OITMP Tulsa Community College September 11-12, 2012 Geoff Wilson University of Oklahoma.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

IT Security Policy Framework
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Springfield Technical Community College Security Awareness Training.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Security Controls – What Works
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
SEC835 Database and Web application security Information Security Architecture.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Information Security Issues at Casinos and eGaming
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
CS 110: Introduction to Computer Science Frequently asked questions about a CS major and CS career.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
CSCE 548 Secure Software Development Security Operations.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
OITMP David Stone University of Oklahoma. A little about OITMP The Oklahoma Information Technology Mentorship Program (OITMP) is an outreach initiative.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Computer Security By Duncan Hall.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Albany Bank Corporation Security Incident Management Program.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security tools for records managers Frank Rankin.
SY0-401 CompTIA Security+ Certification Pass CompTIA Security+ Certification Exam By The Help Of Exams4Sure Get Complete File From
Defining your requirements for a successful security (and compliance
Performing Risk Analysis and Testing: Outsource or In-house
Strategies in the Game of
Cybersecurity - What’s Next? June 2017
Comprehensive Security and Compliance at an Affordable Price.
Security Standard: “reasonable security”
Compliance with hardening standards
Introduction to the Federal Defense Acquisition Regulation
Cyber Protections: First Step, Risk Assessment
Forensics Week 11.
Valid And Updated CS0-001 Exam Certifications Dumps Questions
Red Flags Rule An Introduction County College of Morris
National Cyber Security
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

OITMP Tulsa Community College September 11-12, 2012 Geoff Wilson University of Oklahoma

A little about OITMP The Oklahoma Information Technology Mentorship Program (OITMP) is an outreach initiative that connects networking professionals from Oklahoma institutions with students who are studying networks at Oklahoma academic institutions. The OITMP is part of a National Science Foundation grant whose purpose is to boost Oklahoma’s education and research capability through network improvements. technology for all.

Goals Official Goal: Expose Oklahoma students to the practical day-to-day life of networking and security professionals. Not So Secret Goal: Identify, develop and recruit talent! technology for all.

My Journey technology for all. ’99-’03 BS in CS Summa cum laude GPS project Cryptography

My Journey technology for all. ’99-’03 ‘02 ‘03 Web application developer Project voting system Security Incident submission and tracking system

My Journey technology for all. ‘03-’05 ’99-’03 ‘02 ‘03 MS Information Security Technology & Management CyberCorps NATBLASTER

My Journey technology for all. ‘04 ‘03-’05 ’99-’03 ‘02 ‘03 Policy gap assessment NIST Internal policies

My Journey technology for all. ‘05-’06 ‘04 ‘03-’05 ’99-’03 ‘02 ‘03 FW Audit FISCAM Audit Designed, deployed pen testing lab

My Journey technology for all. ‘06-’08 ‘05-’06 ‘04 ‘03-’05 ’99-’03 ‘02 ‘03 Tool development Malware research Vuln assessments System administration Security guidance

My Journey technology for all. ‘06-’08 ‘05-’06 ‘04 ‘03-’05 ’99-’03 ‘02 ‘03 ‘09-Pres Risk assessment Incident response Training & Awareness Forensics Software development

Roadmap Why do we need information security? How do we secure organizations? What have I done? Career and job hunting advice

Why do we need security? To be able to provide for the confidentiality, integrity, and availability of data and services We’re often required to implement a certain baseline security through regulations Customers expect service providers to be good stewards of the data that is being provided Loss of intellectual property, trust, revenue Regulations have made data breaches costly

Data Breach Cost Average data breach cost is high and increasing Source: Ponemon Institute, 2010 Annual Study: U.S. Cost of a Data Breach

Data Breach Cost Average cost per record Source: Ponemon Institute, 2010 Annual Study: U.S. Cost of a Data Breach

Data Breach Cost Source: Ponemon Institute, 2010 Annual Study: U.S. Cost of a Data Breach

Data Breach Cost Source: Ponemon Institute, 2010 Annual Study: U.S. Cost of a Data Breach

2011 Data Breaches by Type Source:

Significant Oklahoma Data Breaches DateAgencyRecordsApprox. Cost Cause 2011 Oklahoma Health Department 133,000$28.5 MLaptop and paper files stolen from employee’s car 2009 Oklahoma Housing Finance Agency 225,000$48 MLaptop stolen from employee’s home 2009 Oklahoma Dept. of Human Services 1,000,000+$214 MStolen laptop 2009 Western Oklahoma State College 1,500$321 KInfected server 2008 Oklahoma State University 70,000$15 MCompromised server

Largest US Data Breaches Heartland Payment Systems breach (Jan. 2009) SQL vulnerability in web form code written 8 years prior allowed internal access to Heartland corporate network (separate from payment processing network) Intruders spent 6 months attempting to access payment processing network Intruders carefully hid their activities Built exploit packages to avoid detection by Heartland’s antivirus product

Largest US Data Breaches Eventually gained access to payment processing network and installed a network sniffer Compromised data in motion including credit card numbers, expiration dates, cardholder names 130,000,000 records breached Heartland was certified by a PCI QSA as being PCI compliant at the time of the breach

Largest US Data Breaches Total known costs = $68,198, Ponemon Institute Direct Costs Estimate = $7.8 Billion

Largest US Data Breaches TJX Companies, Inc. breach (Jan. 2007) Attackers targeted a wireless network at Marshalls discount clothing store near St. Paul Minnesota Wireless network used Wireless Equivalent Privacy protocol (WEP) was used to “encrypt” wireless communication WEP is a weak encryption protocol and can be cracked in under 10 seconds with freely available tools

Largest US Data Breaches Other reasons cited for breach include lack of software patching and lack of firewalls Attackers eavesdropped on employees authenticating to TJX’s data center servers Attackers were able to gain access and create their own accounts for sustained remote access Compromise was sustained for over 18 months 45,600,000 credit & debit card numbers compromised

What do the bad guys want with our data?

They want any information that can assist in identity theft Black market value of your data * *Source: Panda Security Report 2010, The Cyber-Crime Black Market: Uncovered ProductsPrice Credit card details (basic info) US $2, EU $5 Credit card details (full info)US $25, EU $50 Exclusive (e.g. gold, platinum) credit card details (full info) US $40, EU $90 Physical credit cards$190 + cost of details Bank credentials$80-$700 Card cloners$200-$1000 Fake ATMsUp to $35,000

Advanced Persistent Threat A sophisticated, typically well-funded, determined, organized cyber attackers. Typically target governments and contractors (e.g. DIB), financial, manufacturing, and research industry RSA APT breach led to compromise of SecureID one-time tokens –Nation-state threat attempting to access defense company networks – Lockheed Martin, L3, Northrop Grumman –Excel spreadsheet sent to EMC employees rigged with an Adobe Flash vulnerability –Exfiltrated data was compressed and encrypted, making it more difficult to detect

Advanced Persistent Threat F-35 Joint Strike Fighter data compromised by organized group originating in China Several terabytes of data were stolen from unclassified systems Systems infiltrated for up to two years Access was gained through compromise of defense contractor networks Exfiltrated data was encrypted, so it is not clear what data was stolen

How To Secure Organizations? ISO information security standard –Organization of information security –Security policy –Compliance –Risk assessment –Asset management –Human resources security –Physical and environmental security –Communications and operations management –Access control –Information systems acquisition, development, and maintenance –Information security incident management –Business continuity management

What Have I Done? Software development – ConocoPhillips, NSA, OU Governance & Compliance – IHS, OU Audit – HUD OIG Risk assessment & Vulnerability assessment - OU Vulnerability assessment – NSA, OU Penetration testing - OU Incident response - OU Forensics & malware analysis – NSA, OU Education & training - All System administration – NSA, OU technology for all.

What Have I Done? Software development – ConocoPhillips, NSA, OU Governance & Compliance – IHS, OU Audit – HUD OIG Risk & Vulnerability assessment – OU, NSA Penetration testing - OU Incident response - OU Forensics & malware analysis – NSA, OU Education & training - All System administration – NSA, OU technology for all.

GRC Design and deploy –Governance policy and procedure –Risk Management vulnerability assessment penetration testing secure architecture –Compliance PCI HIPAA FERPA FTC Red Flags

IT Audit Audit and assess –Governance policy and procedure –Risk Management vulnerability assessment penetration testing secure architecture –Compliance PCI HIPAA FERPA FTC Red Flags

Risk Assessment Identify risks through asset identification, threat analysis, vulnerability identification, business process analysis, control analysis Estimate risk (qualitative or quantitative) technology for all.

Vulnerability Assessment Identify and quantify all vulnerabilities in a system Report includes findings and recommended remediation Use risk assessment methodology to prioritize vulnerabilities technology for all.

Vulnerability Assessment Types Perspective –Black Box – No insider knowledge, no source code –White Box (a.k.a. crystal box) – Insider knowledge, source code –Gray Box – Somewhere in between Platform –Black box web application –White box web application –Network vulnerability assessment Non-credentialed (black box) Credentialed (white box)

Vulnerability Assessment Types Automated –Can find many vulnerabilities, but will only find those vuln’s that it is programmed to find –Automated, so requires less time typically –Still have to interpret and validate results to remove false positives Manual –Can find business logic flaws –Less false positives –More tedious, requires time

Penetration Testing Simulate the activity of a malicious attacker Often without cooperation or knowledge of broad IT staff Can involve active exploitation of security vulnerabilities Often includes social engineering Findings and mitigation recommendations are delivered in a report technology for all.

Vuln & Pen Testing Tools technology for all.

Vuln & Pen Testing Tools technology for all.

Incident Response DetectionTriage Analysis or other Response Fix / Resolution Proactive Processes & Strategy Communication & Outreach Strategy Feeds Lessons Learned Feed Reactive Proactive technology for all.

Security Incidents at OU Malware infection Copyright infringement complaint System misuse Policy violation (HR, student code) Account compromise E-discovery Stolen devices Law enforcement investigations technology for all.

Copyright Statistics technology for all.

Copyright Statistics technology for all.

Forensics Hard Drives Memory Analysis Mobile Devices Logs Packet Traces technology for all.

Training & Awareness technology for all. Date GivenPresentationAudience 10/21/2011There’s a Party in Security and Everyone is Invited Educause Annual 10/11/2011Introduction to Security Awareness CampaignCampus IT Leaders 8/5/2011Lessons Learned from Incident ResponseIncident Response Team 3/9/2011Information Security Awareness TrainingVarious 3/2/2011Information Security UpdateLegal Counsel 1/11/2011Sandboxing and 3rd Party Patching Utilities Campus IT Leaders 12/8/2010Malware Guest LectureCS Students 10/12/2010Removable Media VirusesCampus IT Leaders 9/27/2010Security Incident ResponseIT Field Services & Reps 9/14/2010Securing the University: Challenges and Opportunities, Incident Triage Procedures Campus IT Leaders 8/14/2010Securing the University: Challenges and Opportunities Deans & VPs 8/4/2010Security Awareness for DevelopersIT Developers 7/13/2010Security Awareness for DevelopersIT Developers 5/19/2010Emerging Threat BriefingVarious IT (workshop)

Finding the Right Job Figure out what you want to do –Security? Risk assessments? Incident response? Vulnerability research? Profile individuals who have achieved what you want. What did they do? Reach out to them on LinkedIn Be willing to take an entry level position with the right company & growth potential technology for all.

Finding Your IT Job (cont’d) Differentiate Yourself –College diploma in a relevant field Worth up to 5 years of experience –Internships –Certifications (start small, and work your way up) –Extracurricular activities Home lab Local IT user organizations –Excel outside of your career Success breeds success technology for all.

Application Materials I’ve reviewed ~500 resumes of recent graduates. What successful candidates did: –Cover letter explaining why they are interested in the position and highlighting key resume items –Prompt thank you letters/ s after interviews –No spelling/grammatical mistakes –Customize application materials for the job –Limit non-relevant items (displays ability to edit) technology for all.

Application Materials What successful candidates did: –Manage whitespace –Have someone on the inside pass along your resume –Ask this person what the resume reviewer looks for –A few days after submitting resume, follow up with a phone call or demonstrating interest in the job –Don’t try to use humor or sarcasm technology for all.

Interviewing Be prepared to answer difficult questions –What are your 5/10 year career goals and how would this job help you achieve those goals? –Tell me about yourself. –Here’s a difficult situation. How would you handle it? It’s okay to take a minute to prepare a response to a tough question Know your technical stuff Come prepared with a printed list of questions for the interviewer technology for all.

Interviewing Ask for a business card Do your homework. Know about the company “I was reading on your website that your company does X…tell me more about this.” Turn off you phone Be relaxed Be your professional self Don’t be underdressed technology for all.

Career Sustaining Recommendations technology for all. Always be learning Build a strong foundation Understand how business works Understand how technology works Learn how to be a good public speaker Learn how to be articulate in communication Network with fellow IT professionals Be willing to learn new technologies

Career Sustaining Recommendations Find a mentor (formal or informal) to help you –Understand the organization –Develop your perspective –Provide a sounding board for your ideas –Locate more job opportunities –Derive higher job satisfaction Don’t always stay in your comfort zone Practice public speaking skills Develop time and project management skills technology for all.

Career Sustaining Recommendations Know the business –Have to know how technology is used –Learn how to get things accomplished within the business Understand your customers Be a team player Build relationships Become a trusted advisor technology for all.

Thank you! Geoff Wilson technology for all.