SlideShare a Scribd company logo
Thrive. Grow. Achieve.
IT Security – What
You Need to Know
Nate Solloway, CEH, CSA
March 24. 2014
WHAT’S ON TAP?
• Passing the Security Portion of Your Financial Audit
• Assessing Security Vulnerabilities
• Security in the Cloud
• Privacy Laws
• Q&A
2
WHO’S A CFO? RAISE YOUR HAND
3
Computer
Operations
Are system and application data backed
up? What is the frequency?
How and where are the backups stored?
What is the frequency in which backups
are tested?
What restrictions are placed, if any, to
access to the computer room and any
computer equipment,
telecommunication equipment and data
files?
To what extent is the computer room and any computer equipment,
telecommunication equipment and data files protected from
environmental hazards?
To what extent are security management practices in place to support
the IT functions and infrastructure?
How are modifications to user access privileges performed and
authorized?
How is IT security monitored? To what extent are logs of security
activity created and maintained?
Are User IDs and passwords used for individual user authentication to
gain access to the company applications and financial systems?
Do user passwords require strong complexity controls (i.e.: length,
expiration, history, sessions, timeouts, and special restrictions).
Does the client have access to the source code for any accounting
system modifications made for them?
4
ASSESSING VULNERABILITIES
5
VULNERABILITY MAPPING VS. PENETRATION TESTING
TOOLS ARE AWESOME, BUT….
AUTOMATED SCRIPTS, FALSE POSITIVES
HOW MUCH INTELLIGENCE DO YOU NEED?
HOW THE BAD GUYS EXPLOIT THEM
6
MANUAL VULNERABILITY MAPPING
7
LET’S GOOGLE THAT
8
BUT EXPLOITING IS HARD, RIGHT?
9
COMMON VULNERABILITIES
10
OPEN PORTS
PEOPLE
LAZY SOFTWARE PATCHING
PEOPLE
OUT DATE AV/IDS
PEOPLE
LAZY PROCESSES FOR CRITICAL AUTHENTICATION (BANKS,
TRANSFERS)
PEOPLE
CLIENT SIDE VULNERABILITIES
CLIENT SIDE VULNERABILITIES ARE NOT ALWAYS EASY TO IDENTIFY.
SOME COMMON CLIENT SIDE ATTACK AGENTS INCLUDE:
- ADOBE READER
- WINZIP
- ITUNES
- INTERNET EXPLORER
- FIREFOX
- SAFARI
- ADOBE FLASH PLAYER
11
WHAT IS PENETRATION TESTING?
BLACK BOX
- APPROACHING THINGS JUST LIKE AN UNIFORMED ATTACKER
- REQUIRES NO REVELATION OF SECURITY
WHITE BOX
- USING KNOWLEDGE OF THE SYSTEMS TO ELABORATE TEST
CASES
- PROVIDES AS MUCH INFORMATION AS POSSIBLE TO THE
PENETRATION TEST TO THAT THEY CAN GAIN INSIGHT AND
CREATE TESTS
HOST BASED ASSESSMENTS
- MAKE A COPY OF YOUR SERVERS. TEST ON THEM WITH FULL
ACCESS LOOKING FOR VULNERABILITIES
12
WHAT DOES A REPORT DELIVER?
A SECURITY ASSESSMENT DELIVERS A REPORT THAT
• HELPS EXECUTIVES MAKE DECISIONS ON IMPLEMENTING
SECURITY CONTROLS
• HELP THE IT TEAM IMPLEMENT CONTROLS AND PATCH FLAWS
DISCOVERED DURING TESTING
• LOW
• MED
• HIGH
• SERIOUS
• CRITICAL
13
SECURITY IS A BUSINESS DECISION
14
RISK IS A BUSINESS DECISION
15
WHAT’S MY RISK?
DOWNTIME?
REPUTATION?
$$$ ?
16
PRIVACY (GAPP)
PERSONAL INFORMATION COLLECTED ON EMPLOYEES
• NAME
• ADDRESS
• PHONE NUMBERS
• SOCIAL SECURITY NUMBER
• BANK ACCOUNT AND ROUTING NUMBERS.
17
EXTERNAL DATA COLLECTION
NAMES
• ADDRESSES OR GEOGRAPHIC IDENTIFIERS SMALLER THAN A STATE
• PHONE NUMBERS
• FAX NUMBERS
• EMAIL ADDRESSES
• SOCIAL SECURITY NUMBERS
• CREDIT CARD ACCOUNT NUMBERS
• WEB ADDRESSES
• PHOTOGRAPHIC IMAGES
18
WHAT’S A BREACH?
FIRST NAME OR FIRST INITIAL AND LAST NAME IN COMBINATION WITH
ANY OF THE FOLLOWING
• SOCIAL SECURITY NUMBER
• HOME ADDRESS
• EMAIL ADDRESS
• PHONE NUMBERS
• CREDIT CARD ACCOUNT NUMBERS
19
INCIDENTS REQUIRING NOTIFICATION
• A USER (EMPLOYEE, CONTRACTOR OR THIRD PARTY PROVIDER)
HAS OBTAINED UNAUTHORIZED ACCESS TO
PERSONAL INFORMATION MAINTAINED IN EITHER PAPER OR
ELECTRONIC FORM
• AN INTRUDER HAS ACCESSED DATABASE(S) SUCH AS THAT
CONTAIN PERSONAL INFORMATION ON AN INDIVIDUAL.
• COMPUTER EQUIPMENT SUCH AS A WORKSTATION, LAPTOP, CD-
ROM OR OTHER ELECTRONIC MEDIA CONTAINING PERSONAL
INFORMATION ON AN INDIVIDUAL HAS BEEN LOST OR STOLEN.
• A DEPARTMENT OR UNIT HAS NOT PROPERLY DISPOSED OF
RECORDS CONTAINING PERSONAL INFORMATION ABOUT AN
INDIVIDUAL.
• A THIRD-PARTY SERVICE PROVIDER HAS EXPERIENCED ANY OF THE
INCIDENTS ABOVE, AFFECTING THE ORGANIZATION’S
DATACONTAINING PERSONAL INFORMATION.
20
STATES REQUIRING NOTIFICATION
21
22
MINIMIZING OPEN PORTS
- FEWER SERVICES?
- MAYBE THE CLOUD
PEOPLE
- LET’S GET BACK TO THIS ONE
AGGRESSIVE SOFTWARE PATCHING
- SERVERS
- WORKSTATIONS
- APPS
AV VS IDS
AUTHENTICATION
PEOPLE
QUESTIONS?
23
Seth Zarny – Partner
szarny@raffa.com
Nate Solloway – Manager
nsolloway@raffa.com

More Related Content

PDF
2016-09-14 IT Security What You Need to Know
PDF
2017-03-30 IT Security - What You Need To Know
PDF
2015-06-16 IT Security - What You Need to Know
PDF
2018 5-8 IT Security - What You Need to Know
PDF
Facts about computer forensic investigator
PPTX
Computer forensics powerpoint presentation
PPTX
Computer Hacking by Rudy
PPTX
Data validation using CDR (Call Detail Records) and real cell tower coverage
2016-09-14 IT Security What You Need to Know
2017-03-30 IT Security - What You Need To Know
2015-06-16 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know
Facts about computer forensic investigator
Computer forensics powerpoint presentation
Computer Hacking by Rudy
Data validation using CDR (Call Detail Records) and real cell tower coverage

What's hot (18)

PPT
Computer Forensics
PDF
Your've Been Hacked in Florida! Now What?
PPTX
Draft current state of digital forensic and data science
DOC
cv_Bodenmann
PPTX
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
PDF
Computer forensics investigation and digital forensics services
PPT
Cyber crimes
PPT
Roadshow2013 revised 2 - miis
PPT
Social Engineering | #ARMSec2015
PPT
E Commerce Trends In Israel
PPTX
Hacking ppt
DOCX
Lab 1a computer forensic specialist
PPTX
Lect 4 computer forensics
PPTX
Digital&computforensic
PPTX
Cyber Security for Teenagers/Students
PPTX
Lect 2 computer forensics
PPTX
Data security 1
PPT
Computer hacking
Computer Forensics
Your've Been Hacked in Florida! Now What?
Draft current state of digital forensic and data science
cv_Bodenmann
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Computer forensics investigation and digital forensics services
Cyber crimes
Roadshow2013 revised 2 - miis
Social Engineering | #ARMSec2015
E Commerce Trends In Israel
Hacking ppt
Lab 1a computer forensic specialist
Lect 4 computer forensics
Digital&computforensic
Cyber Security for Teenagers/Students
Lect 2 computer forensics
Data security 1
Computer hacking
Ad

Similar to 2015-03-24 IT Security - What You Need to Know (20)

PDF
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
PPTX
Protecting Client Data 11.09.11
PPTX
The Target Breach - Follow The Money EU
PDF
Security and Compliance
PDF
Target data breach case study
PPTX
Cybercrime and the Hidden Perils of Patient Data
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PPTX
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
PPTX
Trends in electronic crimes and its impact on businesses like yours
PPTX
Kaseya Kaspersky Breaches
PPT
Oath appsec sf 2015 dem rev. 2
PPT
Strong Authentication - Open Source
PPTX
Social engineering
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPTX
Contracting for Better Cybersecurity
PPTX
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
PDF
Fall2015SecurityShow
PPTX
Hacker risks presentation to ACFE PR Chapter
Lunch and Learn: Patterns of Fraud - Your Blueprint to Prevention
Protecting Client Data 11.09.11
The Target Breach - Follow The Money EU
Security and Compliance
Target data breach case study
Cybercrime and the Hidden Perils of Patient Data
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Trends in electronic crimes and its impact on businesses like yours
Kaseya Kaspersky Breaches
Oath appsec sf 2015 dem rev. 2
Strong Authentication - Open Source
Social engineering
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Lecture 6 Cybersecurity-Basics and .pptx
Contracting for Better Cybersecurity
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Fall2015SecurityShow
Hacker risks presentation to ACFE PR Chapter
Ad

More from Raffa Learning Community (20)

PDF
2018-11-29 Intacct for Nonprofits
PDF
2018-11-15 IT Assessment
PDF
2018-11-15 Compliance Issues
PDF
2018-11-8 The Changing Role of Today's CIO
PDF
2018-9-26 Federal Funding
PDF
2018-09-25 Sage Intacct for Nonprofits
PDF
2018 09-13 it essentials disaster recovery vs. business continuity
PDF
2018-09-20 Accounting Systems Comparison Seminar
PPTX
2018-09-06 FASB ASC 606 - Revenue Recognition
PDF
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
PDF
2018-07 FSG BI360 Improve Your Annual Budget Seminar
PDF
2018 06-27 How to Accelerate the Month-End Close
PDF
2018 06-12 The Changing Role of the CIO
PDF
2018-05-31 A New Look for Nonprofits
PDF
4-25 18 Blind Spots: The Art of Self Awareness
PDF
2018 4-23 The Changing Role of Today's CIO
PDF
2018 04-17 How Much Should My Nonprofit Target for Reserves?
PDF
2018 03-27 Effective Corporate Performance Management Best Practices
PDF
2018 3-14 The Changing Role of Today's CIO
PPTX
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018-11-29 Intacct for Nonprofits
2018-11-15 IT Assessment
2018-11-15 Compliance Issues
2018-11-8 The Changing Role of Today's CIO
2018-9-26 Federal Funding
2018-09-25 Sage Intacct for Nonprofits
2018 09-13 it essentials disaster recovery vs. business continuity
2018-09-20 Accounting Systems Comparison Seminar
2018-09-06 FASB ASC 606 - Revenue Recognition
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018 06-27 How to Accelerate the Month-End Close
2018 06-12 The Changing Role of the CIO
2018-05-31 A New Look for Nonprofits
4-25 18 Blind Spots: The Art of Self Awareness
2018 4-23 The Changing Role of Today's CIO
2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 03-27 Effective Corporate Performance Management Best Practices
2018 3-14 The Changing Role of Today's CIO
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!

2015-03-24 IT Security - What You Need to Know

  • 1. Thrive. Grow. Achieve. IT Security – What You Need to Know Nate Solloway, CEH, CSA March 24. 2014
  • 2. WHAT’S ON TAP? • Passing the Security Portion of Your Financial Audit • Assessing Security Vulnerabilities • Security in the Cloud • Privacy Laws • Q&A 2
  • 3. WHO’S A CFO? RAISE YOUR HAND 3 Computer Operations Are system and application data backed up? What is the frequency? How and where are the backups stored? What is the frequency in which backups are tested? What restrictions are placed, if any, to access to the computer room and any computer equipment, telecommunication equipment and data files?
  • 4. To what extent is the computer room and any computer equipment, telecommunication equipment and data files protected from environmental hazards? To what extent are security management practices in place to support the IT functions and infrastructure? How are modifications to user access privileges performed and authorized? How is IT security monitored? To what extent are logs of security activity created and maintained? Are User IDs and passwords used for individual user authentication to gain access to the company applications and financial systems? Do user passwords require strong complexity controls (i.e.: length, expiration, history, sessions, timeouts, and special restrictions). Does the client have access to the source code for any accounting system modifications made for them? 4
  • 5. ASSESSING VULNERABILITIES 5 VULNERABILITY MAPPING VS. PENETRATION TESTING TOOLS ARE AWESOME, BUT…. AUTOMATED SCRIPTS, FALSE POSITIVES HOW MUCH INTELLIGENCE DO YOU NEED?
  • 6. HOW THE BAD GUYS EXPLOIT THEM 6
  • 9. BUT EXPLOITING IS HARD, RIGHT? 9
  • 10. COMMON VULNERABILITIES 10 OPEN PORTS PEOPLE LAZY SOFTWARE PATCHING PEOPLE OUT DATE AV/IDS PEOPLE LAZY PROCESSES FOR CRITICAL AUTHENTICATION (BANKS, TRANSFERS) PEOPLE
  • 11. CLIENT SIDE VULNERABILITIES CLIENT SIDE VULNERABILITIES ARE NOT ALWAYS EASY TO IDENTIFY. SOME COMMON CLIENT SIDE ATTACK AGENTS INCLUDE: - ADOBE READER - WINZIP - ITUNES - INTERNET EXPLORER - FIREFOX - SAFARI - ADOBE FLASH PLAYER 11
  • 12. WHAT IS PENETRATION TESTING? BLACK BOX - APPROACHING THINGS JUST LIKE AN UNIFORMED ATTACKER - REQUIRES NO REVELATION OF SECURITY WHITE BOX - USING KNOWLEDGE OF THE SYSTEMS TO ELABORATE TEST CASES - PROVIDES AS MUCH INFORMATION AS POSSIBLE TO THE PENETRATION TEST TO THAT THEY CAN GAIN INSIGHT AND CREATE TESTS HOST BASED ASSESSMENTS - MAKE A COPY OF YOUR SERVERS. TEST ON THEM WITH FULL ACCESS LOOKING FOR VULNERABILITIES 12
  • 13. WHAT DOES A REPORT DELIVER? A SECURITY ASSESSMENT DELIVERS A REPORT THAT • HELPS EXECUTIVES MAKE DECISIONS ON IMPLEMENTING SECURITY CONTROLS • HELP THE IT TEAM IMPLEMENT CONTROLS AND PATCH FLAWS DISCOVERED DURING TESTING • LOW • MED • HIGH • SERIOUS • CRITICAL 13
  • 14. SECURITY IS A BUSINESS DECISION 14
  • 15. RISK IS A BUSINESS DECISION 15
  • 17. PRIVACY (GAPP) PERSONAL INFORMATION COLLECTED ON EMPLOYEES • NAME • ADDRESS • PHONE NUMBERS • SOCIAL SECURITY NUMBER • BANK ACCOUNT AND ROUTING NUMBERS. 17
  • 18. EXTERNAL DATA COLLECTION NAMES • ADDRESSES OR GEOGRAPHIC IDENTIFIERS SMALLER THAN A STATE • PHONE NUMBERS • FAX NUMBERS • EMAIL ADDRESSES • SOCIAL SECURITY NUMBERS • CREDIT CARD ACCOUNT NUMBERS • WEB ADDRESSES • PHOTOGRAPHIC IMAGES 18
  • 19. WHAT’S A BREACH? FIRST NAME OR FIRST INITIAL AND LAST NAME IN COMBINATION WITH ANY OF THE FOLLOWING • SOCIAL SECURITY NUMBER • HOME ADDRESS • EMAIL ADDRESS • PHONE NUMBERS • CREDIT CARD ACCOUNT NUMBERS 19
  • 20. INCIDENTS REQUIRING NOTIFICATION • A USER (EMPLOYEE, CONTRACTOR OR THIRD PARTY PROVIDER) HAS OBTAINED UNAUTHORIZED ACCESS TO PERSONAL INFORMATION MAINTAINED IN EITHER PAPER OR ELECTRONIC FORM • AN INTRUDER HAS ACCESSED DATABASE(S) SUCH AS THAT CONTAIN PERSONAL INFORMATION ON AN INDIVIDUAL. • COMPUTER EQUIPMENT SUCH AS A WORKSTATION, LAPTOP, CD- ROM OR OTHER ELECTRONIC MEDIA CONTAINING PERSONAL INFORMATION ON AN INDIVIDUAL HAS BEEN LOST OR STOLEN. • A DEPARTMENT OR UNIT HAS NOT PROPERLY DISPOSED OF RECORDS CONTAINING PERSONAL INFORMATION ABOUT AN INDIVIDUAL. • A THIRD-PARTY SERVICE PROVIDER HAS EXPERIENCED ANY OF THE INCIDENTS ABOVE, AFFECTING THE ORGANIZATION’S DATACONTAINING PERSONAL INFORMATION. 20
  • 22. 22 MINIMIZING OPEN PORTS - FEWER SERVICES? - MAYBE THE CLOUD PEOPLE - LET’S GET BACK TO THIS ONE AGGRESSIVE SOFTWARE PATCHING - SERVERS - WORKSTATIONS - APPS AV VS IDS AUTHENTICATION PEOPLE
  • 23. QUESTIONS? 23 Seth Zarny – Partner szarny@raffa.com Nate Solloway – Manager nsolloway@raffa.com