CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSCYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
Agenda
• Overview of Breaches– Current Breach Statistics– Examples of Breaches
• Detecting Breaches– Symptoms– Log Analysis and Tools– Breach Assessment– Breach Investigation
• Prevent , Detect, and Mitigate Breaches
a gap in a wall, barrier, or defense, especially one made by an attacking army Hacker.
BreachbrēCH/
noun
http://www.idtheftcenter.org
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
2010 2011 2012 2014 2015
Causes/Type of Breaches (2010 – 2015)
Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence
© 2016 Enterprise Risk Management, Inc.
http://www.idtheftcenter.org
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
2010 2011 2012 2014 2015
Causes/Type of Breaches (2010 – 2015)
Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence
© 2016 Enterprise Risk Management, Inc.
the average data breach cost per victim, it is nearly
$206 per compromised record© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html
1x Compromised Server
10,000x Stolen Records
Cost Per record
$2,060,000
So you’re telling me that….
© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html
Breaches Handled by ERM
Security Breach Investigations
Detecting Breaches
Symptoms
Log Analysis and Tools
Breach Assessment
Breach Investigation
Prevent , Detect, and Mitigate Breaches
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
Its your responsibility to make sure its correctly deployed, implemented and enforced.
Security is critical
© 2016 Enterprise Risk Management, Inc.
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSIf not….XXX
XXX
Might as well plan onFAILING
© 2016 Enterprise Risk Management, Inc.
Security is critical
Security Tips•Logical Security•Physical Security•Administrative Security•Logging and Monitoring•Security Assessments•Awareness Training•Vendors /Contractors•Incident Response Plan
1 Have you ever performed a data breach assessment of your business?
1
2
Have you ever performed a data breach assessment of your business?
Can you say with confidence that your business is safe from cyber attacks?
1
2
3
Have you ever performed a data breach assessment of your business?
Can you say with confidence that your business is safe from cyber attacks?
Do you know precisely what you need to do if your business is faced with cyber attack?
What if you have been hackedbut just don’t know it yet?
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS
Your go to advisorsfor all matters in information security.
www.emrisk.com
800 S Douglas Road #940Coral Gables, FL 33134 USA
Phone: 305-447-6750Email: [email protected]
Silka M. GonzalezPresident
+1 (305) [email protected]