FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

15
NOW WHAT? BEFORE AND AFTER THE BREACH JAMEY DILLON / JIM ALDRIDGE MANDIANT

Transcript of FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

Page 1: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

NOW WHAT?BEFORE AND AFTER THE BREACHJAMEY DILLON / JIM ALDRIDGEMANDIANT

Page 2: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

INTRODUCTIONS

2

Jamey DillonDirector, Mandiant Consulting ServicesBackground:• Security Program Development• Security Operations

Jim AldridgeDirector, Mandiant Consulting ServicesBackground:• Incident Responder• Penetration Tester

Page 3: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

CHALLENGE

3

Average cost of a data breach (US): $6.5mAverage cost-per-record breached (US): $217(Source: Ponemon Institute 2015 – under 100k records)

Page 4: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

ACTION ITEMS

4

1. Recognize the business impact2. Own the risk3. Educate stakeholders4. Prepare the organization for the breach

Page 5: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

INCIDENT IMPACTS

5

Quantifiable• Loss of business• Loss of market share• Cost of incident response effort – technical, legal, marketing, remediation• Fines / class action lawsuits / FTC action• Credit monitoring• Security team / executive re-alignments

Recognize the business impact.

Page 6: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

INCIDENT IMPACTS

6

Difficult to measure• Disclosure to customers, partners, interested government

agencies • Loss of intellectual property• National security ramifications

Recognize the business impact.

Page 7: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

INCIDENT IMPACTS

7

Intangibles• Consumer confidence• Public perception

Recognize the business impact.

Page 8: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

BIG PICTURE

8

Direct, proactive engagement• Are we prepared?• Are we protected?• Are we compromised?

Own the risk.

Page 9: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

SPEAK THEIR LANGUAGE

9

You cannot afford to focus just on the business of Cyber Security or Information Technology• Understand the needs of the Company, Business Units and

Services Organizations

•Determine what data you need to be successful and protect it

•Work collaboratively

•Enable the business through securityEducate stakeholders.

Page 10: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

SPEAK THEIR LANGUAGE

10

Elevate the communication of risk and security from ‘Geek Speak’ to ‘Exec Speak’• Don’t attempt to scare the audience, educate them

• Cyber Security Leaders have to elevate their communications to equal the new level of visibility• NOTE: There is no fancy Star Trek Translation Device for this

• Speak their language – Cyber Security Risk = ($$ + Long Term Impact)• Brand Reputation, Consumer Awareness, Penalties, Impacts to

Corporate Growth, High Cost to Respond Educate stakeholders.

Page 11: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

ARE WE PREPARED?

11

• Incident response plan• People: skillsets, organizational structure• Risks: where are they?• Visibility, agility and collaboration between internal teams• Security operations and response processes

Prepare organization for the breach.

Page 12: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

ARE WE PROTECTED?

12

• Security controls • Visibility• Testing and validation• Metrics and reporting

Prepare organization for the breach.

Page 13: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

ARE WE COMPROMISED?

13

• Ongoing procedures to identify unknown intrusions• Are we executing the plan?• Do we have the right people in place? • Are we escalating and communicating effectively?

Prepare organization for the breach.

Page 14: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

NOW WHAT?

14

When the breach occurs• Prior to declaring an incident• When convening the IR team• Managing stakeholder expectations throughout the response

Page 15: FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach

THANK YOU