SlideShare a Scribd company logo
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Cybersecurity Fundamentals for
Bar Associations
Andrew Hoog
CEO and Co-founder of NowSecure
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
● Computer scientist & mobile security
researcher
● Author of three mobile security books
● Enjoyer of science fiction, running and red wine
© Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Contents
● Why invest in cybersecurity?
● Assets-based risk assessment
● Common attacks vectors
● Frameworks / Best Practices
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Why invest in cybersecurity?
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Model Rules of Professional Conduct 1.6:
Confidentiality of Information
(c) A lawyer shall make reasonable efforts to
prevent the inadvertent or unauthorized disclosure
of, or unauthorized access to, information relating
to the representation of a client.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Your job? Your bonus?
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Anyone heard of the Panama papers?
The Panama Papers are:
11.5 million leaked documents that detail
financial and attorney–client information for more than
214,488 offshore entities.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Regulation
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
FTC v. Wyndham
“A company does not act equitably when it publishes a
privacy policy to attract customers who are concerned
about data privacy, fails to make good on that promise by
investing inadequate resources in cybersecurity, exposes
its unsuspecting customers to substantial financial injury,
and retains the profits of their business.”
Circuit Judge Thomas Ambro, United States Court of Appeals for the Third District
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
FTC v. Wyndhan
FTC has authority to bring
data security cases
Apple App Store and
Google Play store require
privacy policies
Failure to invest in security
of those apps (i.e., “do what
you say”) puts you at risk
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Information Security - It’s a process, yo!
Information Security Management System (ISMS) is not a computer system but
an organizational policy and program to implement and manage information
security. A major component of this is executive accountability for information
security, making clear the responsibility overall and also "ownership" of specific
systems/data.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Asset-based risk assessment
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
Assets of value
Things I heard you value
● Member database
● Credit cards
● PII
● Anything related to cases
● …
Things attackers may also value
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
Assets of value
Things I heard you value
● Member database
● Credit cards
● PII
● Anything related to cases
● …
Things attackers may also value
● Network (DDoS)
● CPU (bitcoin mining, wheeee!)
● Your identity
● Making a point (political / philosophical
agendas)
● Bragging rights
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
I think of vulnerabilities in three buckets
Unknown / No fix Best practices
Very little anyone can do here
See router example (vulnerable
cable modem)
Tactics: implement best practices
and try to limit what attackers
can access
This is the area to focus most
energy
80/20 rule in play here, meaning a
reasonable amount of effort will
address 80% of your risk.
The remaining 20% is
precipitously expensive and
difficult to address.
Targeted attacks
Can’t defend against
Attacker will ultimately succeed
Tactics: implement best practices
and try to limit what attackers
can access
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Compromised router
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
It all began on Saturday, February 13
● Certificate error
● Examined the details
● Determined there was an issue
Documented the issue
Contacted corporate security team
● Attempted to re-create on iPad, other iOS devices, laptop, desktop
© Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Info gathering and identification
Symptoms
● Gmail app wouldn’t sync
● Wi-Fi certificate errors
● Analyzed certificate
Hosted in shared environment
● Istanbul
● Both used self-signed HTTPS certificate
● Issued by: ssl@servers.carsimedya.com
© Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Continuing investigation
Suspicious DNS entries
● Queried IP address - resolved to a server in Germany
● Same DNS as carsimedya.com
● Social media and SEO related
● Investigated router configuration
Theories
● Targeted attack
● Mass router compromise (using known or zero-day vulnerability)
© Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Common attack vectors
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Common Attacks
1. Vulnerable software (and firmware)
2. Phishing attacks, email most common but
can also be SMS
3. Ransomware - (typically phishing +
vulnerable software)
4. Webserver
5. Social engineering
6. Physical
With scary cyber criminal image
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Local ABA Webserver
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Web Server Info
Scan took 1.5 seconds - IIS 7.5 was released in 2009!
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
IIS 7.5 Known Vulnerabilities
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
.NET Framework 4.0 Know Vulnerabilities
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Ideas on how the Panama papers leaked?
Does anyone want to conjecture on how the Panama papers were leaked?
The Panama Papers are:
11.5 million leaked documents that detail
financial and attorney–client information for more than
214,488 offshore entities.
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute.
Frameworks / Best Practices
NIST Cybersecurity Framework
Check it out:
https://www.nist.gov/cyberframework
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Five practical info sec tips for
non-security firms
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
1 2 3 4 5
Patch
Routers
Firewalls
Wi-Fi Access Points
Servers
Computer
Laptops
Mobile phones
....
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
1 2 3 4 5
Patch
Routers
Firewalls
Wi-Fi Access Points
Servers
Computer
Laptops
Mobile phones
....
Auth
Change default
passwords!
Use a password
manager.
Two Factor Auth
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
1 2 3 4 5
Patch
Routers
Firewalls
Wi-Fi Access Points
Servers
Computer
Laptops
Mobile phones
....
Auth
Change default
passwords!
Use a password
manager.
Two Factor Auth
Segment
Install a firewall
Consider segmenting
sensitive servers from
computers, mobile and
IoT devices and guest
Wi-Fi
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
1 2 3 4 5
Patch Auth Segment
Install a firewall
Consider segmenting
sensitive servers from
computers, mobile and
IoT devices and guest
Wi-Fi
Encrypt
Encrypt data at test
Servers
Laptops
Mobile Devices
This is only effective in
some scenarios
Routers
Firewalls
Wi-Fi Access Points
Servers
Computer
Laptops
Mobile phones
....
Change default
passwords!
Use a password
manager.
Two Factor Auth
© Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information.
1 2 3 4 5
Patch Auth Segment Encrypt Outsource
Security is hard so
outsourcing makes
sense in many
situations
Primary upside is using
large SaaS providers for
key systems like email
Audit your mobile apps
against the framework
Set internal
requirements for
mobile app security
Teach developers how
to code in compliance
with the framework,
and teach security
auditors how to test
apps against it
Document framework,
education materials,
and assessments (i.e.,
reports), and make sure
it’s all organized and
accessible
© Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information.
Security needs to be user friendly or
people will circumvent it
Executives must lead by
example and take
responsibility for security
Needs to become part of your
DNS
Assets are valuable,
vulnerabilities are everywhere.
Attackers have an asymmetric
advantage
Information Security is org policy and program
Don’t Panic
Andrew Hoog
CEO / Co-founder, NowSecure
ahoog@nowsecure.com
312-878-1100, x4242
Twitter: @ahoog42
nowsecure.com

More Related Content

PDF
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
PDF
Preparing for the inevitable: The mobile incident response playbook
PPTX
Netwatcher Credit Union Tech Talk
PDF
It's not about you: Mobile security in 2016
PDF
How to scale mobile application security testing
PDF
PROGRAMMING AND CYBER SECURITY
PPTX
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
PDF
5 Mobile App Security MUST-DOs in 2018
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Preparing for the inevitable: The mobile incident response playbook
Netwatcher Credit Union Tech Talk
It's not about you: Mobile security in 2016
How to scale mobile application security testing
PROGRAMMING AND CYBER SECURITY
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
5 Mobile App Security MUST-DOs in 2018

What's hot (20)

PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PDF
Tomorrow Starts Here - Security Everywhere
PPTX
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
PDF
Slides to the online event "Creating an effective cybersecurity strategy" by ...
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
Cyber Resilency VANCOUVER, BC Nov 2017
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
PDF
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
PDF
Webinar: Cloud-Based Web Security as First/Last Line of Defense
PDF
Slide Griffin - Practical Attacks and Mitigations
PPTX
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
PPTX
A Day in the Life of a GDPR Breach
PPTX
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
PDF
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
PPTX
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
PPTX
2015 ISA Calgary Show: IACS Cyber Incident Preparation
PDF
OFFENSIVE IDS
PDF
OWASP Day - OWASP Day - Lets secure!
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Tomorrow Starts Here - Security Everywhere
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Slides to the online event "Creating an effective cybersecurity strategy" by ...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Cyber Resilency VANCOUVER, BC Nov 2017
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Slide Griffin - Practical Attacks and Mitigations
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
A Day in the Life of a GDPR Breach
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
2015 ISA Calgary Show: IACS Cyber Incident Preparation
OFFENSIVE IDS
OWASP Day - OWASP Day - Lets secure!
Ad

Viewers also liked (20)

PDF
Industrial Cybersecurity & SCADA hacks presentation
PDF
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
PDF
Cybersecurity for Your Law Firm: Data Security and Data Encryption
PPTX
InduSoft Speaks at Houston Infragard on February 17, 2015
PPTX
chile-2015 (2)
PPT
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
PPTX
Cybersecurity Law and Risk Management
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
Cybersecurity in the Boardroom
PDF
Introduction to NIST Cybersecurity Framework
PDF
Cybersecurity
PDF
Guia extraescolares 17-18
PPTX
Mau ghe nail 2017 dep gia re bao hanh 5 nam
PPTX
Ecosistemas eii
PDF
Business is a game & the best team wins
PDF
Laboratorio di Internazionalizzazione d’Impresa
PPTX
3Com 10/100BASE-TX
DOCX
PDF
Tech talent hunting
Industrial Cybersecurity & SCADA hacks presentation
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Cybersecurity for Your Law Firm: Data Security and Data Encryption
InduSoft Speaks at Houston Infragard on February 17, 2015
chile-2015 (2)
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
Cybersecurity Law and Risk Management
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in the Boardroom
Introduction to NIST Cybersecurity Framework
Cybersecurity
Guia extraescolares 17-18
Mau ghe nail 2017 dep gia re bao hanh 5 nam
Ecosistemas eii
Business is a game & the best team wins
Laboratorio di Internazionalizzazione d’Impresa
3Com 10/100BASE-TX
Tech talent hunting
Ad

Similar to Cybersecurity Fundamentals for Bar Associations (20)

PPT
Guard Era Security Overview Preso (Draft)
PDF
Fall2015SecurityShow
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PDF
Introduction to information security
PPTX
2024 Security Outlook & Essential Security Practices
PPTX
Internet safety and you
PPTX
Private Data and Prying Eyes
PPTX
Application Security: What do we need to know?
PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
PPTX
A6 pragmatic journey into cyber security
PPTX
Basic Security Training for End Users
PPTX
Unveiling the dark web. The importance of your cybersecurity posture
PPTX
attack vectors by chimwemwe.pptx
PDF
Small Business Quick Wins Guide
PDF
Scot Secure 2019 Edinburgh (Day 2)
PDF
Security & Compliance for Startups
PPTX
Can your company survive a modern day cyber attack?
PDF
Rogers eBook Security
Guard Era Security Overview Preso (Draft)
Fall2015SecurityShow
CyberCare Pro - Cybersecurity for SME's updated.pptx
Introduction to information security
2024 Security Outlook & Essential Security Practices
Internet safety and you
Private Data and Prying Eyes
Application Security: What do we need to know?
Tech Talent Meetup Hacking Security Event Recap
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
A6 pragmatic journey into cyber security
Basic Security Training for End Users
Unveiling the dark web. The importance of your cybersecurity posture
attack vectors by chimwemwe.pptx
Small Business Quick Wins Guide
Scot Secure 2019 Edinburgh (Day 2)
Security & Compliance for Startups
Can your company survive a modern day cyber attack?
Rogers eBook Security

More from NowSecure (20)

PDF
iOS recon with Radare2
PDF
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
PDF
Android Q & iOS 13 Privacy Enhancements
PDF
Debunking the Top 5 Myths About Mobile AppSec
PDF
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
PDF
Building a Mobile App Pen Testing Blueprint
PDF
Mobile App Security Predictions 2019
PDF
Jeff's Journey: Best Practices for Securing Mobile App DevOps
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PDF
A Risk-Based Mobile App Security Testing Strategy
PDF
Android P Security Updates: What You Need to Know
PDF
iOS 12 Preview - What You Need To Know
PDF
5 Tips for Agile Mobile App Security Testing
PDF
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
PDF
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
PDF
What attackers know about your mobile apps that you don’t: Banking & FinTech
PDF
Solving for Compliance: Mobile app security for banking and financial services
PDF
Leaky Mobile Apps: What You Need to Know
PDF
Vetting Mobile Apps for Corporate Use: Security Essentials
PDF
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...
iOS recon with Radare2
From Tangled Mess to Organized Flow: A Mobile DevSecOps Reference Architecture
Android Q & iOS 13 Privacy Enhancements
Debunking the Top 5 Myths About Mobile AppSec
OSS Tools: Creating a Reverse Engineering Plug-in for r2frida
Building a Mobile App Pen Testing Blueprint
Mobile App Security Predictions 2019
Jeff's Journey: Best Practices for Securing Mobile App DevOps
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
A Risk-Based Mobile App Security Testing Strategy
Android P Security Updates: What You Need to Know
iOS 12 Preview - What You Need To Know
5 Tips for Agile Mobile App Security Testing
Top OSS for Mobile AppSec Testing: The Latest on R2 and FRIDA
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
What attackers know about your mobile apps that you don’t: Banking & FinTech
Solving for Compliance: Mobile app security for banking and financial services
Leaky Mobile Apps: What You Need to Know
Vetting Mobile Apps for Corporate Use: Security Essentials
Cutting out the middleman: Man-in-the-middle attacks and prevention for mobil...

Recently uploaded (20)

PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
PPTX
prenuptial agreement ppt my by a phd scholar
PPTX
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
PDF
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
PPT
Understanding the Impact of the Cyber Act
PDF
Analysis Childrens act Kenya for the year 2022
PPTX
prenuptial agreement ppt my by a phd scholar
PDF
NRL_Legal Regulation of Forests and Wildlife.pdf
PPT
looking_into_the_crystal_ball - Merger Control .ppt
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
PPT
Understanding the Impact of the Cyber Act
PPTX
Punjab Fertilizers Control Act 2025.pptx
PPTX
Income under income Tax Act..pptx Introduction
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PPTX
Financial Rehabilitation and Insolvency Act
PDF
8-14-25 Examiner Report from NJ Bankruptcy (Heller)
PPTX
Sexual Harassment Prevention training class
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
prenuptial agreement ppt my by a phd scholar
Behavioural_Approach_Public_Administration_Zambia_USA.pptx
SUMMARY CASES-42-47.pdf tax -1 257++/ hsknsnd
Understanding the Impact of the Cyber Act
Analysis Childrens act Kenya for the year 2022
prenuptial agreement ppt my by a phd scholar
NRL_Legal Regulation of Forests and Wildlife.pdf
looking_into_the_crystal_ball - Merger Control .ppt
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
Understanding the Impact of the Cyber Act
Punjab Fertilizers Control Act 2025.pptx
Income under income Tax Act..pptx Introduction
Vinayaka Mission Law School Courses and Infrastructure.pdf
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
Financial Rehabilitation and Insolvency Act
8-14-25 Examiner Report from NJ Bankruptcy (Heller)
Sexual Harassment Prevention training class
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx

Cybersecurity Fundamentals for Bar Associations

  • 1. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Cybersecurity Fundamentals for Bar Associations
  • 2. Andrew Hoog CEO and Co-founder of NowSecure © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. ● Computer scientist & mobile security researcher ● Author of three mobile security books ● Enjoyer of science fiction, running and red wine © Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
  • 3. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Contents ● Why invest in cybersecurity? ● Assets-based risk assessment ● Common attacks vectors ● Frameworks / Best Practices
  • 4. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Why invest in cybersecurity?
  • 5. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Model Rules of Professional Conduct 1.6: Confidentiality of Information (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.
  • 6. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Your job? Your bonus?
  • 7. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Anyone heard of the Panama papers? The Panama Papers are: 11.5 million leaked documents that detail financial and attorney–client information for more than 214,488 offshore entities.
  • 8. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Regulation
  • 9. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. FTC v. Wyndham “A company does not act equitably when it publishes a privacy policy to attract customers who are concerned about data privacy, fails to make good on that promise by investing inadequate resources in cybersecurity, exposes its unsuspecting customers to substantial financial injury, and retains the profits of their business.” Circuit Judge Thomas Ambro, United States Court of Appeals for the Third District
  • 10. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. FTC v. Wyndhan FTC has authority to bring data security cases Apple App Store and Google Play store require privacy policies Failure to invest in security of those apps (i.e., “do what you say”) puts you at risk
  • 11. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Information Security - It’s a process, yo! Information Security Management System (ISMS) is not a computer system but an organizational policy and program to implement and manage information security. A major component of this is executive accountability for information security, making clear the responsibility overall and also "ownership" of specific systems/data.
  • 12. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Asset-based risk assessment
  • 13. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. Assets of value Things I heard you value ● Member database ● Credit cards ● PII ● Anything related to cases ● … Things attackers may also value
  • 14. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. Assets of value Things I heard you value ● Member database ● Credit cards ● PII ● Anything related to cases ● … Things attackers may also value ● Network (DDoS) ● CPU (bitcoin mining, wheeee!) ● Your identity ● Making a point (political / philosophical agendas) ● Bragging rights
  • 15. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. I think of vulnerabilities in three buckets Unknown / No fix Best practices Very little anyone can do here See router example (vulnerable cable modem) Tactics: implement best practices and try to limit what attackers can access This is the area to focus most energy 80/20 rule in play here, meaning a reasonable amount of effort will address 80% of your risk. The remaining 20% is precipitously expensive and difficult to address. Targeted attacks Can’t defend against Attacker will ultimately succeed Tactics: implement best practices and try to limit what attackers can access
  • 16. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Compromised router
  • 17. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. It all began on Saturday, February 13 ● Certificate error ● Examined the details ● Determined there was an issue Documented the issue Contacted corporate security team ● Attempted to re-create on iPad, other iOS devices, laptop, desktop © Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
  • 18. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Info gathering and identification Symptoms ● Gmail app wouldn’t sync ● Wi-Fi certificate errors ● Analyzed certificate Hosted in shared environment ● Istanbul ● Both used self-signed HTTPS certificate ● Issued by: ssl@servers.carsimedya.com © Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
  • 19. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Continuing investigation Suspicious DNS entries ● Queried IP address - resolved to a server in Germany ● Same DNS as carsimedya.com ● Social media and SEO related ● Investigated router configuration Theories ● Targeted attack ● Mass router compromise (using known or zero-day vulnerability) © Copyright NowSecure 2016, Inc. All Rights Reserved. Proprietary Information.
  • 20. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Common attack vectors
  • 21. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Common Attacks 1. Vulnerable software (and firmware) 2. Phishing attacks, email most common but can also be SMS 3. Ransomware - (typically phishing + vulnerable software) 4. Webserver 5. Social engineering 6. Physical With scary cyber criminal image
  • 22. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Local ABA Webserver
  • 23. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Web Server Info Scan took 1.5 seconds - IIS 7.5 was released in 2009!
  • 24. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. IIS 7.5 Known Vulnerabilities
  • 25. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. .NET Framework 4.0 Know Vulnerabilities
  • 26. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Ideas on how the Panama papers leaked? Does anyone want to conjecture on how the Panama papers were leaked? The Panama Papers are: 11.5 million leaked documents that detail financial and attorney–client information for more than 214,488 offshore entities.
  • 27. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Do not distribute. Frameworks / Best Practices
  • 28. NIST Cybersecurity Framework Check it out: https://www.nist.gov/cyberframework
  • 29. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Five practical info sec tips for non-security firms
  • 30. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. 1 2 3 4 5 Patch Routers Firewalls Wi-Fi Access Points Servers Computer Laptops Mobile phones ....
  • 31. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. 1 2 3 4 5 Patch Routers Firewalls Wi-Fi Access Points Servers Computer Laptops Mobile phones .... Auth Change default passwords! Use a password manager. Two Factor Auth
  • 32. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. 1 2 3 4 5 Patch Routers Firewalls Wi-Fi Access Points Servers Computer Laptops Mobile phones .... Auth Change default passwords! Use a password manager. Two Factor Auth Segment Install a firewall Consider segmenting sensitive servers from computers, mobile and IoT devices and guest Wi-Fi
  • 33. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. 1 2 3 4 5 Patch Auth Segment Install a firewall Consider segmenting sensitive servers from computers, mobile and IoT devices and guest Wi-Fi Encrypt Encrypt data at test Servers Laptops Mobile Devices This is only effective in some scenarios Routers Firewalls Wi-Fi Access Points Servers Computer Laptops Mobile phones .... Change default passwords! Use a password manager. Two Factor Auth
  • 34. © Copyright 2015 NowSecure, Inc. All Rights Reserved. Proprietary information. 1 2 3 4 5 Patch Auth Segment Encrypt Outsource Security is hard so outsourcing makes sense in many situations Primary upside is using large SaaS providers for key systems like email Audit your mobile apps against the framework Set internal requirements for mobile app security Teach developers how to code in compliance with the framework, and teach security auditors how to test apps against it Document framework, education materials, and assessments (i.e., reports), and make sure it’s all organized and accessible
  • 35. © Copyright 2016 NowSecure, Inc. All Rights Reserved. Proprietary information. Security needs to be user friendly or people will circumvent it Executives must lead by example and take responsibility for security Needs to become part of your DNS Assets are valuable, vulnerabilities are everywhere. Attackers have an asymmetric advantage Information Security is org policy and program
  • 36. Don’t Panic Andrew Hoog CEO / Co-founder, NowSecure ahoog@nowsecure.com 312-878-1100, x4242 Twitter: @ahoog42 nowsecure.com