SlideShare une entreprise Scribd logo
1  sur  23
Verizon Data Breach Report “Know Your Enemy” Edition Originally prepared for InfraGard Honolulu Chapter May 3, 2011 Beau Monday, CISSP GSEC Information Security Officer @ HawaiianTel
Disclosures ,[object Object],[object Object]
History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Sources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Things to keep in mind ,[object Object],[object Object]
Demographics – by Sector
Demographics – by Org Size ,[object Object],[object Object]
Threat Agents ,[object Object],[object Object]
Threat Agent Trends ,[object Object]
Who are the (external) bad guys? ,[object Object]
Who are the (internal) bad guys? ,[object Object],[object Object],[object Object]
Threat Categories ,[object Object],[object Object]
Malware
Malware Customization
Hacking Methodologies
Attack Pathways
Social Engineering Trends ,[object Object]
Physical Attacks ,[object Object],[object Object]
Recommendations ,[object Object]
Recommendations (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recommendations (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recommendations (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References & Contact Info ,[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Similaire à Know Your Enemy: Verizon Data Breach Report

Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Zeno Idzerda
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxhealdkathaleen
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
 
Running head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docx
Running head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docxRunning head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docx
Running head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docxtoltonkendal
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersDeborah Osborne
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - FranceBee_Ware
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxhealdkathaleen
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docxtodd271
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 

Similaire à Know Your Enemy: Verizon Data Breach Report (20)

Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
Hpesp wp ponemon_costofcybercrimestudy2012_unitedstates(1)
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docx
Running head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docxRunning head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docx
Running head POLICE ORGANIZATIONAL STRUCTURE AND OPERATIONSPOLI.docx
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
2013 cost of data breach study - France
2013 cost of data breach study - France2013 cost of data breach study - France
2013 cost of data breach study - France
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Running head CRIME ANALYSIS .docx
Running head CRIME ANALYSIS                                     .docxRunning head CRIME ANALYSIS                                     .docx
Running head CRIME ANALYSIS .docx
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 

Know Your Enemy: Verizon Data Breach Report

Notes de l'éditeur

  1. Focused on who the bad guys are and what they are exploiting.
  2. Most of NHTCU’s time was spent taking down a huge child porn ring and taking down botnets, so they are not actually included in the 2010 stats. They are laser focused on high value targets, and don’t investigate a large volume of cases.
  3. Top3 remain the same, just shuffle places (Fin was 1 st last year, then hosp, then retail). Have to keep in mind that the 2009 dataset was only 141 breaches. So, while Government sector is the same 4% of the total as it was in 2009, the number of breaches there actually quadrupled from 6 to 27.
  4. Again, dataset size is deceiving here. While the percentage of breaches overwhelmingly seemed to target SMBs, the number of breaches by companies of 1000+ employees still doubled since last year. This graph actually trends closely with the size of businesses in the United States overall.
  5. Only 3 partner-related incidents this year. 1 was a deliberate act, 2 were unintentional. Our long-fought battle with malicious insiders is finally won, right? Not so fast.
  6. While the percentage of insider breaches was down, the actual number of incidents doubled. Decline in partner-contributing breaches appear to be genuine, which is a good thing.
  7. Eastern Europe was still top dog in last year’s report, but only by a margin of 21% to USA’s 19%. Shows marked rise in criminal groups based in Eastern Europe.
  8. Infection vectors and functionality. Trend continues to focus on exfiltration capabilities and remote access. The 79% exfiltration and 78% backdoor represent huge jumps from last year (32% and 36%, respectively)
  9. 18% of malware investigated by Verizon was completely custom, and two-thirds was customized to some degree, mostly to avoid AV detection.
  10. Web application vulns fell to 3 rd place, from it’s traditional 1 st place spot, but if you take out the hosp and retail verticals, web applications are back on top and more prevalent than ever.
  11. Wait – IN PERSON?? Email was the favorite MO last year, but criminals have gotten personal it seems
  12. Skimming operations are becoming more organized and sophisticated. Sprees can target 50-100 businesses at a time
  13. Remote access channels are increasingly a favorite target. With the proliferation of cloud-type offerings like GoToMyPC, do you really know what remote access capabilities you have in your environment? Data exfiltration continues to be the primary goal of most intruders.
  14. Log management: reducing time to discovery is critical in limiting the damage intruders can inflict on your organization.
  15. Many companies don’t know what to do when they suspect a problem. Users clicking on hostile attachments is still a problem (see: RSA). Don’t neglect educating employees on social engineering tactics that involve a personal contact.