obviously will be longer in duration than the quick look.
  46. Where possible, be proactive rather than reactive. Make programs like this a part of corporate culture and adapt security, acceptable use, or other related policies accordingly. Be transparent and let employees know that their systems are being monitored, and activity on those systems may be looked into at a deeper level when they are leaving the company.
  47. Typically we ’investigate’ something after that action has taken place. Where possible, if you can pivot from post event to pre event investigations you may be able to stop something potentially from happening, AND there's the opportunity to realize collateral benefits. The information you work with, and the subsequent findings that are given to your company from your investigation, will be more exact. With better data comes the ability to make more informed decisions. Everyone up and down the organizational chain always wants that.
  48. It makes sense for your company. The cost of post incident investigation is always sizeable. More effort = more hours = more cost. Those operational costs can spiral. Embedding some of the things we’ve talked about into organizational workflow and culture can limit the potential for a significant IP related incident to occur. In turn, that can seriously limit the unknown expenditure required to handle insider threats, and let the company invest in the business of doing business And finally… this can all reduce risk. The risk of IP getting into the wild. The risk of reputational damage. The risk of competitors being better informed about your business strategy. The risk to the bottom line of the company when confidence is lost.