SlideShare una empresa de Scribd logo
1 de 17
ASIS International – NYC Chapter
David A. Kondrup,   CPP SPHR
Cyber Diligence, Inc.




   Electronic Dossiers,
   Spearing and Whaling


 Cyber Security Briefing
Disclaimer

This presentation is for informational purposes
  only, it does not constitute professional
  advice or convey a client – vendor
  relationship.

Citations are noted and the presenter is not
   responsible for the contents of cited work.

And ...what I knew about IT / computer security in
  the past, what I knew last week, and what I
  know today, will all change tomorrow. The
  threats and the defenses described here will
  rapidly change - You and I have to Change.
Risks And Your Incident
Response Strategies


      Insider Threats                Outsider Threats



                      Protecting the
                     Enterprise From
                       Digital Risks


ROI to Protect: Intellectual       Compliance Issues
 Property, Sensitive Data,     (HR, EEO, Sex Harassment, HIPAA,
   Personal Identifiable        Personal Identifiable Info, SAS 70,
Information, Financial etc.                    etc.)
Emerging Threats

Cyber-Risk Control Practices of Top Management (%)


  Receive Reports on Security                                                 31
     Breaches / Data Loss                                                    30
                                                                             30

        Review Annual Security                                                 35            Rarely / Never
        Program Assessments                                        20
                                                                                   36        Occassionally
                                                                                             Regularly
   Receive Reports on Privacy                                                       39
      and Security Risks                                                      33
                                                                        26

                                              0      10       20        30         40
 Sources: Security Management July 2012 page 30 citing “How Boards & Senior Executives Are Managing Cyber
 Risks”, Carnegie Mellon University, Cylab, May 2012
Types of Data
Breaches (2011)
       Payment Card Numbers
   Authentication Credentials
                    Proprietary Info
                   Medical Records
               Bank Account Data
                        Personal Info
                          System Info
                        Sensitive Info
                        Trade Secrets

                                              0%        20%        40%         60%
   Large Organizations               Small Organizations                                   80%
                                                                                                       100%
Sources: Security Management June 2012 page 48 citing “Data Breach Investigations Report”, Verizon, March 2012
How is this being done?
Executive Spear-
    Phishing or Whaling

Hackers posing as federal agents (or other people)
   send emails to executives, department
   heads, technical staffers, financial staff, conning
   them into providing passwords to gain access to
   networks.
Innocuous attachments are also sent. The moment
   an attachment is opened (or a link is clicked) a
   malware program is released.
There is nothing complicated or innovative about
   phishing. It’s simple but its just dreadfully
   effective!
Email is not like snail mail, you can’t just throw the
   envelop away or peak inside – once you click on
   a unknown link or an attachment, they’ve got you
Fake Subpoenas

Hackers target corporate executives with fake
   subpoenas.
In 2008 US federal court officials were warning
   that hackers were emailing fake subpoenas
   that contained malware to corporate
   executives
The company information is correct, so is the
   address, so is the executive’s name and
   title.
The fake subpoenas were official looking and
   contained a link that states “Please
   download the entire document on this
   matter (follow this link) and print it for your
   records ...”
Effective


Thousands of executives and corporate officials
  have been engineered and fallen for this.

Not just subpoenas, its been Better Business
  Bureau Complaints, emails to attorneys from
  overseas looking for representation, Invitations
  to Events that are of interest to the recipient.

Subpoenas don’t come by email
  – Don’t Click on them!
Dossiers
On-Line Research

Hackers/phishers perform research before
  launching his or her attack.
They compile dossiers on the corporation, the
  company executives, and their families (xref)
Specifically, they locate the executive’s email
  address, phone numbers, addresses (home &
  work), and others associated with them.
This information is located online:
  Pipl.com
  Who.Is.com
  Facebook
  LinkedIn
  Ancestry.com
  “Google”
  Corporate web sites
What Is Malware?
Malware - Botnets -
           Proxies
Backdoor.Proxybox
The malware is a Trojan program with rootkit
  functionality that transforms a computer
  into a proxy server.
Botnets
One of the main tools used by cybercriminals.
  Send spam emails, used for distributed
  denial of service attacks, perform online
  financial (bank) fraud, click fraud, and
  others.
People and companies do not know they have
  it. And their IP address is used for illegal
  activities.
$25 a month gets 150 proxy servers, $40 gets unlimited in the country you
     want. Symantec believes there are 40,000 any given day.
What To Do
Cyber Defense

Education & Awareness
Educate the executives especially, and the “at risk”
   members of the company (those with credentials)
Technology (BYOD) Policies
Proactive Programs
Do checks on your top executives (with permission).
Regular & infrequent sweeps of
   systems, servers, computers.
Line-up specialist – have a response plan ready.
(Specialist also for reputational & shielding Info)
Combined efforts and programs involving Physical
   Security – IT Security – Risk Management
www.CyberDiligence.com

David A. Kondrup, CPP SPHR
dk@CyberDiligence.com
575 Underhill Blvd – suite # 209
Syosset, NY 11791

(516) 342-9378 office
(516) 507-4322 direct

Más contenido relacionado

La actualidad más candente

Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insidersgjohansen
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
A field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the riskA field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the riskPriyanka Aash
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALIJNSA Journal
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperNetIQ
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 

La actualidad más candente (20)

Malicious Insiders
Malicious InsidersMalicious Insiders
Malicious Insiders
 
Insider threat
Insider threatInsider threat
Insider threat
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
A field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the riskA field guide to insider threat helps manage the risk
A field guide to insider threat helps manage the risk
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White Paper
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 

Destacado

3組 Aグループ「領土問題」
3組 Aグループ「領土問題」3組 Aグループ「領土問題」
3組 Aグループ「領土問題」内田 啓太郎
 
#Eibtm hybrid meetings are remote participants a pain in the neck
#Eibtm hybrid meetings are remote participants a pain in the neck#Eibtm hybrid meetings are remote participants a pain in the neck
#Eibtm hybrid meetings are remote participants a pain in the neckRuud Janssen, DES, CMM
 
New Resume_Himanshu_22 March
New Resume_Himanshu_22 MarchNew Resume_Himanshu_22 March
New Resume_Himanshu_22 Marchhimanshusaims
 
Bentley Smith - Written Reference - The Bay Hotel (Village & Life)
Bentley Smith - Written Reference - The Bay Hotel (Village & Life)Bentley Smith - Written Reference - The Bay Hotel (Village & Life)
Bentley Smith - Written Reference - The Bay Hotel (Village & Life)Bentley Smith
 
Dyeing of pet wool blends
Dyeing of pet wool blendsDyeing of pet wool blends
Dyeing of pet wool blendsAdane Nega
 
Futuro Digital Colombia 2015
Futuro Digital Colombia 2015Futuro Digital Colombia 2015
Futuro Digital Colombia 2015comScore, Inc.
 
eco friendly textile processing
eco friendly textile processingeco friendly textile processing
eco friendly textile processingOmkar S Parmaj
 

Destacado (13)

Illuminati
IlluminatiIlluminati
Illuminati
 
3組 Aグループ「領土問題」
3組 Aグループ「領土問題」3組 Aグループ「領土問題」
3組 Aグループ「領土問題」
 
литература 7 кл
литература 7 кллитература 7 кл
литература 7 кл
 
#Eibtm hybrid meetings are remote participants a pain in the neck
#Eibtm hybrid meetings are remote participants a pain in the neck#Eibtm hybrid meetings are remote participants a pain in the neck
#Eibtm hybrid meetings are remote participants a pain in the neck
 
New Resume_Himanshu_22 March
New Resume_Himanshu_22 MarchNew Resume_Himanshu_22 March
New Resume_Himanshu_22 March
 
Bentley Smith - Written Reference - The Bay Hotel (Village & Life)
Bentley Smith - Written Reference - The Bay Hotel (Village & Life)Bentley Smith - Written Reference - The Bay Hotel (Village & Life)
Bentley Smith - Written Reference - The Bay Hotel (Village & Life)
 
Arboviroses
ArbovirosesArboviroses
Arboviroses
 
PCCR
PCCRPCCR
PCCR
 
Resume-SAP-BO
Resume-SAP-BOResume-SAP-BO
Resume-SAP-BO
 
Dyeing of pet wool blends
Dyeing of pet wool blendsDyeing of pet wool blends
Dyeing of pet wool blends
 
Futuro Digital Colombia 2015
Futuro Digital Colombia 2015Futuro Digital Colombia 2015
Futuro Digital Colombia 2015
 
eco friendly textile processing
eco friendly textile processingeco friendly textile processing
eco friendly textile processing
 
Sales promotion
Sales promotionSales promotion
Sales promotion
 

Similar a Cyber Security Briefing Asis Nyc 10 18 12

Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security SolutionProtegrity
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdframsetl
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012Ulf Mattsson
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalVivek Ahuja
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare versionUlf Mattsson
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03kbzdox ivanovich
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 

Similar a Cyber Security Briefing Asis Nyc 10 18 12 (20)

Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security Solution
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 

Cyber Security Briefing Asis Nyc 10 18 12

  • 1. ASIS International – NYC Chapter David A. Kondrup, CPP SPHR Cyber Diligence, Inc. Electronic Dossiers, Spearing and Whaling Cyber Security Briefing
  • 2. Disclaimer This presentation is for informational purposes only, it does not constitute professional advice or convey a client – vendor relationship. Citations are noted and the presenter is not responsible for the contents of cited work. And ...what I knew about IT / computer security in the past, what I knew last week, and what I know today, will all change tomorrow. The threats and the defenses described here will rapidly change - You and I have to Change.
  • 3. Risks And Your Incident Response Strategies Insider Threats Outsider Threats Protecting the Enterprise From Digital Risks ROI to Protect: Intellectual Compliance Issues Property, Sensitive Data, (HR, EEO, Sex Harassment, HIPAA, Personal Identifiable Personal Identifiable Info, SAS 70, Information, Financial etc. etc.)
  • 4. Emerging Threats Cyber-Risk Control Practices of Top Management (%) Receive Reports on Security 31 Breaches / Data Loss 30 30 Review Annual Security 35 Rarely / Never Program Assessments 20 36 Occassionally Regularly Receive Reports on Privacy 39 and Security Risks 33 26 0 10 20 30 40 Sources: Security Management July 2012 page 30 citing “How Boards & Senior Executives Are Managing Cyber Risks”, Carnegie Mellon University, Cylab, May 2012
  • 5. Types of Data Breaches (2011) Payment Card Numbers Authentication Credentials Proprietary Info Medical Records Bank Account Data Personal Info System Info Sensitive Info Trade Secrets 0% 20% 40% 60% Large Organizations Small Organizations 80% 100% Sources: Security Management June 2012 page 48 citing “Data Breach Investigations Report”, Verizon, March 2012
  • 6. How is this being done?
  • 7. Executive Spear- Phishing or Whaling Hackers posing as federal agents (or other people) send emails to executives, department heads, technical staffers, financial staff, conning them into providing passwords to gain access to networks. Innocuous attachments are also sent. The moment an attachment is opened (or a link is clicked) a malware program is released. There is nothing complicated or innovative about phishing. It’s simple but its just dreadfully effective! Email is not like snail mail, you can’t just throw the envelop away or peak inside – once you click on a unknown link or an attachment, they’ve got you
  • 8. Fake Subpoenas Hackers target corporate executives with fake subpoenas. In 2008 US federal court officials were warning that hackers were emailing fake subpoenas that contained malware to corporate executives The company information is correct, so is the address, so is the executive’s name and title. The fake subpoenas were official looking and contained a link that states “Please download the entire document on this matter (follow this link) and print it for your records ...”
  • 9.
  • 10. Effective Thousands of executives and corporate officials have been engineered and fallen for this. Not just subpoenas, its been Better Business Bureau Complaints, emails to attorneys from overseas looking for representation, Invitations to Events that are of interest to the recipient. Subpoenas don’t come by email – Don’t Click on them!
  • 12. On-Line Research Hackers/phishers perform research before launching his or her attack. They compile dossiers on the corporation, the company executives, and their families (xref) Specifically, they locate the executive’s email address, phone numbers, addresses (home & work), and others associated with them. This information is located online: Pipl.com Who.Is.com Facebook LinkedIn Ancestry.com “Google” Corporate web sites
  • 14. Malware - Botnets - Proxies Backdoor.Proxybox The malware is a Trojan program with rootkit functionality that transforms a computer into a proxy server. Botnets One of the main tools used by cybercriminals. Send spam emails, used for distributed denial of service attacks, perform online financial (bank) fraud, click fraud, and others. People and companies do not know they have it. And their IP address is used for illegal activities. $25 a month gets 150 proxy servers, $40 gets unlimited in the country you want. Symantec believes there are 40,000 any given day.
  • 16. Cyber Defense Education & Awareness Educate the executives especially, and the “at risk” members of the company (those with credentials) Technology (BYOD) Policies Proactive Programs Do checks on your top executives (with permission). Regular & infrequent sweeps of systems, servers, computers. Line-up specialist – have a response plan ready. (Specialist also for reputational & shielding Info) Combined efforts and programs involving Physical Security – IT Security – Risk Management
  • 17. www.CyberDiligence.com David A. Kondrup, CPP SPHR dk@CyberDiligence.com 575 Underhill Blvd – suite # 209 Syosset, NY 11791 (516) 342-9378 office (516) 507-4322 direct