SlideShare une entreprise Scribd logo
1  sur  35
© International Institute for Learning, Inc., All rights reserved. 1
Intelligence, Integrity and Innovation
© International Institute for Learning, Inc., All rights reserved.
Thank you for joining us today.
This webinar is brought to you by IIL – a global leader in:
Project, Program and Portfolio Management
Microsoft® Project and Project Server
Lean Six Sigma | Business Analysis
Agile | PRINCE2® | ITIL®
Leadership and Interpersonal Skills
Data Security Breach
The Sony & Staples Story
© International Institute for Learning, Inc., All rights reserved. 2
Intelligence, Integrity and Innovation
Global IIL Companies
IIL US
IIL Asia (Singapore)
IIL Australia
IIL Brasil
IIL Canada
IIL China
IIL Europe (United Kingdom)
IIL Finland
IIL France
IIL Germany
IIL Hong Kong
IIL Hungary
IIL India
IIL Japan
IIL Korea (Seoul)
IIL México
IIL Middle East (Dubai)
IIL Spain
© International Institute for Learning, Inc., All rights reserved. 3
Intelligence, Integrity and Innovation
In today’s world, companies generate and consume massive
amounts of data, as a day-to-day prerequisite of doing business.
This accumulated data becomes the most strategic asset of the
organization and more often than not gives a competitive
advantage in the market.
This critical nature of data makes it the new corporate target!
Data
© International Institute for Learning, Inc., All rights reserved. 4
Intelligence, Integrity and Innovation
Data security involves protecting data from the unwanted
actions of unauthorized users.
BUT
Data security must not come at the cost of not being available
when necessary.
Data Security
© International Institute for Learning, Inc., All rights reserved. 5
Intelligence, Integrity and Innovation
A security breach is any incident that results in unauthorized
access of data, applications, services, networks, and/or devices
by perpetrators bypassing underlying security mechanisms.
Security Breach
© International Institute for Learning, Inc., All rights reserved. 6
Intelligence, Integrity and Innovation
Data Breaches – Causes
© International Institute for Learning, Inc., All rights reserved. 7
Intelligence, Integrity and Innovation
“Well-meaning” insiders: who have no intention to breach but
inadvertently do so because they fail to follow security policies.
‒ Lost devices
‒ Exposed data – no measures in place
‒ Poor business processes
Targeted Attacks: Coordinated effort involving humans or
automated software to cyber attack another individual, entity or
organization.
‒ System vulnerabilities
‒ Malware
‒ Stolen credentials
Data Breaches Occur Through:
© International Institute for Learning, Inc., All rights reserved. 8
Intelligence, Integrity and Innovation
Malicious insiders: who intentionally breach security policies.
Terminated employees
Company data stored on home computers for career
progression
Industrial espionage
Data Breaches Occur Through:
© International Institute for Learning, Inc., All rights reserved. 9
Intelligence, Integrity and Innovation
Incursion: Hackers break into the company's network by
exploiting system vulnerabilities.
Discovery: The hacker maps out the organization's systems and
automatically scans for confidential data.
Capture: Exposed data on unprotected systems is immediately
accessed. Components called root kits are surreptitiously
installed on targeted systems and networks.
Exfiltration: Confidential data is sent back to the hacker team.
The Anatomy of a Data Breach
© International Institute for Learning, Inc., All rights reserved. 10
Intelligence, Integrity and Innovation
The Anatomy of a Data Breach
© International Institute for Learning, Inc., All rights reserved. 11
Intelligence, Integrity and Innovation
Damaged Intellectual Property: Blueprints, technical
specifications, designs, launch plans
Revenue Lost: Downtime
Theft: Bank information, transfer codes
Vandalism: False or discrediting information
Ruined reputation
Consequences of a Security Breach
© International Institute for Learning, Inc., All rights reserved. 12
Intelligence, Integrity and Innovation
Confidentiality, integrity, and availability, also known as the CIA
triad, is a model designed to guide policies for information security
within an organization.
Balances the competing requirements of confidentiality, integrity,
and integrity with equal emphasis on each.
Information Security Basics:
The CIA Triad
© International Institute for Learning, Inc., All rights reserved. 13
Intelligence, Integrity and Innovation
Confidentiality is required to prevent sensitive information from
reaching the wrong people.
Simple ways of ensuring confidentiality: data encryption, user
IDs and passwords or, for highly sensitive information, in hard-
copy form only.
More advanced techniques: storage on air-gapped computers,
disconnected storage devices.
Confidentiality
© International Institute for Learning, Inc., All rights reserved. 14
Intelligence, Integrity and Innovation
Integrity involves maintaining the consistency, accuracy, and
trustworthiness of data over its entire life cycle.
Data must not be changed in transit, and steps must be taken to
ensure that data cannot be altered by unauthorized people.
Techniques include the use of checksums and hashing.
Integrity
© International Institute for Learning, Inc., All rights reserved. 15
Intelligence, Integrity and Innovation
Data is meant to be used, when needed, by those authorized to
use it.
Techniques implemented to implement confidentiality and
integrity must not compromise on the availability of information.
Availability of data can be improved through implementing
redundancy, failover, RAID.
Availability
© International Institute for Learning, Inc., All rights reserved. 16
Intelligence, Integrity and Innovation
Part 1: The Sony Story
© International Institute for Learning, Inc., All rights reserved. 17
Intelligence, Integrity and Innovation
It was a release of confidential data belonging to Sony Pictures
Entertainment on November 24, 2014.
100 terabytes of data was stolen containing:
Personal information about Sony Pictures’ employees and
their families
E-mails between employees
Information about executive salaries at the company
Copies of unreleased Sony films
Sony Pictures Entertainment Hack – 2014
© International Institute for Learning, Inc., All rights reserved. 18
Intelligence, Integrity and Innovation
It is alleged that the attack was orchestrated by a group calling
themselves the “Guardians of Peace” or GOP.
There are alternate theories proposing that the Government of
North Korea and even former Sony employees were behind the
attack.
By whom?
© International Institute for Learning, Inc., All rights reserved. 19
Intelligence, Integrity and Innovation
A malware called Wiper has been identified as the agent used in
the attack and was responsible for destroying data on the
target's hard disk (or similar storage) on systems running
Microsoft® Windows.
The malware comes wrapped in an executable “dropper” that
installs it and supporting files. In this case, the “dropper” installs
itself as a Windows service when executed.
How was the Breach Orchestrated?
© International Institute for Learning, Inc., All rights reserved. 20
Intelligence, Integrity and Innovation
The malware service appears to create a network file share –
which points to the location of Windows system files in the PC’s
file directory structure (usually WINDOWS).
It then gives unrestricted access to that share, allowing any
other computer on the local network to access it.
Mechanics of the Attack
© International Institute for Learning, Inc., All rights reserved. 21
Intelligence, Integrity and Innovation
The dropper then communicates with a set of IP addresses in
Japan, possibly connected to Sony's corporate network. Then it
shuts itself down.
At some point – either based on a hard-coded time within the
malware package or after some other communication with the
attackers – the nasty part of the malware package gets
launched.
Mechanics of the Attack – II
© International Institute for Learning, Inc., All rights reserved. 22
Intelligence, Integrity and Innovation
Wiper then communicates with 3 IP addresses (one each in Italy,
Poland, and Thailand) to transfer the contents of the computer.
The malware starts accessing the hard drive and deleting its
contents sector by sector.
Once it’s complete, it suspends Windows for two hours, then
reboots the computer when it wakes.
At this point, the drive is completely wiped out – even making
physical changes to the hard drive.
Coup de Grâce
© International Institute for Learning, Inc., All rights reserved. 23
Intelligence, Integrity and Innovation
An e-mail released in the hack showed that Angelina Jolie
wanted David Fincher to direct her film Cleopatra.
In another e-mail, Scott Rudin referred to Jolie as "a minimally
talented spoiled brat“.
Several future Sony Pictures films, including Annie, Mr. Turner,
Still Alice, and To Write Love on Her Arms, were also leaked.
The Saucier Bits in the Stolen Data
© International Institute for Learning, Inc., All rights reserved. 24
Intelligence, Integrity and Innovation
Industry estimates that the data breach will cost Sony about
Y100 billion, or $1.25 billion from:
Lost business,
Various compensation costs and
New investments
Consequences for Sony
© International Institute for Learning, Inc., All rights reserved. 25
Intelligence, Integrity and Innovation
Maybe not! But the consequences could have been lesser if:
Sensitive IPR data was segregated
Back-up networks were disconnected from the primary network
so that back-ups are not affected.
The malware was identified early by having up-to-date patches.
The infected machine(s) were isolated immediately after
detection.
Sony had learned from the Sony 2011 PlayStation incident and
educated its users on what to look out for.
Could It Have Been Prevented?
© International Institute for Learning, Inc., All rights reserved. 26
Intelligence, Integrity and Innovation
Part 2: The Staples Story
© International Institute for Learning, Inc., All rights reserved. 27
Intelligence, Integrity and Innovation
Cardholder names, card numbers, expiration dates, and card
verification codes of 1.16 million customer credit and debit cards
used at 119 Staples locations in 35 American states.
This data was stolen over a period of up to six months.
Staples Data Breach 2014
© International Institute for Learning, Inc., All rights reserved. 28
Intelligence, Integrity and Innovation
It is alleged that a cybercrime gang using malware known as
Anunak was behind the Staples breach.
This same gang is believed to behind breaches at Sheplers (a
cowboy apparel chain) and Bebe (a women's clothing retailer),
as well as attacks on the Russian banking sector.
By whom?
© International Institute for Learning, Inc., All rights reserved. 29
Intelligence, Integrity and Innovation
Speculation is that the malware was cascaded using one of these
two methods:
Method 1:
Using rented computers called “BotNets”, Anunak members
sent phishing e-mails to the company’s employees.
The e-mails may have appeared to be from the Central Bank
of the Russian Federation, but actually contained malware
designed to infect the employees' computers.
Method 2:
A company-wide update might have pushed this malware to
all PoS terminals
How was the Breach Orchestrated?
© International Institute for Learning, Inc., All rights reserved. 30
Intelligence, Integrity and Innovation
The malware then infects the Point of Sale (PoS) terminals to
capture the information from cards swiped on these terminals.
Once the stolen card information was located the PoS’ memory,
after a card swipe, it is transmitted to a programmed IP where
the stolen data reaches the attackers.
Mechanics of the Attack – II
© International Institute for Learning, Inc., All rights reserved. 31
Intelligence, Integrity and Innovation
The attack cost Target $148 million, and cost financial
institutions $200 million.
Profits fell 46 percent in the fourth quarter of 2013.
Resignation of Beth M. Jacob, the company’s most senior
technology officer in February, and Gregg Steinhafel, CEO and
chairman of the board, in May.
Consequences for Staples
© International Institute for Learning, Inc., All rights reserved. 32
Intelligence, Integrity and Innovation
This attack may have been prevented if:
Secure readers for card data capture were used
Encrypting of data, upstream of the POS, all the way to the
payment processing host, beyond the retail store network was
done
No live data was stored on the PoS memory
Exclusive use of chip and pin cards
Prevention Methods
© International Institute for Learning, Inc., All rights reserved. 33
Intelligence, Integrity and Innovation
Data security breaches have the power to cripple a corporation
and often result in large losses, both monetary and non-
monetary.
Techniques for preventing breaches:
Stop targeted attacks through a combination of policies, patches,
encryption, and isolation.
Keep aligned with the global security intelligence.
Actively identify the most sensitive information.
Automate IT controls to prevent human errors and internal theft.
Prevent data exfiltration once stolen [Isolation and Disconnection]
Closing Notes
© International Institute for Learning, Inc., All rights reserved. 34
Intelligence, Integrity and Innovation
 White Paper, “Why breaches happen and what to do about it?”
 2014 Sony Pictures Entertainment hack,
http://en.wikipedia.org/wiki/Sony_Pictures_Entertainment_hack
 Wiper Malware – A detection deep dive
http://blogs.cisco.com/security/talos/wiper-malware
 Inside the “wiper” malware that brought Sony Pictures to its knees
http://arstechnica.com/security/2014/12/inside-the-wiper-malware-
that-brought-sony-pictures-to-its-knees/
 Wiper (malware) http://en.wikipedia.org/wiki/Wiper_%28malware%29
 Target Hit by Credit-Card Breach
http://www.wsj.com/articles/SB100014240527023047731045792667432
30242538
References:
© International Institute for Learning, Inc., All rights reserved. 35
Intelligence, Integrity and Innovation
We invite you to get a closer look at what IIL can do for you
and your organization, by visiting www.iil.com or email
learning@iil.com and let us know how we can meet your
learning needs.
Please connect with IIL Socially:
Like us on: facebook.com/IIL.inc
Follow us: twitter.com/IILGLOBAL
Join our Discussions on LinkedIn
At IIL, Our Greatest Accomplishments are Yours

Contenu connexe

Tendances

Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxCyber Security Partners
 
The Israeli Intelligence Community Presentation
The Israeli Intelligence Community PresentationThe Israeli Intelligence Community Presentation
The Israeli Intelligence Community PresentationNickStachowiak
 
Getting Started with Splunk Enterprise - Demo
Getting Started with Splunk Enterprise - DemoGetting Started with Splunk Enterprise - Demo
Getting Started with Splunk Enterprise - DemoSplunk
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptxNBBNOC
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
The FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the DebateThe FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the DebateMike Chapple
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaEdureka!
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Splunk Architecture overview
Splunk Architecture overviewSplunk Architecture overview
Splunk Architecture overviewAlex Fok
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 

Tendances (20)

Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
The Israeli Intelligence Community Presentation
The Israeli Intelligence Community PresentationThe Israeli Intelligence Community Presentation
The Israeli Intelligence Community Presentation
 
Getting Started with Splunk Enterprise - Demo
Getting Started with Splunk Enterprise - DemoGetting Started with Splunk Enterprise - Demo
Getting Started with Splunk Enterprise - Demo
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Endpoint Security Pres.pptx
Endpoint Security Pres.pptxEndpoint Security Pres.pptx
Endpoint Security Pres.pptx
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
The FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the DebateThe FBI vs. Apple: Framing the Debate
The FBI vs. Apple: Framing the Debate
 
Understanding forensic investigation process by G. E. Oyedokun
Understanding forensic investigation process  by G. E. OyedokunUnderstanding forensic investigation process  by G. E. Oyedokun
Understanding forensic investigation process by G. E. Oyedokun
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | Edureka
 
Phishing
PhishingPhishing
Phishing
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Splunk Architecture overview
Splunk Architecture overviewSplunk Architecture overview
Splunk Architecture overview
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 

En vedette

Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack PresentationCreditCardFinder
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Cyphort
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accountscorelink11
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case AAshley Chase
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideWasef Al-Hakim
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security BreachAlienVault
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?Edge Pereira
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].Alexander Decker
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army blackflags
 

En vedette (20)

Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack Presentation
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
Sony case study
Sony case studySony case study
Sony case study
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army
 

Similaire à Data Security Breach: The Sony & Staples Story

Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateFidelis Cybersecurity
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptRamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIan Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.pptssuser6c59cb
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and securitySomesh Kumar
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 

Similaire à Data Security Breach: The Sony & Staples Story (20)

Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Network security
Network securityNetwork security
Network security
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 

Plus de International Institute for Learning

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!International Institute for Learning
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!International Institute for Learning
 
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideThe Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideInternational Institute for Learning
 
Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...International Institute for Learning
 
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand International Institute for Learning
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...International Institute for Learning
 

Plus de International Institute for Learning (20)

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
 
PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification
 
2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR) 2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR)
 
Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business
 
Applying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in HealthcareApplying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in Healthcare
 
Global Business Etiquette
Global Business Etiquette Global Business Etiquette
Global Business Etiquette
 
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideThe Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
 
Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication
 
Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...
 
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
 
Emerging Trends in PMO Governance
Emerging Trends in PMO Governance Emerging Trends in PMO Governance
Emerging Trends in PMO Governance
 
Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server
 
Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma
 
Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!
 
Grateful Leadership
Grateful Leadership Grateful Leadership
Grateful Leadership
 
CAPM® EDGE
CAPM® EDGECAPM® EDGE
CAPM® EDGE
 
Knowledge Management Principles for Project Managers
Knowledge Management Principles for Project ManagersKnowledge Management Principles for Project Managers
Knowledge Management Principles for Project Managers
 

Dernier

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 

Dernier (20)

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 

Data Security Breach: The Sony & Staples Story

  • 1. © International Institute for Learning, Inc., All rights reserved. 1 Intelligence, Integrity and Innovation © International Institute for Learning, Inc., All rights reserved. Thank you for joining us today. This webinar is brought to you by IIL – a global leader in: Project, Program and Portfolio Management Microsoft® Project and Project Server Lean Six Sigma | Business Analysis Agile | PRINCE2® | ITIL® Leadership and Interpersonal Skills Data Security Breach The Sony & Staples Story
  • 2. © International Institute for Learning, Inc., All rights reserved. 2 Intelligence, Integrity and Innovation Global IIL Companies IIL US IIL Asia (Singapore) IIL Australia IIL Brasil IIL Canada IIL China IIL Europe (United Kingdom) IIL Finland IIL France IIL Germany IIL Hong Kong IIL Hungary IIL India IIL Japan IIL Korea (Seoul) IIL México IIL Middle East (Dubai) IIL Spain
  • 3. © International Institute for Learning, Inc., All rights reserved. 3 Intelligence, Integrity and Innovation In today’s world, companies generate and consume massive amounts of data, as a day-to-day prerequisite of doing business. This accumulated data becomes the most strategic asset of the organization and more often than not gives a competitive advantage in the market. This critical nature of data makes it the new corporate target! Data
  • 4. © International Institute for Learning, Inc., All rights reserved. 4 Intelligence, Integrity and Innovation Data security involves protecting data from the unwanted actions of unauthorized users. BUT Data security must not come at the cost of not being available when necessary. Data Security
  • 5. © International Institute for Learning, Inc., All rights reserved. 5 Intelligence, Integrity and Innovation A security breach is any incident that results in unauthorized access of data, applications, services, networks, and/or devices by perpetrators bypassing underlying security mechanisms. Security Breach
  • 6. © International Institute for Learning, Inc., All rights reserved. 6 Intelligence, Integrity and Innovation Data Breaches – Causes
  • 7. © International Institute for Learning, Inc., All rights reserved. 7 Intelligence, Integrity and Innovation “Well-meaning” insiders: who have no intention to breach but inadvertently do so because they fail to follow security policies. ‒ Lost devices ‒ Exposed data – no measures in place ‒ Poor business processes Targeted Attacks: Coordinated effort involving humans or automated software to cyber attack another individual, entity or organization. ‒ System vulnerabilities ‒ Malware ‒ Stolen credentials Data Breaches Occur Through:
  • 8. © International Institute for Learning, Inc., All rights reserved. 8 Intelligence, Integrity and Innovation Malicious insiders: who intentionally breach security policies. Terminated employees Company data stored on home computers for career progression Industrial espionage Data Breaches Occur Through:
  • 9. © International Institute for Learning, Inc., All rights reserved. 9 Intelligence, Integrity and Innovation Incursion: Hackers break into the company's network by exploiting system vulnerabilities. Discovery: The hacker maps out the organization's systems and automatically scans for confidential data. Capture: Exposed data on unprotected systems is immediately accessed. Components called root kits are surreptitiously installed on targeted systems and networks. Exfiltration: Confidential data is sent back to the hacker team. The Anatomy of a Data Breach
  • 10. © International Institute for Learning, Inc., All rights reserved. 10 Intelligence, Integrity and Innovation The Anatomy of a Data Breach
  • 11. © International Institute for Learning, Inc., All rights reserved. 11 Intelligence, Integrity and Innovation Damaged Intellectual Property: Blueprints, technical specifications, designs, launch plans Revenue Lost: Downtime Theft: Bank information, transfer codes Vandalism: False or discrediting information Ruined reputation Consequences of a Security Breach
  • 12. © International Institute for Learning, Inc., All rights reserved. 12 Intelligence, Integrity and Innovation Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Balances the competing requirements of confidentiality, integrity, and integrity with equal emphasis on each. Information Security Basics: The CIA Triad
  • 13. © International Institute for Learning, Inc., All rights reserved. 13 Intelligence, Integrity and Innovation Confidentiality is required to prevent sensitive information from reaching the wrong people. Simple ways of ensuring confidentiality: data encryption, user IDs and passwords or, for highly sensitive information, in hard- copy form only. More advanced techniques: storage on air-gapped computers, disconnected storage devices. Confidentiality
  • 14. © International Institute for Learning, Inc., All rights reserved. 14 Intelligence, Integrity and Innovation Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people. Techniques include the use of checksums and hashing. Integrity
  • 15. © International Institute for Learning, Inc., All rights reserved. 15 Intelligence, Integrity and Innovation Data is meant to be used, when needed, by those authorized to use it. Techniques implemented to implement confidentiality and integrity must not compromise on the availability of information. Availability of data can be improved through implementing redundancy, failover, RAID. Availability
  • 16. © International Institute for Learning, Inc., All rights reserved. 16 Intelligence, Integrity and Innovation Part 1: The Sony Story
  • 17. © International Institute for Learning, Inc., All rights reserved. 17 Intelligence, Integrity and Innovation It was a release of confidential data belonging to Sony Pictures Entertainment on November 24, 2014. 100 terabytes of data was stolen containing: Personal information about Sony Pictures’ employees and their families E-mails between employees Information about executive salaries at the company Copies of unreleased Sony films Sony Pictures Entertainment Hack – 2014
  • 18. © International Institute for Learning, Inc., All rights reserved. 18 Intelligence, Integrity and Innovation It is alleged that the attack was orchestrated by a group calling themselves the “Guardians of Peace” or GOP. There are alternate theories proposing that the Government of North Korea and even former Sony employees were behind the attack. By whom?
  • 19. © International Institute for Learning, Inc., All rights reserved. 19 Intelligence, Integrity and Innovation A malware called Wiper has been identified as the agent used in the attack and was responsible for destroying data on the target's hard disk (or similar storage) on systems running Microsoft® Windows. The malware comes wrapped in an executable “dropper” that installs it and supporting files. In this case, the “dropper” installs itself as a Windows service when executed. How was the Breach Orchestrated?
  • 20. © International Institute for Learning, Inc., All rights reserved. 20 Intelligence, Integrity and Innovation The malware service appears to create a network file share – which points to the location of Windows system files in the PC’s file directory structure (usually WINDOWS). It then gives unrestricted access to that share, allowing any other computer on the local network to access it. Mechanics of the Attack
  • 21. © International Institute for Learning, Inc., All rights reserved. 21 Intelligence, Integrity and Innovation The dropper then communicates with a set of IP addresses in Japan, possibly connected to Sony's corporate network. Then it shuts itself down. At some point – either based on a hard-coded time within the malware package or after some other communication with the attackers – the nasty part of the malware package gets launched. Mechanics of the Attack – II
  • 22. © International Institute for Learning, Inc., All rights reserved. 22 Intelligence, Integrity and Innovation Wiper then communicates with 3 IP addresses (one each in Italy, Poland, and Thailand) to transfer the contents of the computer. The malware starts accessing the hard drive and deleting its contents sector by sector. Once it’s complete, it suspends Windows for two hours, then reboots the computer when it wakes. At this point, the drive is completely wiped out – even making physical changes to the hard drive. Coup de Grâce
  • 23. © International Institute for Learning, Inc., All rights reserved. 23 Intelligence, Integrity and Innovation An e-mail released in the hack showed that Angelina Jolie wanted David Fincher to direct her film Cleopatra. In another e-mail, Scott Rudin referred to Jolie as "a minimally talented spoiled brat“. Several future Sony Pictures films, including Annie, Mr. Turner, Still Alice, and To Write Love on Her Arms, were also leaked. The Saucier Bits in the Stolen Data
  • 24. © International Institute for Learning, Inc., All rights reserved. 24 Intelligence, Integrity and Innovation Industry estimates that the data breach will cost Sony about Y100 billion, or $1.25 billion from: Lost business, Various compensation costs and New investments Consequences for Sony
  • 25. © International Institute for Learning, Inc., All rights reserved. 25 Intelligence, Integrity and Innovation Maybe not! But the consequences could have been lesser if: Sensitive IPR data was segregated Back-up networks were disconnected from the primary network so that back-ups are not affected. The malware was identified early by having up-to-date patches. The infected machine(s) were isolated immediately after detection. Sony had learned from the Sony 2011 PlayStation incident and educated its users on what to look out for. Could It Have Been Prevented?
  • 26. © International Institute for Learning, Inc., All rights reserved. 26 Intelligence, Integrity and Innovation Part 2: The Staples Story
  • 27. © International Institute for Learning, Inc., All rights reserved. 27 Intelligence, Integrity and Innovation Cardholder names, card numbers, expiration dates, and card verification codes of 1.16 million customer credit and debit cards used at 119 Staples locations in 35 American states. This data was stolen over a period of up to six months. Staples Data Breach 2014
  • 28. © International Institute for Learning, Inc., All rights reserved. 28 Intelligence, Integrity and Innovation It is alleged that a cybercrime gang using malware known as Anunak was behind the Staples breach. This same gang is believed to behind breaches at Sheplers (a cowboy apparel chain) and Bebe (a women's clothing retailer), as well as attacks on the Russian banking sector. By whom?
  • 29. © International Institute for Learning, Inc., All rights reserved. 29 Intelligence, Integrity and Innovation Speculation is that the malware was cascaded using one of these two methods: Method 1: Using rented computers called “BotNets”, Anunak members sent phishing e-mails to the company’s employees. The e-mails may have appeared to be from the Central Bank of the Russian Federation, but actually contained malware designed to infect the employees' computers. Method 2: A company-wide update might have pushed this malware to all PoS terminals How was the Breach Orchestrated?
  • 30. © International Institute for Learning, Inc., All rights reserved. 30 Intelligence, Integrity and Innovation The malware then infects the Point of Sale (PoS) terminals to capture the information from cards swiped on these terminals. Once the stolen card information was located the PoS’ memory, after a card swipe, it is transmitted to a programmed IP where the stolen data reaches the attackers. Mechanics of the Attack – II
  • 31. © International Institute for Learning, Inc., All rights reserved. 31 Intelligence, Integrity and Innovation The attack cost Target $148 million, and cost financial institutions $200 million. Profits fell 46 percent in the fourth quarter of 2013. Resignation of Beth M. Jacob, the company’s most senior technology officer in February, and Gregg Steinhafel, CEO and chairman of the board, in May. Consequences for Staples
  • 32. © International Institute for Learning, Inc., All rights reserved. 32 Intelligence, Integrity and Innovation This attack may have been prevented if: Secure readers for card data capture were used Encrypting of data, upstream of the POS, all the way to the payment processing host, beyond the retail store network was done No live data was stored on the PoS memory Exclusive use of chip and pin cards Prevention Methods
  • 33. © International Institute for Learning, Inc., All rights reserved. 33 Intelligence, Integrity and Innovation Data security breaches have the power to cripple a corporation and often result in large losses, both monetary and non- monetary. Techniques for preventing breaches: Stop targeted attacks through a combination of policies, patches, encryption, and isolation. Keep aligned with the global security intelligence. Actively identify the most sensitive information. Automate IT controls to prevent human errors and internal theft. Prevent data exfiltration once stolen [Isolation and Disconnection] Closing Notes
  • 34. © International Institute for Learning, Inc., All rights reserved. 34 Intelligence, Integrity and Innovation  White Paper, “Why breaches happen and what to do about it?”  2014 Sony Pictures Entertainment hack, http://en.wikipedia.org/wiki/Sony_Pictures_Entertainment_hack  Wiper Malware – A detection deep dive http://blogs.cisco.com/security/talos/wiper-malware  Inside the “wiper” malware that brought Sony Pictures to its knees http://arstechnica.com/security/2014/12/inside-the-wiper-malware- that-brought-sony-pictures-to-its-knees/  Wiper (malware) http://en.wikipedia.org/wiki/Wiper_%28malware%29  Target Hit by Credit-Card Breach http://www.wsj.com/articles/SB100014240527023047731045792667432 30242538 References:
  • 35. © International Institute for Learning, Inc., All rights reserved. 35 Intelligence, Integrity and Innovation We invite you to get a closer look at what IIL can do for you and your organization, by visiting www.iil.com or email learning@iil.com and let us know how we can meet your learning needs. Please connect with IIL Socially: Like us on: facebook.com/IIL.inc Follow us: twitter.com/IILGLOBAL Join our Discussions on LinkedIn At IIL, Our Greatest Accomplishments are Yours