cyber security | regulatory compliance | digital forensics investigation... · cyber security |...
TRANSCRIPT
![Page 1: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/1.jpg)
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
![Page 2: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/2.jpg)
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSCYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
Agenda
• Overview of Breaches– Current Breach Statistics– Examples of Breaches
• Detecting Breaches– Symptoms– Log Analysis and Tools– Breach Assessment– Breach Investigation
• Prevent , Detect, and Mitigate Breaches
![Page 3: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/3.jpg)
a gap in a wall, barrier, or defense, especially one made by an attacking army Hacker.
BreachbrēCH/
noun
![Page 4: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/4.jpg)
http://www.idtheftcenter.org
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
2010 2011 2012 2014 2015
Causes/Type of Breaches (2010 – 2015)
Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence
© 2016 Enterprise Risk Management, Inc.
![Page 5: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/5.jpg)
http://www.idtheftcenter.org
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
2010 2011 2012 2014 2015
Causes/Type of Breaches (2010 – 2015)
Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence
© 2016 Enterprise Risk Management, Inc.
![Page 6: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/6.jpg)
the average data breach cost per victim, it is nearly
$206 per compromised record© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html
![Page 7: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/7.jpg)
1x Compromised Server
10,000x Stolen Records
Cost Per record
$2,060,000
So you’re telling me that….
© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html
![Page 8: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/8.jpg)
Breaches Handled by ERM
![Page 9: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/9.jpg)
Security Breach Investigations
![Page 10: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/10.jpg)
Detecting Breaches
![Page 11: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/11.jpg)
Symptoms
![Page 12: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/12.jpg)
Log Analysis and Tools
![Page 13: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/13.jpg)
Breach Assessment
![Page 14: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/14.jpg)
Breach Investigation
![Page 15: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/15.jpg)
Prevent , Detect, and Mitigate Breaches
![Page 16: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/16.jpg)
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
Its your responsibility to make sure its correctly deployed, implemented and enforced.
Security is critical
© 2016 Enterprise Risk Management, Inc.
![Page 17: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/17.jpg)
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSIf not….XXX
XXX
Might as well plan onFAILING
© 2016 Enterprise Risk Management, Inc.
Security is critical
![Page 18: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/18.jpg)
Security Tips•Logical Security•Physical Security•Administrative Security•Logging and Monitoring•Security Assessments•Awareness Training•Vendors /Contractors•Incident Response Plan
![Page 19: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/19.jpg)
1 Have you ever performed a data breach assessment of your business?
![Page 20: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/20.jpg)
1
2
Have you ever performed a data breach assessment of your business?
Can you say with confidence that your business is safe from cyber attacks?
![Page 21: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/21.jpg)
1
2
3
Have you ever performed a data breach assessment of your business?
Can you say with confidence that your business is safe from cyber attacks?
Do you know precisely what you need to do if your business is faced with cyber attack?
![Page 22: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/22.jpg)
What if you have been hackedbut just don’t know it yet?
![Page 23: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current](https://reader030.vdocuments.mx/reader030/viewer/2022040422/5e1489243ff5b47b165cdcb9/html5/thumbnails/23.jpg)
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
Your go to advisorsfor all matters in information security.
www.emrisk.com
800 S Douglas Road #940Coral Gables, FL 33134 USA
Phone: 305-447-6750Email: [email protected]
Silka M. GonzalezPresident
+1 (305) [email protected]