21
William Patterson University Cyber Event William Paterson University Cyber Event

William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

William Patterson University Cyber Event

William Paterson University

Cyber Event

Page 2: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

Verizon

Presenter

Steve Lutinski

[email protected]

203-814-4694

Director, Verizon Security Solutions

Education, Healthcare & State Government

• Verizon

• GTE

• Kaiser

• US Army Air Cav - Aerial

Observer & Information Security Officer

Page 3: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 3

IFF(Identify Friend or Foe)

Confidential and proprietary materials for

authorized Verizon personnel and outside

agencies only.

Use, disclosure or distribution of this material is

not permitted to any unauthorized persons or third

parties except by written agreement.

Page 4: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

Question 1

What was the first year Verizon published the DBIR?

A 2007

B. 1997

C. 2017

A. 2007

DBIR Trivia

Page 5: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

Question 2

According to the Verizon DBIR, what is the average time to discover a data breach?

A. 8 Days

B. 28 Days

C. 208 Days C. 208 Days

DBIR Trivia

Page 6: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

Question 3

According to the Verizon DBIR, what is the average time for a Bad Actor to actually perform a data breach?

A. Minutes

B. Hours

C. Days

A. Minutes

DBIR Trivia

Page 7: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These gray boxes are 12 grids guide

• Use these boxes as a guideline to place your content

• They won’t show on the slide show mode

7

Cyber attacks happen faster and are harder to catch.

Source: Verizon 2016 Data Breach Investigations Report

Time to compromise Time to discovery

11%

82%

3%

83%

5%

9%

One in nine (11 percent) of compromises

happened in seconds. Almost all (93 percent)

happened within minutes.

Just three percent of compromises were detected

within minutes, and only 17 percent in days.

Eighty-three percent took weeks or more to discover.

Seconds

Minutes

Hours

Days

Weeks+

Legend

Minutes Weeks

Hours

Days

Seconds

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

Page 8: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

2008

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

• THE LEADING DATA SECURITY

REPORT FOR TEN YEARS.

• MILLION’s OF DOWNLOADS

/ WIDELY USED / REFERENCED.

• TURNS DATA INTO USEFUL,

ACTIONABLE INFORMATION.

THERE’S ONLY ONE

DATA BREACH

INVESTIGATIONS

REPORT (DBIR).

2009 2010

2011 2012 2013

2014 2015

Data Breach Investigations Report (DBIR)

2016

2017

Page 9: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

Industry DBIR (Data Breach Investigations Report) Contributors

Types of organizations

• ISACS

• Law Enforcement Agencies

• CSIRT’s

• Cyber Centers

• Forensic Providers

• Infosec Product and Service

providers

Page 10: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 10

2017 Data Breach Investigations Report (DBIR)

Confidential and proprietary materials for

authorized Verizon personnel and outside

agencies only.

Use, disclosure or distribution of this material is

not permitted to any unauthorized persons or third

parties except by written agreement.

Lift the lid on cybercrime.

1,935 breaches

42,068 incidents

65 contributors

10th edition

Page 11: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These gray boxes are 12 grids guide

• Use these boxes as a guideline to place your content

• They won’t show on the slide show mode

11 Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

What’s the

Biggest

Threat you

Face?

Page 12: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 12

Education Sector Examples

Page 13: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 13

Education

Cyber-

Espionage

Miscellaneous

Errors

Ev erything

Else

67% of breaches 71% External 56% Personal 45% Financial

Denial of

Serv ice

Page 14: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 14

Healthcare Sector Examples

Page 15: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 15

Healthcare

Priv ilege

Misuse

Miscellaneous

Errors

Physical

Theft and

Loss

32% External 69% Medical 64% Financial 81% of breaches

Crimeware

Page 16: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 16

Public Sector Examples

Page 17: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These reference boxes are a 12-column guide

• Use these boxes as guides to place and align your content

• They won’t appear on the slide show mode

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement. 17

Public Sector

Confidential and proprietary materials for

authorized Verizon personnel and outside

agencies only. Use, disclosure or distribution of

this material is not permitted to any unauthorized

persons or third parties except by written

agreement.

Cyber-

Espionage

Priv ilege

Misuse

Miscellaneous

Errors

62% External 41% Personal 64% Espionage 81% of breaches

Crimeware

Page 18: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These gray boxes are 12 grids guide • Use these boxes as a guideline to place your content • They won’t show on the slide show mode

Ransomware

1000

3000

0

500

1000

1500

2000

2500

3000

3500

2015 2016

Attacks / Day

Frequency: 50% increase

Attack Vector: web drive-by downloads

supplanted by email this year.

Social actions, notably

phishing, in 21% of incidents, up from just 8% in the 2016

Top Target: Public Sector

Page 19: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These gray boxes are 12 grids guide

• Use these boxes as a guideline to place your content

• They won’t show on the slide show mode

23

Distributed Denial of

Service (DDoS)

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

“26% of all security

incidents were DoS

attacks.*”

No organization is immune to attack:

• Criminal organizations, hacktivists,

protestors and government-sponsored groups are driving up the

frequency and peak volume of

attacks.

• Attack services and new technology

are lowering barriers to entry.

*2017 Verizon Data Breach Investigations Report, Figure 34

yourstudentportal.edu

Page 20: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These gray boxes are 12 grids guide

• Use these boxes as a guideline to place your content

• They won’t show on the slide show mode

25 Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

DBIR Quick Takeaways

Be vigilant

Make people your first line

of defense.

Only keep data on a

“need to know” basis.

Patch promptly.

Encrypt sensitive data.

Use two-factor authentication.

Don’t forget physical security.

Prepare Have a plan & test it on a regular

basis!

Proactive Protect user identities and

applications!

Partner People are the key, make sure you

are not alone!

Page 21: William Patterson University Cyber Event William Paterson ... · IFF(Identify Friend or Foe) Confidential and proprietary materials for authorized Verizon personnel and outside agencies

NOTE: These gray boxes are 12 grids guide

• Use these boxes as a guideline to place your content

• They won’t show on the slide show mode

26

Breaking News!

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by writ ten agreement.

The 2018 Data Breach Investigations Report will be available April 10th!

http://www.verizonenterprise.com/verizon-insights-lab/dbir/