尊敬的 微信汇率:1円 ≈ 0.046089 元 支付宝汇率:1円 ≈ 0.04618元 [退出登录]
SlideShare a Scribd company logo
© Copyright 2012, Horzepa Spiegel & Associates, PC.
September 26, 2014
Cybersecurity 2014: The Impact of
Policies and Regulations on Companies
By Andrea Almeida
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
Agenda
1. Introduction
2. Understanding the Threats
a. Advanced Persistent Threats
b. Trade Secret Theft/Industrial Espionage
c. Data Breaches
d. Cyber Vandalism
3. The United States Legal & Policy Environment
4. Responding to a Cyber Incident
5. Conclusion
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
I - Introduction
• Cybercrime has become an item of international focus – hackers from
all parts of the globe.
• Businesses face unique difficulties not only addressing cyber security
but also mitigating cyber crime.
• Cost of handling cyber issues: Report from the Center for Strategic
and International Studies – cybercrime costs the US economy $100
billion on an annual basis.
• Reputational Damage is one of the greatest risks and impossible to
buy back
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
II - Understanding the Threats
a. Advanced Persistent Threats (“APT”)
ü Highly sophisticated, professional intrusions into secure networks
ü Typical techniques include spear-phishing and social engineering
combined with zero-day exploits
ü Typical perpetuator suspected to be nation-states
ü Ex1: Recent case study: purportedly Chinese People’s Liberation
Army Unit 61398 devoted to cyber warfare and cyber espionage.
ü Ex 2: US Senate panel: found hackers associated with the Chinese
government have repeatedly infiltrated the computers systems of
US airlines, technology companies and US military contractors.
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
b.Trade Secret Theft/Industrial
Espionage
ü The vast majority involved insiders. Theft on behalf of foreign
corporations is common (over 30%) but can come from
domestic sources too.
ü Thieves often highly educated or senior employees (one
defendant was a Nobel Prize nominee). Examples:
ü United States v. Pani, No. 4:08-CR-40034 (D. Mass. 2008) –
Intel employee stole processor designs from her company to
benefit competitor AMD
ü Dongfan Greg Chung (US v. Chung, 8:08-CR-00024 (NDCal
2008)) – Sent over 300,000 pages of documents on the
space shuttle, Delta IV Rocket, F-15 Fighter, B-52 Bomber
and Chinook helicopter to China over 30 years. Sentenced
to imprisonment for 15 years, 8 months
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
c. Data Breaches
ü From 2005 to present = 607 million usernames, passwords,
bank account numbers, credit card numbers, social security
numbers, phone numbers, or mailing addresses have been lost,
stolen, or compromised.
ü 47 states states have data breach notification laws except
Alabama, New Mexico and South Dakota.
ü Most breaches involve dozens of different state laws
ü Costs of response and remediation can be tens of millions of
dollars.
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
d. Cyber Vandalism
ü Attackers are generally unknown and motivated by socio-political
agenda or personal amusement
ü Attacks typically are limited to defaced web pages, but other attacks
can be devastating.
ü Ex 1: Sony Playstation hack – some have speculated that the attack was
retaliation for perceived unfair business practices by Sony.
ü Ex 2: Doxxing, which is the release of private information online.
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
III -The U.S. Legal & Policy Environment
•2013 Executive Order on Improving Critical Infrastructure Cyber
security
•Cyber Intelligence Sharing and Protection Act of 2013 (“CISPA”)
•Cyber security Act of 2013
•National Cyber security and Critical Infrastructure Protection Act of
2014 (“NCIP”)
•Personal Data Privacy and SecurityAct of 2014.
•Data Security Act of 2014
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
Executive Order on Improving Critical
Infrastructure Cyber security
• Creation of Cybersecurity Framework: voluntary program includes
incentives
• Information sharing and Identification of critical infrastructure for
which a cyber security attack could have catastrophic effects
• Agencies to determine whether existing regulations are sufficient
and take regulatory action to address deficiencies
• Use of the federal procurement process to encourage contractors
to enhance information security practices.
• Consideration of privacy and civil liberties issues.
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
Cyber Security Framework created by
NIST
• NIST worked with Critical Infrastructure (“CI”) owners and
operators ie trade associations, public & private sector organizations
• To develop a voluntary, risk-based framework to promote and
enhance the security and resiliency of CI and
• To help organizations, regardless of industry sector or size, to
manage cyber risk.
• Is intended to be voluntary and flexible.
• Not intended to replace existing sector standards or to add an
unnecessary layer on existing standards and practices.
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
The Framework is composed of:
• Framework Core, a set of cyber security activities and
outcomes applicable across all Critical Infrastructure sectors
• Framework Profile, which allows organizations to apply cyber
security activities to its unique business requirements, risk
tolerances and resources and
• Framework Implementation Tiers, which allow an
organization to gauge its cyber security by comparing
characteristics and approaches to managing cyber risks.
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
Data Security Rules
• Federal Law
• Fair Credit Reporting Act (“FCRA”)
• Gramm-Leach-BlileyAct (“GLBA”)
• Children’s Online Privacy Protection Act (“COPPA”)
• Health Insurance Portability and Accountability Act
(“HIPAA”)
• Health Information Technology for Economic and Clinical
Health (“HITECH”)
• Fair and Accurate Credit Transactions Act
(“FACTA”)Disposal Rule
• FTC Act
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
Data Security Rules Cont….
• State Requirements
• Data Breach notification laws
• Data Security laws – require business to maintain data
security standards to protect state residents’ personal
information from being compromised.
• Industry Standards
• PCI DSS
• ISO
• NIST
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
SEC Cybersecurity Guidance
• Companies are not disclosing enough.
• Vast majority of companies that addressed cyber issues used only
boilerplate language.
• [B]oards must take seriously their responsibility to ensure that
management has implemented effective risk management protocols.
Boards of directors are already responsible for overseeing the
management of all types of risk, including credit risk, liquidity risk,
and operational risk and there can be little doubt that cyber-risk also must be
considered as part of board’s overall risk oversight. The recent announcement
that a prominent proxy advisory firm [Institutional Shareholders
Services (ISS)] is urging the ouster of most of the Target Corporation
directors because of the perceived “failure…to ensure appropriate
management of [the] risks” as to Target’s December 2013 cyber-
attack is another driver that should put directors on notice to
proactively address the risks associated with cyber-attacks. By Luis
Aguilar, SEC Commissioner
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
IV – Responding to a Cyber Incident
1.First Steps:
a. Understand and identified unusual behavior
a. Don’t disregard threat notifications from law enforcement
a. Begin to assess the nature of the attack
a. Consider insurance and notify quickly.
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
2. Conduct an Investigation
a - Assess potentially significant legal ramifications
b - Understand
i. Nature of the compromise
ii. Data and systems at issue
iii.Whether communications systems are secure
iv.Whether insiders are involved
c - Whether to retain third party forensic expert
d - Preserve privilege by involving Legal
e - Consider forensic imaging
f - Restore the integrity of the system
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
3. Coordination with Regulators and
Law Enforcement
ü Law enforcement often has a broader view into cyber threats
ü Establish an early line of communication
ü Assess whether the new obligations resulting from enhanced
information-sharing are applicable to your company
ü Determine the most appropriate agency.
ü Depends on the nature of the compromise local, federal and
international Law enforcement may be necessary
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
4. Legal Considerations
a. Understand your legal obligations arising out of a Cyber event
1. Legal hold
2. Breach notification and other obligations
ü State, Federal and International Law
ü Industry Standards
ü Contractual Obligations
ü SEC reporting
b. Proactive Measures
1. Offensive Llitigation
2.Active Defense Strategy
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
5. Notification Process
a. Where appropriate or required craft formal notification and
reporting documents
ü Must be done carefully (and quickly)
ü Consider hiring a PR expert
b. Take proactive measures to mitigate risks
ü Manage media response
ü Assemble call center
ü Develop FAQs and train agents
ü Consider identity protection service
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
6. Risk and Disputes Management
a. Assist law enforcement with criminal prosecution of attackers
a. Defend against legal actions
ü Regulatory enforcement: State and Federal
ü Class Action Litigation
b. Manage disputes with business partners and other third parties
a. Manage insurance claims
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
7. Good Cybersecurity Practices
a. Engage senior management. Cybersecurity is a governance issue.
a. Identify and classify sensitive data
a. Develop written information security policies and procedures
a. Continually assess status of technical and physical protections
a. Maintain (and practice) incident response plan
a. Manage employee and vendor risks
a. Train employees and increase awareness
© Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC.
THANK YOU!!!

More Related Content

What's hot

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
PECB
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Resilient Systems
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
centralohioissa
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
Enumerating your shadow it attack surface
Enumerating your shadow it attack surfaceEnumerating your shadow it attack surface
Enumerating your shadow it attack surface
Priyanka Aash
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
Matthew Rosenquist
 
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
North Texas Chapter of the ISSA
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
Trustmarque
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
Roger Hagedorn
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
Dr Robert D. Childs
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
Stephen Cobb
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 

What's hot (20)

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Enumerating your shadow it attack surface
Enumerating your shadow it attack surfaceEnumerating your shadow it attack surface
Enumerating your shadow it attack surface
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougalNTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
NTXISSACSC2 - Kid Proofing the Internet of Things by Monty McDougal
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 

Viewers also liked

Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy
Raymond Cunningham
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
North Texas Chapter of the ISSA
 
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
North Texas Chapter of the ISSA
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
North Texas Chapter of the ISSA
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
North Texas Chapter of the ISSA
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
North Texas Chapter of the ISSA
 
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
North Texas Chapter of the ISSA
 
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
North Texas Chapter of the ISSA
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
North Texas Chapter of the ISSA
 

Viewers also liked (10)

Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy Safe Harbor: A framework for US – EU data privacy
Safe Harbor: A framework for US – EU data privacy
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
 
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
 
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
 
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews
 
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
NTXISSACSC2 - Next-Generation Security and the Problem of Exploitation by Mat...
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
 

Similar to NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida

protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
James Fisher
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
Shawn Tuma
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
NationalUnderwriter
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
SecurityScorecard
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
Resilient Systems
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
Case IQ
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
Lee Schlenker
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
Shawn Tuma
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
Integrate
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
William Gamble
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
Financial Poise
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
TechSoup Canada
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
James Deiotte
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
Ulf Mattsson
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Jay Kesan
 

Similar to NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida (20)

protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
The Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPRThe Countdown is on: Key Things to Know About the GDPR
The Countdown is on: Key Things to Know About the GDPR
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Preparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must KnowPreparing for GDPR: What Every B2B Marketer Must Know
Preparing for GDPR: What Every B2B Marketer Must Know
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 

More from North Texas Chapter of the ISSA

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
North Texas Chapter of the ISSA
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
North Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
North Texas Chapter of the ISSA
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
North Texas Chapter of the ISSA
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
North Texas Chapter of the ISSA
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
North Texas Chapter of the ISSA
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
North Texas Chapter of the ISSA
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
North Texas Chapter of the ISSA
 

More from North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Recently uploaded

🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...
🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...
🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...
AK47
 
Bangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable Price
Bangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable PriceBangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable Price
Bangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable Price
rano khanrk#N06
 
Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...
Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...
Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...
kumarashok4639000
 
Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...
Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...
Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...
ss728938
 
2023 Ukraine Crisis Media Center Annual Report
2023 Ukraine Crisis Media Center Annual Report2023 Ukraine Crisis Media Center Annual Report
2023 Ukraine Crisis Media Center Annual Report
UkraineCrisisMediaCenter
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
vfuvxao
 
VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...
VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...
VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...
khannsahila061
 
AWS User Group Torino 2024 #3 - 18/06/2024
AWS User Group Torino 2024 #3 - 18/06/2024AWS User Group Torino 2024 #3 - 18/06/2024
AWS User Group Torino 2024 #3 - 18/06/2024
Guido Maria Nebiolo
 
🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...
🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...
🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...
$A19
 
VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...
VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...
VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...
aayushgarg464
 
Praesensa Technical Product Training UL 2572.pptx
Praesensa Technical Product Training UL 2572.pptxPraesensa Technical Product Training UL 2572.pptx
Praesensa Technical Product Training UL 2572.pptx
mmousa12501
 
🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...
🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...
🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...
aditiverma91885
 
AI Barometer by Nicolas Vincent from Sailpeak
AI Barometer by Nicolas Vincent from SailpeakAI Barometer by Nicolas Vincent from Sailpeak
AI Barometer by Nicolas Vincent from Sailpeak
events25
 
Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...
Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...
Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...
anshulbalyan01
 
Data Processing in PHP - PHPers 2024 Poznań
Data Processing in PHP - PHPers 2024 PoznańData Processing in PHP - PHPers 2024 Poznań
Data Processing in PHP - PHPers 2024 Poznań
Norbert Orzechowicz
 
Cybersecurity Presentation PowerPoint!!!
Cybersecurity Presentation PowerPoint!!!Cybersecurity Presentation PowerPoint!!!
Cybersecurity Presentation PowerPoint!!!
arichardson21686
 
Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...
Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...
Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...
gragnikki590
 
Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...
Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...
Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...
fufa9823#S0007
 
Fintech Belgium on the State of AI in FS
Fintech Belgium on the State of AI in FSFintech Belgium on the State of AI in FS
Fintech Belgium on the State of AI in FS
events25
 
MASTERCARD FOR FINTECHS PROGRAM 2024 BROCHURE
MASTERCARD FOR FINTECHS PROGRAM 2024 BROCHUREMASTERCARD FOR FINTECHS PROGRAM 2024 BROCHURE
MASTERCARD FOR FINTECHS PROGRAM 2024 BROCHURE
events25
 

Recently uploaded (20)

🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...
🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...
🔥Call Girls Service Pune 💯Call Us 🔝 7014168258 🔝💃Independent Pune Escorts Ser...
 
Bangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable Price
Bangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable PriceBangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable Price
Bangalore Call Girls Full Enjoy 👉 7023059433 👈 Quick Booking at Affordable Price
 
Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...
Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...
Call Girls Pune, Pune Cantonment 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independ...
 
Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...
Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...
Gorgeous Call Girls Tirunelveli 💯Call Us 🔝 7426014248 🔝Independent Tirunelvel...
 
2023 Ukraine Crisis Media Center Annual Report
2023 Ukraine Crisis Media Center Annual Report2023 Ukraine Crisis Media Center Annual Report
2023 Ukraine Crisis Media Center Annual Report
 
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
一比一原版多伦多都会大学毕业证(TMU毕业证书)学历如何办理
 
VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...
VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...
VVIP Call Girls Ahmedabad ☎️ +91-987394 😍 Ahmedabad 🔥 Independent Escorts In ...
 
AWS User Group Torino 2024 #3 - 18/06/2024
AWS User Group Torino 2024 #3 - 18/06/2024AWS User Group Torino 2024 #3 - 18/06/2024
AWS User Group Torino 2024 #3 - 18/06/2024
 
🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...
🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...
🔥Tall & Slim Models Call Girls Chandigarh 💯Call Us 🔝 7737669865 🔝💃Independent...
 
VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...
VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...
VIP Call Girl Lucknow 8923113531 💥 24x7 AFFORDABLE CHEAPEST RATE SAFE CALL GI...
 
Praesensa Technical Product Training UL 2572.pptx
Praesensa Technical Product Training UL 2572.pptxPraesensa Technical Product Training UL 2572.pptx
Praesensa Technical Product Training UL 2572.pptx
 
🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...
🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...
🔥High Profile Call Girls Pune 💯Call Us 🔝 7737669865 🔝💃Top Class Call Girl Ser...
 
AI Barometer by Nicolas Vincent from Sailpeak
AI Barometer by Nicolas Vincent from SailpeakAI Barometer by Nicolas Vincent from Sailpeak
AI Barometer by Nicolas Vincent from Sailpeak
 
Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...
Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...
Call Girls Kalyani Nagar ♠️ 7339748667 ♠️ Pune Escorts Yeena Best Independent...
 
Data Processing in PHP - PHPers 2024 Poznań
Data Processing in PHP - PHPers 2024 PoznańData Processing in PHP - PHPers 2024 Poznań
Data Processing in PHP - PHPers 2024 Poznań
 
Cybersecurity Presentation PowerPoint!!!
Cybersecurity Presentation PowerPoint!!!Cybersecurity Presentation PowerPoint!!!
Cybersecurity Presentation PowerPoint!!!
 
Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...
Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...
Call Girls Pune, Erandwane 🔝 7339748667 🔝 Escorts 💯 Yeena Best Independent Lo...
 
Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...
Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...
Call Girls In Patiala 👯‍♀️ 7339748667 🔥 Safe Housewife Call Girl Service Hote...
 
Fintech Belgium on the State of AI in FS
Fintech Belgium on the State of AI in FSFintech Belgium on the State of AI in FS
Fintech Belgium on the State of AI in FS
 
MASTERCARD FOR FINTECHS PROGRAM 2024 BROCHURE
MASTERCARD FOR FINTECHS PROGRAM 2024 BROCHUREMASTERCARD FOR FINTECHS PROGRAM 2024 BROCHURE
MASTERCARD FOR FINTECHS PROGRAM 2024 BROCHURE
 

NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida

  • 1. © Copyright 2012, Horzepa Spiegel & Associates, PC. September 26, 2014 Cybersecurity 2014: The Impact of Policies and Regulations on Companies By Andrea Almeida
  • 2. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. Agenda 1. Introduction 2. Understanding the Threats a. Advanced Persistent Threats b. Trade Secret Theft/Industrial Espionage c. Data Breaches d. Cyber Vandalism 3. The United States Legal & Policy Environment 4. Responding to a Cyber Incident 5. Conclusion
  • 3. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. I - Introduction • Cybercrime has become an item of international focus – hackers from all parts of the globe. • Businesses face unique difficulties not only addressing cyber security but also mitigating cyber crime. • Cost of handling cyber issues: Report from the Center for Strategic and International Studies – cybercrime costs the US economy $100 billion on an annual basis. • Reputational Damage is one of the greatest risks and impossible to buy back
  • 4. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. II - Understanding the Threats a. Advanced Persistent Threats (“APT”) ü Highly sophisticated, professional intrusions into secure networks ü Typical techniques include spear-phishing and social engineering combined with zero-day exploits ü Typical perpetuator suspected to be nation-states ü Ex1: Recent case study: purportedly Chinese People’s Liberation Army Unit 61398 devoted to cyber warfare and cyber espionage. ü Ex 2: US Senate panel: found hackers associated with the Chinese government have repeatedly infiltrated the computers systems of US airlines, technology companies and US military contractors.
  • 5. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. b.Trade Secret Theft/Industrial Espionage ü The vast majority involved insiders. Theft on behalf of foreign corporations is common (over 30%) but can come from domestic sources too. ü Thieves often highly educated or senior employees (one defendant was a Nobel Prize nominee). Examples: ü United States v. Pani, No. 4:08-CR-40034 (D. Mass. 2008) – Intel employee stole processor designs from her company to benefit competitor AMD ü Dongfan Greg Chung (US v. Chung, 8:08-CR-00024 (NDCal 2008)) – Sent over 300,000 pages of documents on the space shuttle, Delta IV Rocket, F-15 Fighter, B-52 Bomber and Chinook helicopter to China over 30 years. Sentenced to imprisonment for 15 years, 8 months
  • 6. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. c. Data Breaches ü From 2005 to present = 607 million usernames, passwords, bank account numbers, credit card numbers, social security numbers, phone numbers, or mailing addresses have been lost, stolen, or compromised. ü 47 states states have data breach notification laws except Alabama, New Mexico and South Dakota. ü Most breaches involve dozens of different state laws ü Costs of response and remediation can be tens of millions of dollars.
  • 7. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. d. Cyber Vandalism ü Attackers are generally unknown and motivated by socio-political agenda or personal amusement ü Attacks typically are limited to defaced web pages, but other attacks can be devastating. ü Ex 1: Sony Playstation hack – some have speculated that the attack was retaliation for perceived unfair business practices by Sony. ü Ex 2: Doxxing, which is the release of private information online.
  • 8. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. III -The U.S. Legal & Policy Environment •2013 Executive Order on Improving Critical Infrastructure Cyber security •Cyber Intelligence Sharing and Protection Act of 2013 (“CISPA”) •Cyber security Act of 2013 •National Cyber security and Critical Infrastructure Protection Act of 2014 (“NCIP”) •Personal Data Privacy and SecurityAct of 2014. •Data Security Act of 2014
  • 9. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. Executive Order on Improving Critical Infrastructure Cyber security • Creation of Cybersecurity Framework: voluntary program includes incentives • Information sharing and Identification of critical infrastructure for which a cyber security attack could have catastrophic effects • Agencies to determine whether existing regulations are sufficient and take regulatory action to address deficiencies • Use of the federal procurement process to encourage contractors to enhance information security practices. • Consideration of privacy and civil liberties issues.
  • 10. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. Cyber Security Framework created by NIST • NIST worked with Critical Infrastructure (“CI”) owners and operators ie trade associations, public & private sector organizations • To develop a voluntary, risk-based framework to promote and enhance the security and resiliency of CI and • To help organizations, regardless of industry sector or size, to manage cyber risk. • Is intended to be voluntary and flexible. • Not intended to replace existing sector standards or to add an unnecessary layer on existing standards and practices.
  • 11. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. The Framework is composed of: • Framework Core, a set of cyber security activities and outcomes applicable across all Critical Infrastructure sectors • Framework Profile, which allows organizations to apply cyber security activities to its unique business requirements, risk tolerances and resources and • Framework Implementation Tiers, which allow an organization to gauge its cyber security by comparing characteristics and approaches to managing cyber risks.
  • 12. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. Data Security Rules • Federal Law • Fair Credit Reporting Act (“FCRA”) • Gramm-Leach-BlileyAct (“GLBA”) • Children’s Online Privacy Protection Act (“COPPA”) • Health Insurance Portability and Accountability Act (“HIPAA”) • Health Information Technology for Economic and Clinical Health (“HITECH”) • Fair and Accurate Credit Transactions Act (“FACTA”)Disposal Rule • FTC Act
  • 13. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. Data Security Rules Cont…. • State Requirements • Data Breach notification laws • Data Security laws – require business to maintain data security standards to protect state residents’ personal information from being compromised. • Industry Standards • PCI DSS • ISO • NIST
  • 14. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. SEC Cybersecurity Guidance • Companies are not disclosing enough. • Vast majority of companies that addressed cyber issues used only boilerplate language. • [B]oards must take seriously their responsibility to ensure that management has implemented effective risk management protocols. Boards of directors are already responsible for overseeing the management of all types of risk, including credit risk, liquidity risk, and operational risk and there can be little doubt that cyber-risk also must be considered as part of board’s overall risk oversight. The recent announcement that a prominent proxy advisory firm [Institutional Shareholders Services (ISS)] is urging the ouster of most of the Target Corporation directors because of the perceived “failure…to ensure appropriate management of [the] risks” as to Target’s December 2013 cyber- attack is another driver that should put directors on notice to proactively address the risks associated with cyber-attacks. By Luis Aguilar, SEC Commissioner
  • 15. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. IV – Responding to a Cyber Incident 1.First Steps: a. Understand and identified unusual behavior a. Don’t disregard threat notifications from law enforcement a. Begin to assess the nature of the attack a. Consider insurance and notify quickly.
  • 16. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. 2. Conduct an Investigation a - Assess potentially significant legal ramifications b - Understand i. Nature of the compromise ii. Data and systems at issue iii.Whether communications systems are secure iv.Whether insiders are involved c - Whether to retain third party forensic expert d - Preserve privilege by involving Legal e - Consider forensic imaging f - Restore the integrity of the system
  • 17. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. 3. Coordination with Regulators and Law Enforcement ü Law enforcement often has a broader view into cyber threats ü Establish an early line of communication ü Assess whether the new obligations resulting from enhanced information-sharing are applicable to your company ü Determine the most appropriate agency. ü Depends on the nature of the compromise local, federal and international Law enforcement may be necessary
  • 18. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. 4. Legal Considerations a. Understand your legal obligations arising out of a Cyber event 1. Legal hold 2. Breach notification and other obligations ü State, Federal and International Law ü Industry Standards ü Contractual Obligations ü SEC reporting b. Proactive Measures 1. Offensive Llitigation 2.Active Defense Strategy
  • 19. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. 5. Notification Process a. Where appropriate or required craft formal notification and reporting documents ü Must be done carefully (and quickly) ü Consider hiring a PR expert b. Take proactive measures to mitigate risks ü Manage media response ü Assemble call center ü Develop FAQs and train agents ü Consider identity protection service
  • 20. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. 6. Risk and Disputes Management a. Assist law enforcement with criminal prosecution of attackers a. Defend against legal actions ü Regulatory enforcement: State and Federal ü Class Action Litigation b. Manage disputes with business partners and other third parties a. Manage insurance claims
  • 21. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. 7. Good Cybersecurity Practices a. Engage senior management. Cybersecurity is a governance issue. a. Identify and classify sensitive data a. Develop written information security policies and procedures a. Continually assess status of technical and physical protections a. Maintain (and practice) incident response plan a. Manage employee and vendor risks a. Train employees and increase awareness
  • 22. © Copyright 2012, Horzepa Spiegel & Associates, PC.© Copyright 2012, Horzepa Spiegel & Associates, PC. THANK YOU!!!
  翻译: