SlideShare une entreprise Scribd logo
1  sur  28
Data Breaches: 
Are you next? 
What does the data say? 
Phil Agcaoili, 
VP & Chief Information Security Officer, Elavon 
ATPS Worldwide 
3rd-4th December 2014
Fear, uncertainty and 
doubt (FUD) 
…Generally a strategic attempt to 
influence perception by 
disseminating negative and 
dubious or false information… 
The term originated to 
describe disinformation tactics… 
FUD is a manifestation of the 
appeal to fear. 
Truth 
Truth is most often used to 
mean being in accord with 
fact or reality, or fidelity to 
an original or to a standard 
or ideal. 
FUD and Cyber Security 
ATPS Worldwide 
3rd-4th December 2014
Fact: Worst Travel Day of the Year 
Fiction: Worst day of the year is the Day Before Thanksgiving 
ATPS Worldwide 
3rd-4th December 2014
//Cyber Security 
The interconnection and reliance of physical 
lifeline functions over the Internet 
(cyberspace) that impacts: 
• National security, 
• Public health and safety, and/or our 
• Economic well-being 
Information 
Technology 
Sector 
Transportation 
ATPS Worldwide 
3rd-4th December 2014 
Systems 
Sector 
Commercial 
Facilities 
Sector 
Financial 
Services 
Sector 
Defense 
Industrial Base 
Sector
We are All Interconnected 
ATPS Worldwide 
3rd-4th December 2014
Heightened Concerns on 
Cyber Security 
Low Barrier of Entry 
High Damage Potential / Lucrative 
ATPS Worldwide 
3rd-4th December 2014
Cost of Data 
$102.60 
Average black market price for all 
of the data on a credit card 
$187.44 
Cost of taking control of a bank 
account 
$200K 
Average cost of cyber attach to 
SMB 
$1M-$46M 
Average cost of breach to a 
large company 
$169M 
Target breach clean-up costs 
$46M 
The Home Depot breach clean-up 
costs 
$350M-1T 
Global cost of cyber crime 
ATPS Worldwide 
3rd-4th December 2014
//Cyber Crime 
Global and growing industry 
Increasing in size and efficiency 
Targets everyone and every company 
Leveled playing field for criminal activity 
Cyber Crime Orgs 
Professional Hackers 
Spammers 
Mafia 
Military 
Terrorists 
ATPS Worldwide 
3rd-4th December 2014
//APT - Nation States Hacking 
and a Cyber Cold War 
ATPS Worldwide 
3rd-4th December 2014
What are your risks? 
Have you assessed your risks? 
ATPS Worldwide 
3rd-4th December 2014
Airlines and Airport Security 
Complex ecosystems with advanced IT infrastructures 
Real-time exchange of sensitive information 
Scan and monitor passenger flow 
Complex procedures and rules 
Security requirements 
Vulnerable to a multitude of attacks and IT-based emerging 
threats 
Information 
Technology 
Sector 
Transportation 
Systems 
Sector 
ATPS Worldwide 
3rd-4th December 2014 
Commercial 
Facilities 
Sector 
Financial 
Services 
Sector 
Defense 
Industrial Base 
Sector
Data Breaches 
ATPS Worldwide 
3rd-4th December 2014
Data Breaches 
ATPS Worldwide 
3rd-4th December 2014
Merchants Under Attack 
Credit cards 
What else must be said? 
ATPS Worldwide 
3rd-4th December 2014
Case Studies: The Facts 
Nothing new here 
All information presented is based on: 
Past incidents 
Reported cyber attacks 
ATPS Worldwide 
3rd-4th December 2014
2004 Fact: Sasser Worm and British 
Airways at Heathrow Airport 
British Airways suffered delays 
Worm hit Terminal Four at London's Heathrow Airport, 
Also affected call centers 
Written by a teenager 
ATPS Worldwide 
3rd-4th December 2014
2008 Fact: Spanair Flight 5022 
Crashed just after take off 
Over 150 people died 
Only 18 people survived 
Accident weakened Spanair's image (reputation risk) 
Crash exacerbated company’s financial difficulties 
Ceased operations in 2012 
Internal report issued by airline revealed: 
Malware infected airline's central computer system 
May have prevented detection of technical problems 
with aircraft 
Final report determined crew failure as root cause 
ATPS Worldwide 
3rd-4th December 2014
2011 Fact: Delhi’s Indira Gandhi 
International (IGI) Airport Incident 
Passenger processing system failure 
Backend server glitch 
Common Use passengers Processing System 
(CUPPS) 
Down for almost 12 hours 
Approximately 50 flights delayed 
Passengers had to be manually checked in 
Central Bureau of Investigation (CBI) of India 
Virus attack / malicious code on the system 
Used from an unknown remote location 
Someone at a remote location operated the 
system 
ATPS Worldwide 
3rd-4th December 2014
2011 Fact: Computer Virus Hits 
U.S. Drone Fleet 
Virus infected Predator and Reaper drones 
One of the US military’s most important weapons 
systems 
Virus resisted multiple efforts to remove it 
Remote cockpits are not connected to the Internet 
Virus believed to have spread through removable drives 
ATPS Worldwide 
3rd-4th December 2014
2014 Facts: Infected Belgian 
Charleroi Airport Servers 
Belgian Charleroi airport network servers infected with 
malware 
Turned them into botnet zombies 
Airport and customer data stolen 
ATPS Worldwide 
3rd-4th December 2014
ATPS Worldwide 
3rd-4th December 2014
2014 Fact: Account Backdoors on Airport 
Scanners, Default Passwords 
Blackhat 2014 
Backdoor accounts present in airport scanners 
Many machines deployed at airport security 
checkpoints have embedded accounts with 
default passwords that can be abused 
Attackers may be able to use the accounts as a 
backdoor to get access to the system 
ATPS Worldwide 
3rd-4th December 2014 
Via Billy Rios
2014 Fact: More Backdoors 
FTP, Telnet, and Web hardcoded backdoors 
~6000 on Internet at major airports 
Foreign made 
ATPS Worldwide 
3rd-4th December 2014 
Via Billy Rios
2014 Fact: More Backdoors 
Multiple backdoor accounts 
ATPS Worldwide 
3rd-4th December 2014 
Via Billy Rios
Internet of Things (IoT) 
Embedded systems 
Devices with an IP stack 
May or may not be connected to the Internet 
Think smartphones 
Drones 
ATPS Worldwide 
3rd-4th December 2014
Address Cyber Security Now 
Raise visibility to senior leadership and Board of 
Directors 
Use a Cyber Risk Framework 
Invest in Cyber Security 
Risk Management NIST CSF 
ATPS Worldwide 
3rd-4th December 2014
Your Responsibility 
Ensure Basic Cyber Hygiene 
It’s Everyone’s Responsibility 
Airlines focus: 
Defense in-depth and anti-malware programs 
Follow the money 
Trust, but Verify 
Especially with embedded devices 
Supply chain 
Vendor Management / Third Party Security 
Overall security 
Hardcoded backdoors 
Participate in an Information Sharing & Analysis Center (ISAC) 
ATPS Worldwide 
3rd-4th December 2014
ATPS Worldwide 
3rd-4th December 2014 
Thanks 
Phil Agcaoili 
VP & Chief Information Security Officer, Elavon 
Contributor, NIST Cybersecurity Framework version 1 
Co-Founder & Board Member, Southern CISO Security Council 
Distinguished Fellow and Fellows Chairman, Ponemon Institute 
Founding Member, Cloud Security Alliance (CSA) 
Inventor & Co-Author, CSA Cloud Controls Matrix, 
GRC Stack, Security, Trust and Assurance Registry (STAR), and 
CSA Open Certification Framework (OCF) 
@hacksec 
https://www.linkedin.com/in/philA

Contenu connexe

Tendances

Tendances (20)

A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle EastCybercrime Legislation in the Middle East
Cybercrime Legislation in the Middle East
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 

Similaire à Data Breaches. Are you next? What does the data say?

Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptPriyalPatel158383
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
How safe and reliable are information systems?
How safe and reliable are information systems?How safe and reliable are information systems?
How safe and reliable are information systems?blogzilla
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident responseBrian Honan
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptMohammedAliShakil
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...ForgeRock
 
Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 

Similaire à Data Breaches. Are you next? What does the data say? (20)

Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
How safe and reliable are information systems?
How safe and reliable are information systems?How safe and reliable are information systems?
How safe and reliable are information systems?
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
ICS CERT- Incidence Reports
ICS CERT- Incidence ReportsICS CERT- Incidence Reports
ICS CERT- Incidence Reports
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Plus de Phil Agcaoili

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoisePhil Agcaoili
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the MinePhil Agcaoili
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingPhil Agcaoili
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingPhil Agcaoili
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?Phil Agcaoili
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...Phil Agcaoili
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Phil Agcaoili
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityPhil Agcaoili
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for SecurityPhil Agcaoili
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryPhil Agcaoili
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Phil Agcaoili
 

Plus de Phil Agcaoili (20)

Cybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the NoiseCybersecurity Market 2020 - Bring the Noise
Cybersecurity Market 2020 - Bring the Noise
 
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
4th Industrial Revolution (4IR) - Cyber Canaries Get Out of the Mine
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
OWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter MeetingOWASP Knoxville Inaugural Chapter Meeting
OWASP Knoxville Inaugural Chapter Meeting
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?2014 - KSU - So You Want to Be in Cyber Security?
2014 - KSU - So You Want to Be in Cyber Security?
 
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
 
Moneysec - Moneyball for Security
Moneysec - Moneyball for SecurityMoneysec - Moneyball for Security
Moneysec - Moneyball for Security
 
IAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 FebruaryIAPP Atlanta Chapter Meeting 2013 February
IAPP Atlanta Chapter Meeting 2013 February
 
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
Cloud Security Alliance (CSA) Chapter Meeting Atlanta 082312
 

Dernier

💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 

Dernier (20)

💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 

Data Breaches. Are you next? What does the data say?

  • 1. Data Breaches: Are you next? What does the data say? Phil Agcaoili, VP & Chief Information Security Officer, Elavon ATPS Worldwide 3rd-4th December 2014
  • 2. Fear, uncertainty and doubt (FUD) …Generally a strategic attempt to influence perception by disseminating negative and dubious or false information… The term originated to describe disinformation tactics… FUD is a manifestation of the appeal to fear. Truth Truth is most often used to mean being in accord with fact or reality, or fidelity to an original or to a standard or ideal. FUD and Cyber Security ATPS Worldwide 3rd-4th December 2014
  • 3. Fact: Worst Travel Day of the Year Fiction: Worst day of the year is the Day Before Thanksgiving ATPS Worldwide 3rd-4th December 2014
  • 4. //Cyber Security The interconnection and reliance of physical lifeline functions over the Internet (cyberspace) that impacts: • National security, • Public health and safety, and/or our • Economic well-being Information Technology Sector Transportation ATPS Worldwide 3rd-4th December 2014 Systems Sector Commercial Facilities Sector Financial Services Sector Defense Industrial Base Sector
  • 5. We are All Interconnected ATPS Worldwide 3rd-4th December 2014
  • 6. Heightened Concerns on Cyber Security Low Barrier of Entry High Damage Potential / Lucrative ATPS Worldwide 3rd-4th December 2014
  • 7. Cost of Data $102.60 Average black market price for all of the data on a credit card $187.44 Cost of taking control of a bank account $200K Average cost of cyber attach to SMB $1M-$46M Average cost of breach to a large company $169M Target breach clean-up costs $46M The Home Depot breach clean-up costs $350M-1T Global cost of cyber crime ATPS Worldwide 3rd-4th December 2014
  • 8. //Cyber Crime Global and growing industry Increasing in size and efficiency Targets everyone and every company Leveled playing field for criminal activity Cyber Crime Orgs Professional Hackers Spammers Mafia Military Terrorists ATPS Worldwide 3rd-4th December 2014
  • 9. //APT - Nation States Hacking and a Cyber Cold War ATPS Worldwide 3rd-4th December 2014
  • 10. What are your risks? Have you assessed your risks? ATPS Worldwide 3rd-4th December 2014
  • 11. Airlines and Airport Security Complex ecosystems with advanced IT infrastructures Real-time exchange of sensitive information Scan and monitor passenger flow Complex procedures and rules Security requirements Vulnerable to a multitude of attacks and IT-based emerging threats Information Technology Sector Transportation Systems Sector ATPS Worldwide 3rd-4th December 2014 Commercial Facilities Sector Financial Services Sector Defense Industrial Base Sector
  • 12. Data Breaches ATPS Worldwide 3rd-4th December 2014
  • 13. Data Breaches ATPS Worldwide 3rd-4th December 2014
  • 14. Merchants Under Attack Credit cards What else must be said? ATPS Worldwide 3rd-4th December 2014
  • 15. Case Studies: The Facts Nothing new here All information presented is based on: Past incidents Reported cyber attacks ATPS Worldwide 3rd-4th December 2014
  • 16. 2004 Fact: Sasser Worm and British Airways at Heathrow Airport British Airways suffered delays Worm hit Terminal Four at London's Heathrow Airport, Also affected call centers Written by a teenager ATPS Worldwide 3rd-4th December 2014
  • 17. 2008 Fact: Spanair Flight 5022 Crashed just after take off Over 150 people died Only 18 people survived Accident weakened Spanair's image (reputation risk) Crash exacerbated company’s financial difficulties Ceased operations in 2012 Internal report issued by airline revealed: Malware infected airline's central computer system May have prevented detection of technical problems with aircraft Final report determined crew failure as root cause ATPS Worldwide 3rd-4th December 2014
  • 18. 2011 Fact: Delhi’s Indira Gandhi International (IGI) Airport Incident Passenger processing system failure Backend server glitch Common Use passengers Processing System (CUPPS) Down for almost 12 hours Approximately 50 flights delayed Passengers had to be manually checked in Central Bureau of Investigation (CBI) of India Virus attack / malicious code on the system Used from an unknown remote location Someone at a remote location operated the system ATPS Worldwide 3rd-4th December 2014
  • 19. 2011 Fact: Computer Virus Hits U.S. Drone Fleet Virus infected Predator and Reaper drones One of the US military’s most important weapons systems Virus resisted multiple efforts to remove it Remote cockpits are not connected to the Internet Virus believed to have spread through removable drives ATPS Worldwide 3rd-4th December 2014
  • 20. 2014 Facts: Infected Belgian Charleroi Airport Servers Belgian Charleroi airport network servers infected with malware Turned them into botnet zombies Airport and customer data stolen ATPS Worldwide 3rd-4th December 2014
  • 21. ATPS Worldwide 3rd-4th December 2014
  • 22. 2014 Fact: Account Backdoors on Airport Scanners, Default Passwords Blackhat 2014 Backdoor accounts present in airport scanners Many machines deployed at airport security checkpoints have embedded accounts with default passwords that can be abused Attackers may be able to use the accounts as a backdoor to get access to the system ATPS Worldwide 3rd-4th December 2014 Via Billy Rios
  • 23. 2014 Fact: More Backdoors FTP, Telnet, and Web hardcoded backdoors ~6000 on Internet at major airports Foreign made ATPS Worldwide 3rd-4th December 2014 Via Billy Rios
  • 24. 2014 Fact: More Backdoors Multiple backdoor accounts ATPS Worldwide 3rd-4th December 2014 Via Billy Rios
  • 25. Internet of Things (IoT) Embedded systems Devices with an IP stack May or may not be connected to the Internet Think smartphones Drones ATPS Worldwide 3rd-4th December 2014
  • 26. Address Cyber Security Now Raise visibility to senior leadership and Board of Directors Use a Cyber Risk Framework Invest in Cyber Security Risk Management NIST CSF ATPS Worldwide 3rd-4th December 2014
  • 27. Your Responsibility Ensure Basic Cyber Hygiene It’s Everyone’s Responsibility Airlines focus: Defense in-depth and anti-malware programs Follow the money Trust, but Verify Especially with embedded devices Supply chain Vendor Management / Third Party Security Overall security Hardcoded backdoors Participate in an Information Sharing & Analysis Center (ISAC) ATPS Worldwide 3rd-4th December 2014
  • 28. ATPS Worldwide 3rd-4th December 2014 Thanks Phil Agcaoili VP & Chief Information Security Officer, Elavon Contributor, NIST Cybersecurity Framework version 1 Co-Founder & Board Member, Southern CISO Security Council Distinguished Fellow and Fellows Chairman, Ponemon Institute Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author, CSA Cloud Controls Matrix, GRC Stack, Security, Trust and Assurance Registry (STAR), and CSA Open Certification Framework (OCF) @hacksec https://www.linkedin.com/in/philA

Notes de l'éditeur

  1. In 2013, they were July 18, 25, and 11, according to airport operations data from the FAA. Those were the three consecutive Thursdays following US Independence Day on July 4th (which was the 21st least-busiest day to fly). The day before Thanksgiving, if you were wondering, ranks 27th. The Friday before Christmas—Dec 20—was the busiest winter day in 2013, ranking 4th overall. This year the Friday before Christmas is Dec 19.
  2. When you see incidents in the news…