from the battlefield: managing customer perceptions in a security

20
#RSAC #RSAC @nicolecmiller From the Battlefield: Managing Customer Perceptions in a Security Crisis #RSAC Nicole Miller, SVP

Upload: phamngoc

Post on 05-Jan-2017

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC

#RSAC

@nicolecmiller

From the Batt lef ield: Managing Customer Percept ions in a Secur i ty Cr is is

#RSAC

N i c o l e M i l l e r , S V P

Page 2: From the Battlefield: Managing Customer Perceptions in a Security
Page 3: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller #RSAC

Showing up to the party improves coverage

Cybersecurity news follows a pattern

You need to speak up to counteract other voices

Closure is the strongest part of your story

@NicoleCMiller

Page 4: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Major Data Breach at Staples Stems From POS

Thieves Jackpot ATMs With ‘Black Box’ Attack

JPMorgan Chase hack due to missing 2-factor authentication on one server

‘Cyber Caliphate’ hacks Malaysia Airlines website

Hacked Hotel Phones Fueled Bank Phishing Scams

Anthem Warns of E-mail Scam In Wake Of Data Breach

FBI: Businesses Lost $215M to Email Scams

Bank Hackers Steal Millions via Malware

Chinese Hackers Hijack Forbes Website to Spread Malware: Report

Sony Hackers Reportedly Used A Zero Day Vulnerability XSS Vulnerability in IE could lead to phishing attacks

Highly critical “Ghost” allowing code execution affects most Linux systems

Anonymous loose cannon admits DDoSing social services and housing websites

Great Firewall of China blasts DDoS attacks at random IP addresses

19,000 French websites hit by DDoS, defaced in wake of terror attack

Hackers Steal Up To $1 Billion From Banks

Apple Blocks Tool That Brute-forces iCloud Passwords

Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole

Health insurer Anthem hit by hackers, up to 80 million records exposed

Anarchist hackers start cyber war with ISIS

Newsweek Twitter account hacked by ‘CyberCaliphate’

Yet Another Flash Patch Fixes Zero-Day Flaw

Carbanak hacking group steal $1 billion from banks worldwide

Dutch Government Website Outage Caused by Cyber Attack

Flash Patch Targets Zero-Day Exploit

Java Patch Plugs 19 Security Holes

How PCI DSS 3.0 Can Help Stop Data Breaches

Thunderbolt devices can infect MacBooks with persistent rootkits

Flaw in MacBook EFI allows boot ROM malware Hack of Community Health Systems Affects 4. Million Patients

JPMorgan Hack Exposed Data of 83 Million, Among Biggest Breaches in History

Al Jazeera Wrests Back Its Web Sites From Pro-Assad Hackers

Hackers Break Into Server for Obamacare Website: U.S. Officials

Carbanak Hackers Target Banks in $1bn Attack Campaign

Staples confirms 1.2 million cards lost in breach

Jobs’s revenge: Flash piles up the zero-day exploits

Sony hackers exploited a zero-day

vulnerability

Cybersecurity concerns fuel MSSPs, managed security market

Anonymous targets ISIS social media, recruitment drives in #OpISIS campaign

Oracle issues critical patch update: 169 new security fixes

Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence

Bugzilla zero-day can reveal zero-day vulnerabilities in top open-source projects

Microsoft Fixes Dangerous Sandworm Zero-Days Used in APT Attacks

Researcher blames vulnerable code re-use for zero-day in Android’s CyanogenMod

Oracle issues critical patch update: 169 new security fixes

Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found Microsoft Fixes Dangerous Sandworm Zero-Days Used in APT Attacks

Major Data Breach at Staples Stems From POS

Thieves Jackpot ATMs With ‘Black Box’ Attack

JPMorgan Chase hack due to missing 2-factor authentication on one server

‘Cyber Caliphate’ hacks Malaysia Airlines website

Hacked Hotel Phones Fueled Bank Phishing Scams

Anthem Warns of E-mail Scam In Wake Of Data Breach

FBI: Businesses Lost $215M to Email Scams

Bank Hackers Steal Millions via Malware

Chinese Hackers Hijack Forbes Website to Spread Malware: Report

Sony Hackers Reportedly Used A Zero Day Vulnerability XSS Vulnerability in IE could lead to phishing attacks

Highly critical “Ghost” allowing code execution affects most Linux systems

Anonymous loose cannon admits DDoSing social services and housing websites

Great Firewall of China blasts DDoS attacks at random IP addresses

19,000 French websites hit by DDoS, defaced in wake of terror attack

Hackers Steal Up To $1 Billion From Banks

Apple Blocks Tool That Brute-forces iCloud Passwords

Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole

Health insurer Anthem hit by hackers, up to 80 million records exposed

Anarchist hackers start cyber war with ISIS

Newsweek Twitter account hacked by ‘CyberCaliphate’

Yet Another Flash Patch Fixes Zero-Day Flaw

Carbanak hacking group steal $1 billion from banks worldwide

Dutch Government Website Outage Caused by Cyber Attack

Flash Patch Targets Zero-Day Exploit

Java Patch Plugs 19 Security Holes

How PCI DSS 3.0 Can Help Stop Data Breaches

Thunderbolt devices can infect MacBooks with persistent rootkits

Flaw in MacBook EFI allows boot ROM malware Hack of Community Health Systems Affects 4. Million Patients

JPMorgan Hack Exposed Data of 83 Million, Among Biggest Breaches in History

Al Jazeera Wrests Back Its Web Sites From Pro-Assad Hackers

Hackers Break Into Server for Obamacare Website: U.S. Officials

Carbanak Hackers Target Banks in $1bn Attack Campaign

Staples confirms 1.2 million cards lost in breach

Jobs’s revenge: Flash piles up the zero-day exploits

Sony hackers exploited a zero-day vulnerability

Cybersecurity concerns fuel MSSPs, managed security market

Anonymous targets ISIS social media, recruitment drives in #OpISIS campaign

Oracle issues critical patch update: 169 new security fixes

Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence

Bugzilla zero-day can reveal zero-day vulnerabilities in top open-source projects

Microsoft Fixes Dangerous Sandworm Zero-Days Used in APT Attacks

Researcher blames vulnerable code re-use for zero-day in Android’s CyanogenMod

Oracle issues critical patch update: 169 new security fixes

Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found Microsoft Fixes Dangerous Sandworm Zero-Days Used in APT Attacks

Major Data Breach at Staples Stems From POS

Thieves Jackpot ATMs With ‘Black Box’ Attack

JPMorgan Chase hack due to missing 2-factor authentication on one server

‘Cyber Caliphate’ hacks Malaysia Airlines website

Hacked Hotel Phones Fueled Bank Phishing Scams

Anthem Warns of E-mail Scam In Wake Of Data Breach

FBI: Businesses Lost $215M to Email Scams

Bank Hackers Steal Millions via Malware

Chinese Hackers Hijack Forbes Website to Spread Malware: Report

Sony Hackers Reportedly Used A Zero Day Vulnerability XSS Vulnerability in IE could lead to phishing attacks

Highly critical “Ghost” allowing code execution affects most Linux systems

Anonymous loose cannon admits DDoSing social services and housing websites

Great Firewall of China blasts DDoS attacks at random IP addresses

19,000 French websites hit by DDoS, defaced in wake of terror attack

Hackers Steal Up To $1 Billion From Banks

Apple Blocks Tool That Brute-forces iCloud Passwords

Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole

Health insurer Anthem hit by hackers, up to 80 million records exposed

Anarchist hackers start cyber war with ISIS

Newsweek Twitter account hacked by ‘CyberCaliphate’

Yet Another Flash Patch Fixes Zero-Day Flaw

Carbanak hacking group steal $1 billion from banks worldwide

Dutch Government Website Outage Caused by Cyber Attack

Flash Patch Targets Zero-Day Exploit

Java Patch Plugs 19 Security Holes

How PCI DSS 3.0 Can Help Stop Data Breaches

Thunderbolt devices can infect MacBooks with persistent rootkits

Flaw in MacBook EFI allows boot ROM malware Hack of Community Health Systems Affects 4. Million Patients

JPMorgan Hack Exposed Data of 83 Million, Among Biggest Breaches in History

Al Jazeera Wrests Back Its Web Sites From Pro-Assad Hackers

Hackers Break Into Server for Obamacare Website: U.S. Officials Carbanak Hackers Target Banks in $1bn Attack Campaign

Staples confirms 1.2 million cards lost in breach

Jobs’s revenge: Flash piles up the zero-day exploits

Sony hackers exploited a zero-day vulnerability

Cybersecurity concerns fuel MSSPs, managed security market

Anonymous targets ISIS social media, recruitment drives in #OpISIS campaign

Oracle issues critical patch update: 169 new security fixes

Infamous Regin malware linked to spy tools used by NSA, Five Eyes intelligence

Bugzilla zero-day can reveal zero-day vulnerabilities in top open-source projects

Microsoft Fixes Dangerous Sandworm Zero-Days Used in APT Attacks

Researcher blames vulnerable code re-use for zero-day in Android’s CyanogenMod

Oracle issues critical patch update: 169 new security fixes

Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found Microsoft Fixes Dangerous Sandworm Zero-Days Used in APT Attacks

Major Data Breach at Staples Stems From POS

Thieves Jackpot ATMs With ‘Black Box’ Attack

JPMorgan Chase hack due to missing 2-factor authentication on one server

‘Cyber Caliphate’ hacks Malaysia Airlines website

Hacked Hotel Phones Fueled Bank Phishing Scams

Anthem Warns of E-mail Scam In Wake Of Data Breach

FBI: Businesses Lost $215M to Email Scams

Bank Hackers Steal Millions via Malware

Chinese Hackers Hijack Forbes Website to Spread Malware: Report

Sony Hackers Reportedly Used A Zero Day Vulnerability XSS Vulnerability in IE could lead to phishing attacks

Highly critical “Ghost” allowing code execution affects most Linux systems

Anonymous loose cannon admits DDoSing social services and housing websites

Great Firewall of China blasts DDoS attacks at random IP addresses

19,000 French websites hit by DDoS, defaced in wake of terror attack

Hackers Steal Up To $1 Billion From Banks

Apple Blocks Tool That Brute-forces iCloud Passwords

Chinese Hacking Group Codoso Team Uses Forbes.com As Watering Hole

Health insurer Anthem hit by hackers, up to 80 million records exposed

Anarchist hackers start cyber war with ISIS Newsweek Twitter account hacked by ‘CyberCaliphate’

Yet Another Flash Patch Fixes Zero-Day Flaw

Page 5: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

SHARED 315 TIMES

Page 6: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Se

nti

me

nt

Duration of News Cycle

Page 7: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller #RSAC

T E C H N O L O G Y B U S I N E S S C O N S U M E R P O L I C Y

Page 8: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Se

nti

me

nt

@NicoleCMiller

Page 9: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Page 10: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

News doesn’t wait

Centralized communications teams move faster in a crisis

55

%

Long news cycle = Coverage sentiment

Page 11: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Messages from company spokespeople are shared 40% more

Being quoted isn’t your only option

No participation = Coverage sentiment

32

%

Page 12: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

-3.0

0

-2.0

0

-1.0

0

0.0

0

Co

ve

rage

Se

nti

me

nt

DISM

ISSIVE

@NicoleCMiller

Page 13: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller Storylines Diverge

storylines

diverge-

better way to

write it?

Page 14: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Analysis phase is the longest and skews the most

negative for you

Line up your own third party security voices in advance

Security experts = Coverage sentiment + shares

11

%

20

0 %

Page 15: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Page 16: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Se

nti

me

nt

@NicoleCMiller

Page 17: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Fight the instinct to close the door on the crisis

Resolution coverage is the most positive for a company

If not, long tail coverage will focus on what broke not how you fixed it

Page 18: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller #RSAC

Make friends & know your frenemies

Focus on customers, not headlines

You’re the star of the party—don’t hide

Fortune (and news coverage) favors the prepared

If you try, history might reward you

Page 19: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC

waggeneredstrom.com/cybersecurity

Nicole Miller • Senior Vice President • @NicoleCMiller

Page 20: From the Battlefield: Managing Customer Perceptions in a Security

#RSAC @nicolecmiller

Next week you should:

Gather a team of technical, legal, executive and communication decision makers

In the first three months following this presentation you should:

Develop a playbook

Threat assessment

Spokespeople

Messaging

Within six months you should:

Battle test your plan and practice practice practice

Develop a supportive network of third parties that can speak on your behalf

Apply What You Have Learned Today