SlideShare a Scribd company logo
Breach Stats
Paul Fletcher – Cyber Security Evangelist
@_PaulFletcher
Cyber Resiliency
Breach Stats
Step 1: Cut the cord as soon as possible
well… maybe…
Actually, Give It a Minute or Two
Downside of moving too fast
Downside of moving too fast
Before you act, ask yourself:
• What is your primary objective?
• What about the Cyber Security
Incident Response plan?
• Is there a downside to quietly
observing the actions of the
attacker?
Types of Cyber Security Incidents
• Application Vulnerabilities
- Word Press
- MySql
- Web Server (IIS or Apache)
• Operating System Attacks
- Linux Kernel
• Malicious Software
- Worm
- Trojan
- Other
• Denial of Service (DoS or DDoS)
• Ransomware
Ransomware Incidents
Ransom demand variation over time.
Case Study: Tewksbury Police Department
Attack
• Phishing email (package delivered – click this link for details)
• Employee clicked, malware was launched
• Attacker gained access and encrypted data on mapped servers
• Ransom demand of only $500 (if a million people give you $1,
You have $1 million.)
Impact
• Total Police Operations Disruption
• Reverted to broken manual processes
• No access to arrest records/warrants
• Unable to conduct ID verification
Five days with no computing. Public and private security experts unable to decrypt. No technical mitigation.
If Ransomware Hits – Haggle!
• Act quickly before they pack up
• Most attackers happy
with smaller pay day
• In larger cases, FBI recommends
professional negotiators be hired
Cyber Incident Response Plans
Cyber Incident Response
• The Plan is the Thing
- Preparation
- Identification
- Notification
- Mitigation Strategy
- Containment
- Eradication
- Recovery
- Lessons Learned
• Templates
Roles and responsibilities
• Incident notification
• Help desk
• Technical team
• Triage team
• Forensics team
• Network Security
• Malware analysis
• Communications
• Executive team
• Legal/Marketing/HR
Roles and responsibilities
Incident Notification
• Employees
• Contractors/Consultants
• Vendors
• Customers
• Competitors
• Law Enforcement
Notification Method
• Should be easy
• Have multiple options
Roles and responsibilities
• Help desk
• Properly trained
• Escalation
• Pre-triage
• Technical team
• Triage – fix known issues, return system to normal
• Forensics – root cause analysis, chain of custody
• Network and systems – infrastructure assessment
• Malware analysis – reverse engineer, zero days
Roles and responsibilities
• Communications
• Within the incident response team
• Internally
• Decision makers
• Externally
• Designated role
• Notes
• Timelines
• Next steps
• Executive team
• Legal/Marketing/HR
Cyber Incident Response
• Cloud considerations
- Robust log solution
- Understand your cloud service providers security model
- Understand the shared security responsibility
- Clearly defined resources
- Include when testing the plan
- Have pristine content ready to re-deploy
- Test this capability
Test the plan
• Self risk assessment
• Incident response walk through
• Recent breach details
• Team risk assessment
• Entire incident response team
• Confirm roles, timing, talent and tools
• Executive risk assessment
• Focused on process and business impact
• C-level collaboration
• Live exercise risk assessment
• Practice leads to experience
• Experience leads to confidence
• Confidence leads to execution
Cyber Incident Response
• Test the plan
• Roles and responsibilities
• Cloud considerations
• The plan is the thing
• Test the plan…again
No Substitution for Preparation
• Assume that at some point you will be breached
• Make actionable
• Consider observing the adversary without tipping them off to
understand full extent of the breach and attacker intent
• Use cloud networking tools to isolate compromised infrastructure and
orchestrate recovery efforts
• Run your incident response team through regularly scheduled and
surprise exercises
• Engage cloud provider during exercises
• Utilize hybrid infrastructure
Shared Cyber Incident Response
Preparation
Identification Notification Mitigation Strategy
Containment Eradication Recovery Lessons Learned
Thank you.

More Related Content

PPTX
#ALSummit: Live Cyber Hack Demonstration
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PPTX
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
PPTX
#ALSummit: Architecting Security into your AWS Environment
PPT
Safeguard your enterprise against ransomware
PPTX
Malware detection how to spot infections early with alien vault usm
PPTX
Improve threat detection with hids and alien vault usm
PDF
Reality Check: Security in the Cloud
#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Cyber Resiliency: Surviving the Breach
Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchne...
#ALSummit: Architecting Security into your AWS Environment
Safeguard your enterprise against ransomware
Malware detection how to spot infections early with alien vault usm
Improve threat detection with hids and alien vault usm
Reality Check: Security in the Cloud

What's hot (20)

PDF
Reducing Your Attack Surface
PDF
Web Application Penetration Testing
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
Realities of Security in the Cloud
PPTX
Ethical hacking
PPTX
Incident Response: Validation, Containment & Forensics
PPTX
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
PDF
Security Implications of the Cloud - CSS Dallas Azure
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
PPTX
Ethical hacking/ Penetration Testing
PDF
Carbon Black Corporate Overview 2016
PDF
Breaking and entering how and why dhs conducts penetration tests
PPTX
Is Antivirus (AV) Dead or Just Missing in Action
PDF
Security Implications of the Cloud
PPTX
Thinking Differently About Security Protection and Prevention
PDF
The Intersection of Security & DevOps
PPTX
AWS Security Best Practices for Effective Threat Detection & Response
PPT
Ethical Hacking and Penetration Testing
PPTX
Continuous Automated Red Teaming (CART) - Bikash Barai
PPTX
Alienvault threat alerts in spiceworks
Reducing Your Attack Surface
Web Application Penetration Testing
Wfh security risks - Ed Adams, President, Security Innovation
Realities of Security in the Cloud
Ethical hacking
Incident Response: Validation, Containment & Forensics
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Security Implications of the Cloud - CSS Dallas Azure
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Ethical hacking/ Penetration Testing
Carbon Black Corporate Overview 2016
Breaking and entering how and why dhs conducts penetration tests
Is Antivirus (AV) Dead or Just Missing in Action
Security Implications of the Cloud
Thinking Differently About Security Protection and Prevention
The Intersection of Security & DevOps
AWS Security Best Practices for Effective Threat Detection & Response
Ethical Hacking and Penetration Testing
Continuous Automated Red Teaming (CART) - Bikash Barai
Alienvault threat alerts in spiceworks
Ad

Viewers also liked (16)

PDF
How to design enterprise apps that sell
PDF
Lec(9):capacitive divider
PPTX
West African Food Markets and Transformations in Agriculture
PDF
User-centric design for large enterprises
PPT
Résoudre la crise alimentaire africaine : L'urgence d'un agenda mené par l'A...
PPT
Hipaa Compliance With IT
PDF
Shinjuku.rb #29 ActiveJobでSQS使ったのとその永続化についての話
PDF
Omoidoriのファンづくりマーケティング
PPTX
Quark Virtualization Engine for Analytics
PPTX
HIPAA Compliance in the Cloud
PDF
【ヒカラボ】RDS for MySQL → Aurora
PDF
The State of Enterprise UX 2016: Panel Discussion
PDF
Potential Solutions to the Fundamental Problem of Causal Inference: An Overview
PPTX
Creating and Scaling an Enterprise Design System
PDF
Team Personas for Enterprise UX
DOC
Gutierrez
How to design enterprise apps that sell
Lec(9):capacitive divider
West African Food Markets and Transformations in Agriculture
User-centric design for large enterprises
Résoudre la crise alimentaire africaine : L'urgence d'un agenda mené par l'A...
Hipaa Compliance With IT
Shinjuku.rb #29 ActiveJobでSQS使ったのとその永続化についての話
Omoidoriのファンづくりマーケティング
Quark Virtualization Engine for Analytics
HIPAA Compliance in the Cloud
【ヒカラボ】RDS for MySQL → Aurora
The State of Enterprise UX 2016: Panel Discussion
Potential Solutions to the Fundamental Problem of Causal Inference: An Overview
Creating and Scaling an Enterprise Design System
Team Personas for Enterprise UX
Gutierrez
Ad

Similar to Cyber Resiliency (20)

PPTX
Navigating Cybersecurity Incidents in 2025
PPTX
Incident Response
PPTX
INCIDENT-RESPONSE_093004 (1).pdtffyghgptx
PDF
Cybersecurity Incident Response Planning.pdf
PPTX
2022 Rea & Associates' Cybersecurity Conference
 
PPTX
You Will Be Breached
PDF
YBB-NW-distribution
PPTX
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PDF
Incident Response
PDF
You will be breached
PDF
Cyber Incident Response View - Aeren LPO.
PDF
Department of Homeland Security Guidance
PDF
DHS Guidelines
PDF
fortinetwebcastcyberresilienceslidedeck1739266181549.pdf
PDF
Cybersecurity Incident Management Powerpoint Presentation Slides
PDF
Cybersecurity Incident Management PowerPoint Presentation Slides
PPT
cyber security incident exercises TTX .ppt
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
Incident-Response-and-Recovery and cloud security.pptx
Navigating Cybersecurity Incidents in 2025
Incident Response
INCIDENT-RESPONSE_093004 (1).pdtffyghgptx
Cybersecurity Incident Response Planning.pdf
2022 Rea & Associates' Cybersecurity Conference
 
You Will Be Breached
YBB-NW-distribution
Draft_ppt_dmss[1][2] (1) FINAL123455667.pptx
IT Security and Management - Semi Finals by Mark John Lado
Incident Response
You will be breached
Cyber Incident Response View - Aeren LPO.
Department of Homeland Security Guidance
DHS Guidelines
fortinetwebcastcyberresilienceslidedeck1739266181549.pdf
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management PowerPoint Presentation Slides
cyber security incident exercises TTX .ppt
Today's Cyber Challenges: Methodology to Secure Your Business
Incident-Response-and-Recovery and cloud security.pptx

More from Alert Logic (20)

PDF
Managed Threat Detection & Response for AWS Applications
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Managed Threat Detection and Response
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
The Intersection of Security & DevOps
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Rent-A-Center
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
Security Implications of the Cloud
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Realities of Security in the Cloud
PDF
CSS 2018 Trivia
PDF
The AWS Shared Responsibility Model in Practice
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security and DevOps
Managed Threat Detection & Response for AWS Applications
Extending Amazon GuardDuty with Cloud Insight Essentials
Managed Threat Detection and Response
Extending Amazon GuardDuty with Cloud Insight Essentials
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
The Intersection of Security & DevOps
The AWS Shared Responsibility Model in Practice
Security Spotlight: Rent-A-Center
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Realities of Security in the Cloud
The Intersection of Security & DevOps
Security Spotlight: Presidio
Security Implications of the Cloud
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Realities of Security in the Cloud
CSS 2018 Trivia
The AWS Shared Responsibility Model in Practice
Realities of Security in the Cloud
The Intersection of Security and DevOps

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Modernizing your data center with Dell and AMD
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Encapsulation theory and applications.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Digital-Transformation-Roadmap-for-Companies.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Modernizing your data center with Dell and AMD
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation theory and applications.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Cyber Resiliency

  • 2. Paul Fletcher – Cyber Security Evangelist @_PaulFletcher Cyber Resiliency
  • 4. Step 1: Cut the cord as soon as possible well… maybe… Actually, Give It a Minute or Two
  • 7. Before you act, ask yourself: • What is your primary objective? • What about the Cyber Security Incident Response plan? • Is there a downside to quietly observing the actions of the attacker?
  • 8. Types of Cyber Security Incidents • Application Vulnerabilities - Word Press - MySql - Web Server (IIS or Apache) • Operating System Attacks - Linux Kernel • Malicious Software - Worm - Trojan - Other • Denial of Service (DoS or DDoS) • Ransomware
  • 9. Ransomware Incidents Ransom demand variation over time.
  • 10. Case Study: Tewksbury Police Department Attack • Phishing email (package delivered – click this link for details) • Employee clicked, malware was launched • Attacker gained access and encrypted data on mapped servers • Ransom demand of only $500 (if a million people give you $1, You have $1 million.) Impact • Total Police Operations Disruption • Reverted to broken manual processes • No access to arrest records/warrants • Unable to conduct ID verification Five days with no computing. Public and private security experts unable to decrypt. No technical mitigation.
  • 11. If Ransomware Hits – Haggle! • Act quickly before they pack up • Most attackers happy with smaller pay day • In larger cases, FBI recommends professional negotiators be hired
  • 13. Cyber Incident Response • The Plan is the Thing - Preparation - Identification - Notification - Mitigation Strategy - Containment - Eradication - Recovery - Lessons Learned • Templates
  • 14. Roles and responsibilities • Incident notification • Help desk • Technical team • Triage team • Forensics team • Network Security • Malware analysis • Communications • Executive team • Legal/Marketing/HR
  • 15. Roles and responsibilities Incident Notification • Employees • Contractors/Consultants • Vendors • Customers • Competitors • Law Enforcement Notification Method • Should be easy • Have multiple options
  • 16. Roles and responsibilities • Help desk • Properly trained • Escalation • Pre-triage • Technical team • Triage – fix known issues, return system to normal • Forensics – root cause analysis, chain of custody • Network and systems – infrastructure assessment • Malware analysis – reverse engineer, zero days
  • 17. Roles and responsibilities • Communications • Within the incident response team • Internally • Decision makers • Externally • Designated role • Notes • Timelines • Next steps • Executive team • Legal/Marketing/HR
  • 18. Cyber Incident Response • Cloud considerations - Robust log solution - Understand your cloud service providers security model - Understand the shared security responsibility - Clearly defined resources - Include when testing the plan - Have pristine content ready to re-deploy - Test this capability
  • 19. Test the plan • Self risk assessment • Incident response walk through • Recent breach details • Team risk assessment • Entire incident response team • Confirm roles, timing, talent and tools • Executive risk assessment • Focused on process and business impact • C-level collaboration • Live exercise risk assessment • Practice leads to experience • Experience leads to confidence • Confidence leads to execution
  • 20. Cyber Incident Response • Test the plan • Roles and responsibilities • Cloud considerations • The plan is the thing • Test the plan…again
  • 21. No Substitution for Preparation • Assume that at some point you will be breached • Make actionable • Consider observing the adversary without tipping them off to understand full extent of the breach and attacker intent • Use cloud networking tools to isolate compromised infrastructure and orchestrate recovery efforts • Run your incident response team through regularly scheduled and surprise exercises • Engage cloud provider during exercises • Utilize hybrid infrastructure
  • 22. Shared Cyber Incident Response Preparation Identification Notification Mitigation Strategy Containment Eradication Recovery Lessons Learned

Editor's Notes

  • #4: Reasons to be targeted Source: datalossdb.org
  • #5: Story of malware that self-destructs if “phone home” unsuccessful after X amount of attempts.
  • #7: Cambridge University security researcher Sergei Skorobogatov has published a new research paper detailing a technique that would have helped the FBI bypass the iOS passcode limit on the shooter's iPhone 5C
  • #9: Different attack vectors may need to be handled differently and documented accordingly in your Cyber Incident Response Plan.
  • #16: An incident could be reported by any of these
  • #17: Help desk – pre-triage means that help desk analysis should be able to understand enough about the reported incident to prepare the user and their system for next steps. As an example, if a user reports malware, the help desk should be able to know the next step (is your policy to unplug the network cable or shut off the system or keep it up and running for forensics) and communicate that to the user.
  • #20: C-level collaboration – a chance to discuss each executive’s biggest concerns and priorities. External facilitator - This external source can bring a scenario to work through, ask compelling questions (without corporate knowledge), facilitate discussion and be a source for independent review of your plan
  • #23: Regarding cyber incident response, Alert Logic can identify the threat and notify our customer with a mitigation strategy.  Once the customer knows there is an active threat, they can use our recommendation to contain the threat to keep it from spreading, eradicate the threat from their systems and recover to normal operations.  It’s highly recommended that organizations have a prepared cyber incident response plan and document the lessons learned from each incident to enhance their plan as cyber incident handling experience increases. Preparation Identification Notification Mitigation Strategy Containment Eradication Recovery Lessons Learned