Partner Perspectives  Connecting marketers to our tech communities.
4/16/2015
03:00 PM
Ryan Vela
Ryan Vela
Partner Perspectives
Connect Directly
Twitter
RSS
50%
50%

Breach Defense Playbook

How to be smart about defending against your next attack.

Over the next several weeks, this blog series will outline breach prevention and incident response services that organizations can use to stay ahead of hackers and not fall victim to the cyberbreach fallout. However, before we look forward, let’s look back and recount what we’ve seen in the news recently so we can learn from others:

  • January 2015, Anthem: 80 million sets of names, birth dates, member IDs, social security numbers, addresses, phone numbers, email addresses, and employment histories are stolen from the second-largest health insurer in the U.S. Victims include current and former Anthem health plan members, and also non-members with other insurance companies for whom Anthem managed paperwork.
  • April-June 2014, Community Health Systems: 4.5 million patient records that included names, addresses, birth dates, telephone numbers, and social security numbers were available to hackers. The Heartbleed OpenSSL vulnerability was used for infiltration.
  • April-September 2014, Home Depot: 53 million email addresses and 56 million credit and debit card accounts were stolen from the largest home improvement retail chain. Hackers used custom malware to scrape data from self-checkout registers.
  • July 2014, JPMorgan Chase: 83 million personal accounts and 7 million small business accounts were stolen from the largest U.S. bank. Hackers stole the login credentials for a JPMorgan employee. One system that was not upgraded for two-factor authentication was targeted for infiltration. The same hackers also are suspected of targeting Citigroup, HSBC Holdings, E*Trade, Regions Financial, ADP, and Fidelity Investments.
  • February-March 2014, Ebay: 145 million users were asked to reset their passwords. Hackers stole email addresses, encrypted passwords, birth dates, addresses, and other information. Hackers were able to infiltrate the organization and access a database by using stolen employee credentials.
  • November-December 2013, Target: 70 million user accounts and 40 million credit and debit card accounts were stolen. Hackers used a third-party vendor to access the network and then used scrapers on point-of-sale devices to steal data.
  • British Airways, Japan Airways, Premera, Uber, Slack, Mozilla, Sony Pictures, Staples, UPS, Neiman Marcus, Korea Credit Bureau, European Central Bank, AOL, Living Social, Evernote, Gamigo, Court Ventures, Adobe, UbiSoft, Zappos, Steam, NHS, Blizzard, Sony Play Station Network, and the list goes on and on. I have been tracking over 100 major breaches since 2004.

If organizations want to keep their names off this list and out of the headlines, they need to know where to start. First, they need to identify what matters most within their organization so they can align their security strategy behind it. Whether it is financial data, personally identifiable information, or intellectual property, organizations need to know what directly influences their reputation (and revenue). Once they understand this key aspect of their cyber-infrastructure from a strategic perspective, they can make the right investments to protect it and secure the environment.

Second, organizations should get visibility into the data moving into, out of, and between segments of their network. Only through inspecting and adjudicating the content of moving data can an organization ensure that malicious activity is not going on.

Lastly, organizations should focus on implementing a defense-in-depth strategy for their cyber-infrastructure. Along with the “not if, but when” maxim, defense-in-depth will decrease the risk of critical data compromise while at the same time increase the probability of intrusion detection.

Building on these lessons, this blog series will examine the playbook organizations should follow to prevent and prepare for breaches. The series will begin with deterrence by talking about cybersecurity engineering, penetration testing, and security controls. Then it will touch on detection by hunting for breach indicators. From there we’ll move to prediction by reviewing an organization’s security program as well as using open-source intelligence. And, because we live in a “not if, but when” breach world, we’ll delve into response and assessing an organization’s incident response readiness. Lastly, we’ll get into governance with respect to risk, audits, and assessments. Stay tuned!

Ryan Vela is a Regional Director for Fidelis Cybersecurity. He has 15-years' experience in conducting investigations and digital forensic analysis. Ryan served as a Strategic Planner at the Defense Computer Forensics Laboratory (DCFL), where he established plans for the ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Fidelis Cybersecurity provides organizations with a robust, comprehensive portfolio of products, services, and expertise to combat today's sophisticated advanced threats and prevent data breaches. Our commercial enterprise and government customers around the globe can face advanced threats with confidence through use of our Network Defense and Forensics Services – delivered by an elite team of security professionals with decades of hands-on experience – and our award-winning Fidelis XPS™ Advanced Threat Defense Products, which provide visibility and control over the entire threat life cycle.
Featured Writers
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.