American Security and Privacy, LLC Emergency Management Certification
Emergency
Management Certification
Dr. Kevin F. Streff
Founder and Managing Partner
1
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Dr. Kevin Streff
American Security and Privacy, LLC
 Founder & Managing Partner
 www.americansecurityandprivacy.com
 Kevin.Streff@americansecurityandprivacy.com
 605.270.4427
2
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Agenda
Module 1 Emergency Preparedness Overview
Module 2 Emergency Preparedness Laws and Regulations
Module 3 The Role of Emergency Preparedness in Information Security
and Privacy Programs
Module 4 Security and Privacy Incidents
Module 5 Incident Response Programs
Module 6 Business Impact Analysis
Module 7 Business Continuity Programs
Module 8 Pandemic Preparedness Programs
Module 9 Third Party Emergency Preparedness Requirements
Module 10 Information Emergency Preparedness Auditing
Module 11 Emergency Preparedness Metrics
3
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• Incident Response Handling
• Business Continuity Planning
• Pandemic Preparedness
Emergency Management
4
American Security and Privacy, LLC Emergency Management Certification
Module 4
SECURITY AND PRIVACY INCIDENTS
5
American Security and Privacy, LLC Emergency Management Certification
Security Incidents
6
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• 34 newly named adversaries in 2023
• 230+ total adversaries tracked by CrowdStrike
• 2:07 mins: fastest recorded eCrime breakout time
• 75% increase in cloud intrusions
• 76% spike in data theft victims named on the dark web
• 75% of attacks were malware-free
2024 CrowdStrike Report
7
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Social
Engineering
Attacks
• According to the 2024
Data Breach
Investigations Report
by Verizon, social
engineering attacks
account for 17% of all
data breaches and 10%
of cybersecurity
incidents, making
social engineering one
of the three most
common cyberattack
vectors
8
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Example
• Mailchimp In January 2023,
Mailchimp, a prominent platform
for email marketing and
newsletters, detected an
unauthorized user within its
infrastructure.
• They stated that an intruder had
gained access to one of the tools
Mailchimp uses for user account
administration and customer
support.
• The intruder had previously
targeted Mailchimp employees and
managed to get their account
credentials through social
engineering techniques. Afterward,
the malicious actor used the
compromised credentials to access
data on 133 Mailchimp accounts.
9
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Privilege Abuse
• Organizations usually have many users with
elevated privileges such as admins, technical
specialists, and managers. Some can only access
certain critical resources, such as specific databases
or applications.
• Others might have full access to every system in
the network and even be able to create new
privileged accounts without drawing anyone’s
attention. If privileged users have malicious intent
or have been compromised, it may lead to data
breaches, financial fraud, sabotage, and other
severe consequences.
• Unfortunately, it’s hard to detect if a user with
elevated access rights is abusing their privileges, as
these culprits often cleverly conceal their actions.
10
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Example
• International Committee of the
Red Cross (ICRC)
• Malicious actors had
compromised privileged
accounts, used lateral movement
techniques to escalate their
privileges, and acted under the
guise of admins to obtain
sensitive data.
11
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Data Leakage
• Occurs when sensitive
information is unintentionally
exposed to unauthorized parties.
• For example, a misconfigured
cloud storage server might allow
easy access to personally
identifiable information (PII) and
trade secrets
12
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Example
• Pegasus Airlines In June 2022
• Discovered an error in the configuration of one
of their databases.
• It turned out that an airline employee had
misconfigured security settings and exposed 6.5
terabytes of the company’s valuable data.
• As a result of the improper configuration of an
AWS bucket, 23 million files with flight charts,
navigation materials, and the crew’s personal
information were available for the public to see
and modify.
13
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Insider
Data Theft
• Insiders may steal
data for financial
benefit, espionage
purposes, ideological
reasons, or because
of a grudge.
• For financial
institutions, insider
data theft may cause
financial losses,
reputational damage,
loss of customer trust,
and legal liabilities.
14
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Example
• In May 2023, two former employees
stole and leaked Tesla’s confidential
data to a German news outlet,
Handelsblatt.
• An investigation showed that
malicious insiders breached the
company’s IT security and data
protection policies to unlawfully
obtain and disclose 23,000 internal
documents from Tesla, amounting to
nearly 100 gigabytes of confidential
information.
• As a result, the personal information
of 75,735 current and former Tesla
employees was leaked and the
company was at risk of facing a $3,3
billion fine for insufficient data
protection
15
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Intellectual property theft
• Intellectual property is one of
the most valuable types of data
an organization possesses.
• Bright ideas, innovative
technologies, and complex
formulas give businesses a
competitive advantage.
• It’s no surprise that malicious
actors often target their victims’
trade secrets
16
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Example
• In May 2022, Apple sued Rivos, a chip development
startup, for allegedly stealing trade secrets after Rivos
hired away more than 40 former Apple employees.
• Apple claimed that at least two of their former
engineers took gigabytes of confidential information
with them before joining Rivos.
• Apple suggests that Rivos hired Apple’s former
employees to work on competing system-on-chip (SoC)
technology.
• Apple spent billions of dollars and more than a decade
of research to create the SoC designs that are now used
in iPhones, iPads, and MacBooks.
• Having access to SoC trade secrets would have
significantly aided Rivos in competing against Apple.
17
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Third Party
Breaches
• Having a sophisticated supply chain with
numerous subcontractors, vendors, and
third-party services is the norm for
organizations these days.
• However, granting third parties access to
your network is associated with
cybersecurity risks.
• One of the reasons is that your third parties
may not always follow all necessary security
procedures.
• Thus, there’s no guarantee that hackers
won’t exploit your vendors’ vulnerabilities to
access your organization’s assets.
18
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Example
• In March 2024, American Express informed its customers
that unauthorized parties gained access to sensitive
customer information through a breach in their merchant
processor.
• The breach was caused by a successful point-of-sale
attack. American Express emphasized that its internal
systems weren’t compromised during the incident.
• However, the breach at the merchant processor leaked
American Express customers’ sensitive data, such as
names, current and former account numbers, and card
expiration dates.
19
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Phishing
• A threat actor masquerades as a
reputable entity or person in an
email or other communication
channel.
• The attacker uses phishing emails to
distribute malicious links or
attachments that can perform a
variety of functions, including
extracting login credentials or
account information from victims.
• A more targeted type of phishing
attack known as spear
phishing occurs when the attacker
invests time researching the victim
to pull off an even more successful
attack.
20
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Malware
• This is a broad term for malicious
software for different types of
malware that are installed on an
enterprise's system.
• Malware includes Trojans, worms,
ransomware, adware, spyware and
various types of viruses.
• Some malware is inadvertently
installed when an employee clicks on
an ad, visits an infected website, or
installs freeware or other software.
• Signs of malware include unusual
system activity, such as a sudden loss
of disk space; unusually slow speeds;
repeated crashes or freezes; an
increase in unwanted internet activity;
and pop-up advertisements.
21
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
DDoS
Attack
• A threat actor launches a
distributed denial-of-
service attack to shut
down an individual
machine or an entire
network so that it's
unable to respond to
service requests.
• DoS attacks do this by
flooding the target with
traffic or sending it some
information that triggers
a crash.
22
American Security and Privacy, LLC Emergency Management Certification
Privacy Incidents
23
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• Alteration of personal data – when personal data has been
unlawfully changed. This could be, for example, data that is
incorrectly updated on a system accidentally or deliberately.
• Brute force attack – when an attacker tries a large number
of possible keyword or password combinations to gain
unauthorized access to a system or file.
• Cryptographic flaw – a weakness in the security of a system
that would allow a hacker to access sensitive information.
• Data emailed to incorrect recipient – where an email
containing personal data is sent to the wrong email address.
This could be data about one person or multiple individuals.
• Data of wrong data subject shown in client portal –
where personal information about one or more individuals is
shown within the Online service area belonging to another
person.
Privacy Incidents
24
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• Data posted or faxed to incorrect recipient – where a
fax or piece of post containing personal data is sent to the
wrong fax number or postal address. This could be data
about one person or multiple individuals.
• Denial of service – when a network or server, such as a
website, is maliciously flooded with manufactured traffic
(typically using botnets) to either cause it to fail or flood it
with so much traffic that legitimate users can't access it.
• Failure to redact – when personal data was disclosed
without the appropriate redaction, or if the redactions
made were inadequate.
• Failure to use bcc – when personal data was disclosed
due to an organization not using blind carbon copy (bcc)
recipients in an email. Usually bcc is used to ensure
personal email addresses are not shared inappropriately
with other customers, clients or organizations.
Privacy Incidents
25
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• Hardware/software misconfiguration – any hardware or
software misconfiguration leading to a disclosure of information.
For example, permissions on a folder set incorrectly, or failing to
use a robot.txt file.
• Incorrect disposal of hardware – computers, laptops or other
devices are not fully cleared of personal data or had any personal
data it contains otherwise anonymized or encrypted.
• Incorrect disposal of paperwork – paperwork containing
personal data has been disposed of without it being shredded or
otherwise destroyed. Personal information should not be
identifiable once paper files have been disposed of.
• Loss/theft of device containing personal data – an
electronic device (for example laptop, phone or tablet) containing
personal information of others has been misplaced or stolen. This
may be of particular concern if the data is not sufficiently secure,
for example the device has not been encrypted.
• Loss/theft of paperwork or data left in insecure location –
papers containing personal data are not secured, for example
locking the paperwork in a cabinet or similar; or papers are
misplaced or stolen.
Privacy Incidents
26
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• Malware­– a general term used to refer to a variety of forms
of hostile or intrusive software including computer viruses,
worms, Trojan horses, spyware, adware, scareware, and other
malicious programs. Malware is short for ‘malicious software’.
• Phishing – an attempt to obtain information by posing as a
trustworthy entity, deceiving recipients into sharing sensitive
information (such as usernames, passwords, or credit card
details) or by encouraging them to visit a fake website.
• Ransomware – a type of malware that unlawfully encrypts a
user’s files and demands a ransom to unencrypt files, usually
in the form of cryptocurrency.
• Unauthorized access – an unauthorized individual has
gained access to personal data. This can include unauthorized
disclosures. This incident type is used both in instances where
an individual has unlawfully accessed or disclosed information
and where a third party has forcibly accessed a system.
• Verbal disclosure of personal data – when personal data is
shared or disclosed verbally to an inappropriate party.
Privacy Incidents
27
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• Critical: A very high impact incident,
such as a customer-facing service
being down for all customers
• Major: A significant impact incident,
such as a customer-facing service
being unavailable for some
customers
• Minor: A low impact incident, such
as a minor inconvenience to
customers
Incident Response Levels
28
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Level 1 A critical incident that affects a large number of users in production.
Level 2 A significant problem affecting a limited number of users in production.
Level 3 Causes errors, minor problems for users, or a heavy system load.
Level 4
A minor problem that affects the service but no serious impact on
users.
Level 5 A low-level deficiency that causes minor problems
Levels
29
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
• The financial institution determines how
many levels, their definitions, and the
steps that will be taken based upon these
levels.
• Specific incidents can have more specific
steps
• Risk-based program
Levels
30
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Summary
• Both security and privacy incidents
need to be reflected in your incident
response and business continuity plans
• Risk-based approach
• Identify the potential issues prior to
them occurring
31
American Security and Privacy, LLC Emergency Management Certification
American Security and Privacy, LLC Emergency Management Certification
Dr. Kevin Streff
American Security and Privacy, LLC
 Founder & Managing Partner
 www.americansecurityandprivacy.com
 Kevin.Streff@americansecurityandprivacy.com
 605.270.4427
32
American Security and Privacy, LLC

More Related Content

PPTX
IH - Security Incidents - Module 5 Powerpoint Presentation.pptx
PPTX
Certified Banking Board Member - Module 2 Powerpoint Presentation
PPTX
Cyber Frontline - Level 1 - Module 2.pptx
PPTX
Cyber Frontline - Level 2 - Module 2.pptx
PPTX
Cyber Frontline - Level 3 - Module 1.pptx
PPTX
Cyber Frontline - Level 2 - Module 1.pptx
PPTX
IH - Privacy Incidents - Module 4 Powerpoint Presentation.pptx
PPTX
Certified Banking Security C-Suite - Module 1.pptx
IH - Security Incidents - Module 5 Powerpoint Presentation.pptx
Certified Banking Board Member - Module 2 Powerpoint Presentation
Cyber Frontline - Level 1 - Module 2.pptx
Cyber Frontline - Level 2 - Module 2.pptx
Cyber Frontline - Level 3 - Module 1.pptx
Cyber Frontline - Level 2 - Module 1.pptx
IH - Privacy Incidents - Module 4 Powerpoint Presentation.pptx
Certified Banking Security C-Suite - Module 1.pptx

Similar to EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation (20)

PPTX
Cyber RM - Asset Inventory - Module 7 Powerpoint Presentation
PDF
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
PDF
2014 ota databreach3
PPTX
CYBER SECURITY FOR LAW FIRMS
PPTX
Cyber Frontline - Level 3 - Module 2.pptx
PDF
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
PPTX
IT Security Essentials
PPTX
Presentation for FPANJ Spring 2015 Conference
PPTX
Management Information Systems ( Security and Control.pptx
DOCX
2. IntroductionYou are employed with Government Security Consu.docx
PPTX
Certified Banking TPM - Module 3 powerpoint presentation
PPTX
IH - Step 2 - Module 8 Powerpoint Presentation.pptx
PPTX
GTAG Fraud prevention Slide Presentation.pptx
PPTX
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
PDF
Asset Security
DOCX
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx
PPTX
Cyber Frontline - Level 1 - Module 1.pptx
PPTX
Identity theft and data responsibilities
PDF
Cybersecurity crisis management a prep guide
PPTX
Board Cyber - Level 3 - Module 1.pptx
Cyber RM - Asset Inventory - Module 7 Powerpoint Presentation
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
2014 ota databreach3
CYBER SECURITY FOR LAW FIRMS
Cyber Frontline - Level 3 - Module 2.pptx
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
IT Security Essentials
Presentation for FPANJ Spring 2015 Conference
Management Information Systems ( Security and Control.pptx
2. IntroductionYou are employed with Government Security Consu.docx
Certified Banking TPM - Module 3 powerpoint presentation
IH - Step 2 - Module 8 Powerpoint Presentation.pptx
GTAG Fraud prevention Slide Presentation.pptx
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
Asset Security
1.    TitleIT Security Risk Assessment2.    IntroductionYo.docx
Cyber Frontline - Level 1 - Module 1.pptx
Identity theft and data responsibilities
Cybersecurity crisis management a prep guide
Board Cyber - Level 3 - Module 1.pptx
Ad

More from trevor501353 (20)

PPT
Security Manager - Slides - Module 10.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 9.pptx
PPT
Security Manager - Slides - Module 8.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 7.pptx
PPT
Security Manager - Slides - Module 6.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 5.pptx
PPTX
Certified Banking Data Privacy Law and Regulation - Module 4.pptx
PPTX
Certified Banking Data Privacy Law and Regulation - Module 3.pptx
PPT
Security Manager - Slides - Module 2.ppt
PPTX
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
PPTX
Board Cyber - Level 3 - Module 4.pptx
PPTX
Board Cyber - Level 3 - Module 3.pptx
PPTX
Board Cyber - Level 3 - Module 2.pptx
PPTX
Board Cyber - Level 2 - Module 4.pptx
PPTX
Board Cyber - Level 2 - Module 3.pptx
PPTX
Board Cyber - Level 2 - Module 2.pptx
PPTX
Board Cyber - Level 2 - Module 1.pptx
PPTX
Cyber Frontline - Level 3 - Module 4.pptx
PPTX
Cyber Frontline - Level 2 - Module 3.pptx
PPTX
Board Privacy - Level 1 - Module 4.pptx
Security Manager - Slides - Module 10.ppt
Certified Banking Data Privacy Law and Regulation - Module 9.pptx
Security Manager - Slides - Module 8.ppt
Certified Banking Data Privacy Law and Regulation - Module 7.pptx
Security Manager - Slides - Module 6.ppt
Certified Banking Data Privacy Law and Regulation - Module 5.pptx
Certified Banking Data Privacy Law and Regulation - Module 4.pptx
Certified Banking Data Privacy Law and Regulation - Module 3.pptx
Security Manager - Slides - Module 2.ppt
Certified Banking Data Privacy Law and Regulation - Module 1.pptx
Board Cyber - Level 3 - Module 4.pptx
Board Cyber - Level 3 - Module 3.pptx
Board Cyber - Level 3 - Module 2.pptx
Board Cyber - Level 2 - Module 4.pptx
Board Cyber - Level 2 - Module 3.pptx
Board Cyber - Level 2 - Module 2.pptx
Board Cyber - Level 2 - Module 1.pptx
Cyber Frontline - Level 3 - Module 4.pptx
Cyber Frontline - Level 2 - Module 3.pptx
Board Privacy - Level 1 - Module 4.pptx
Ad

Recently uploaded (20)

PPTX
EXT.-EDU-809-EXTENSION-POLICY-AND-GOALS-.pptx
PDF
Geopolitics and the Dynamic Competition Framework
PPTX
Why work place wellbeing matters BookReview
DOC
咨询WSU毕业证学历认证,多恩大学毕业证国外本科学位证
PPTX
HRM mmm presentation pragati pandey.pptx
PPTX
People Strategies LXP BTS Readiness Plan
PDF
The Psychology of Employee Appreciation by Meenakshi Khakat
PDF
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
PPTX
1.pptx Awareness course managing. safety
PPTX
The Impact of Hofstede’s 6D Model on Emotional Intelligence in Global Teams.pptx
PPTX
Case Study on Japan: Development Model, Issues, and Prospects
PPTX
Recruitment and bshiwjwnbshshshshhshvej.ppt
PDF
Personal-Professional-Development-in-Nursing-1.pdf
PPTX
Leading, its definiton, example, and types.pptx
PPTX
SM_Behavior Based Safety (BBS)_Unit V.pptx
PPT
Risk Management What is Risk Management Risk Management Strategies Software R...
PDF
SpatzAI Micro-Conflict Resolution Toolkit - Fairer Teamwork Globally
PPT
risk management (contd.) Risk Identification Risk Components and Drivers Risk...
PPTX
EMOTIONAL INTELLIGENCE IN LEADERSHIP.pptx
PPTX
Unit 1-setting up practice arvhitectweyre
EXT.-EDU-809-EXTENSION-POLICY-AND-GOALS-.pptx
Geopolitics and the Dynamic Competition Framework
Why work place wellbeing matters BookReview
咨询WSU毕业证学历认证,多恩大学毕业证国外本科学位证
HRM mmm presentation pragati pandey.pptx
People Strategies LXP BTS Readiness Plan
The Psychology of Employee Appreciation by Meenakshi Khakat
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
1.pptx Awareness course managing. safety
The Impact of Hofstede’s 6D Model on Emotional Intelligence in Global Teams.pptx
Case Study on Japan: Development Model, Issues, and Prospects
Recruitment and bshiwjwnbshshshshhshvej.ppt
Personal-Professional-Development-in-Nursing-1.pdf
Leading, its definiton, example, and types.pptx
SM_Behavior Based Safety (BBS)_Unit V.pptx
Risk Management What is Risk Management Risk Management Strategies Software R...
SpatzAI Micro-Conflict Resolution Toolkit - Fairer Teamwork Globally
risk management (contd.) Risk Identification Risk Components and Drivers Risk...
EMOTIONAL INTELLIGENCE IN LEADERSHIP.pptx
Unit 1-setting up practice arvhitectweyre

EM - Security and Privacy Incidents - Module 4 Powerpoint Presentation

  • 1. American Security and Privacy, LLC Emergency Management Certification Emergency Management Certification Dr. Kevin F. Streff Founder and Managing Partner 1
  • 2. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Dr. Kevin Streff American Security and Privacy, LLC  Founder & Managing Partner  www.americansecurityandprivacy.com  Kevin.Streff@americansecurityandprivacy.com  605.270.4427 2
  • 3. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Agenda Module 1 Emergency Preparedness Overview Module 2 Emergency Preparedness Laws and Regulations Module 3 The Role of Emergency Preparedness in Information Security and Privacy Programs Module 4 Security and Privacy Incidents Module 5 Incident Response Programs Module 6 Business Impact Analysis Module 7 Business Continuity Programs Module 8 Pandemic Preparedness Programs Module 9 Third Party Emergency Preparedness Requirements Module 10 Information Emergency Preparedness Auditing Module 11 Emergency Preparedness Metrics 3
  • 4. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • Incident Response Handling • Business Continuity Planning • Pandemic Preparedness Emergency Management 4
  • 5. American Security and Privacy, LLC Emergency Management Certification Module 4 SECURITY AND PRIVACY INCIDENTS 5
  • 6. American Security and Privacy, LLC Emergency Management Certification Security Incidents 6
  • 7. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • 34 newly named adversaries in 2023 • 230+ total adversaries tracked by CrowdStrike • 2:07 mins: fastest recorded eCrime breakout time • 75% increase in cloud intrusions • 76% spike in data theft victims named on the dark web • 75% of attacks were malware-free 2024 CrowdStrike Report 7
  • 8. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Social Engineering Attacks • According to the 2024 Data Breach Investigations Report by Verizon, social engineering attacks account for 17% of all data breaches and 10% of cybersecurity incidents, making social engineering one of the three most common cyberattack vectors 8
  • 9. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Example • Mailchimp In January 2023, Mailchimp, a prominent platform for email marketing and newsletters, detected an unauthorized user within its infrastructure. • They stated that an intruder had gained access to one of the tools Mailchimp uses for user account administration and customer support. • The intruder had previously targeted Mailchimp employees and managed to get their account credentials through social engineering techniques. Afterward, the malicious actor used the compromised credentials to access data on 133 Mailchimp accounts. 9
  • 10. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Privilege Abuse • Organizations usually have many users with elevated privileges such as admins, technical specialists, and managers. Some can only access certain critical resources, such as specific databases or applications. • Others might have full access to every system in the network and even be able to create new privileged accounts without drawing anyone’s attention. If privileged users have malicious intent or have been compromised, it may lead to data breaches, financial fraud, sabotage, and other severe consequences. • Unfortunately, it’s hard to detect if a user with elevated access rights is abusing their privileges, as these culprits often cleverly conceal their actions. 10
  • 11. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Example • International Committee of the Red Cross (ICRC) • Malicious actors had compromised privileged accounts, used lateral movement techniques to escalate their privileges, and acted under the guise of admins to obtain sensitive data. 11
  • 12. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Data Leakage • Occurs when sensitive information is unintentionally exposed to unauthorized parties. • For example, a misconfigured cloud storage server might allow easy access to personally identifiable information (PII) and trade secrets 12
  • 13. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Example • Pegasus Airlines In June 2022 • Discovered an error in the configuration of one of their databases. • It turned out that an airline employee had misconfigured security settings and exposed 6.5 terabytes of the company’s valuable data. • As a result of the improper configuration of an AWS bucket, 23 million files with flight charts, navigation materials, and the crew’s personal information were available for the public to see and modify. 13
  • 14. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Insider Data Theft • Insiders may steal data for financial benefit, espionage purposes, ideological reasons, or because of a grudge. • For financial institutions, insider data theft may cause financial losses, reputational damage, loss of customer trust, and legal liabilities. 14
  • 15. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Example • In May 2023, two former employees stole and leaked Tesla’s confidential data to a German news outlet, Handelsblatt. • An investigation showed that malicious insiders breached the company’s IT security and data protection policies to unlawfully obtain and disclose 23,000 internal documents from Tesla, amounting to nearly 100 gigabytes of confidential information. • As a result, the personal information of 75,735 current and former Tesla employees was leaked and the company was at risk of facing a $3,3 billion fine for insufficient data protection 15
  • 16. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Intellectual property theft • Intellectual property is one of the most valuable types of data an organization possesses. • Bright ideas, innovative technologies, and complex formulas give businesses a competitive advantage. • It’s no surprise that malicious actors often target their victims’ trade secrets 16
  • 17. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Example • In May 2022, Apple sued Rivos, a chip development startup, for allegedly stealing trade secrets after Rivos hired away more than 40 former Apple employees. • Apple claimed that at least two of their former engineers took gigabytes of confidential information with them before joining Rivos. • Apple suggests that Rivos hired Apple’s former employees to work on competing system-on-chip (SoC) technology. • Apple spent billions of dollars and more than a decade of research to create the SoC designs that are now used in iPhones, iPads, and MacBooks. • Having access to SoC trade secrets would have significantly aided Rivos in competing against Apple. 17
  • 18. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Third Party Breaches • Having a sophisticated supply chain with numerous subcontractors, vendors, and third-party services is the norm for organizations these days. • However, granting third parties access to your network is associated with cybersecurity risks. • One of the reasons is that your third parties may not always follow all necessary security procedures. • Thus, there’s no guarantee that hackers won’t exploit your vendors’ vulnerabilities to access your organization’s assets. 18
  • 19. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Example • In March 2024, American Express informed its customers that unauthorized parties gained access to sensitive customer information through a breach in their merchant processor. • The breach was caused by a successful point-of-sale attack. American Express emphasized that its internal systems weren’t compromised during the incident. • However, the breach at the merchant processor leaked American Express customers’ sensitive data, such as names, current and former account numbers, and card expiration dates. 19
  • 20. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Phishing • A threat actor masquerades as a reputable entity or person in an email or other communication channel. • The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including extracting login credentials or account information from victims. • A more targeted type of phishing attack known as spear phishing occurs when the attacker invests time researching the victim to pull off an even more successful attack. 20
  • 21. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Malware • This is a broad term for malicious software for different types of malware that are installed on an enterprise's system. • Malware includes Trojans, worms, ransomware, adware, spyware and various types of viruses. • Some malware is inadvertently installed when an employee clicks on an ad, visits an infected website, or installs freeware or other software. • Signs of malware include unusual system activity, such as a sudden loss of disk space; unusually slow speeds; repeated crashes or freezes; an increase in unwanted internet activity; and pop-up advertisements. 21
  • 22. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification DDoS Attack • A threat actor launches a distributed denial-of- service attack to shut down an individual machine or an entire network so that it's unable to respond to service requests. • DoS attacks do this by flooding the target with traffic or sending it some information that triggers a crash. 22
  • 23. American Security and Privacy, LLC Emergency Management Certification Privacy Incidents 23
  • 24. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • Alteration of personal data – when personal data has been unlawfully changed. This could be, for example, data that is incorrectly updated on a system accidentally or deliberately. • Brute force attack – when an attacker tries a large number of possible keyword or password combinations to gain unauthorized access to a system or file. • Cryptographic flaw – a weakness in the security of a system that would allow a hacker to access sensitive information. • Data emailed to incorrect recipient – where an email containing personal data is sent to the wrong email address. This could be data about one person or multiple individuals. • Data of wrong data subject shown in client portal – where personal information about one or more individuals is shown within the Online service area belonging to another person. Privacy Incidents 24
  • 25. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • Data posted or faxed to incorrect recipient – where a fax or piece of post containing personal data is sent to the wrong fax number or postal address. This could be data about one person or multiple individuals. • Denial of service – when a network or server, such as a website, is maliciously flooded with manufactured traffic (typically using botnets) to either cause it to fail or flood it with so much traffic that legitimate users can't access it. • Failure to redact – when personal data was disclosed without the appropriate redaction, or if the redactions made were inadequate. • Failure to use bcc – when personal data was disclosed due to an organization not using blind carbon copy (bcc) recipients in an email. Usually bcc is used to ensure personal email addresses are not shared inappropriately with other customers, clients or organizations. Privacy Incidents 25
  • 26. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • Hardware/software misconfiguration – any hardware or software misconfiguration leading to a disclosure of information. For example, permissions on a folder set incorrectly, or failing to use a robot.txt file. • Incorrect disposal of hardware – computers, laptops or other devices are not fully cleared of personal data or had any personal data it contains otherwise anonymized or encrypted. • Incorrect disposal of paperwork – paperwork containing personal data has been disposed of without it being shredded or otherwise destroyed. Personal information should not be identifiable once paper files have been disposed of. • Loss/theft of device containing personal data – an electronic device (for example laptop, phone or tablet) containing personal information of others has been misplaced or stolen. This may be of particular concern if the data is not sufficiently secure, for example the device has not been encrypted. • Loss/theft of paperwork or data left in insecure location – papers containing personal data are not secured, for example locking the paperwork in a cabinet or similar; or papers are misplaced or stolen. Privacy Incidents 26
  • 27. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • Malware­– a general term used to refer to a variety of forms of hostile or intrusive software including computer viruses, worms, Trojan horses, spyware, adware, scareware, and other malicious programs. Malware is short for ‘malicious software’. • Phishing – an attempt to obtain information by posing as a trustworthy entity, deceiving recipients into sharing sensitive information (such as usernames, passwords, or credit card details) or by encouraging them to visit a fake website. • Ransomware – a type of malware that unlawfully encrypts a user’s files and demands a ransom to unencrypt files, usually in the form of cryptocurrency. • Unauthorized access – an unauthorized individual has gained access to personal data. This can include unauthorized disclosures. This incident type is used both in instances where an individual has unlawfully accessed or disclosed information and where a third party has forcibly accessed a system. • Verbal disclosure of personal data – when personal data is shared or disclosed verbally to an inappropriate party. Privacy Incidents 27
  • 28. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • Critical: A very high impact incident, such as a customer-facing service being down for all customers • Major: A significant impact incident, such as a customer-facing service being unavailable for some customers • Minor: A low impact incident, such as a minor inconvenience to customers Incident Response Levels 28
  • 29. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Level 1 A critical incident that affects a large number of users in production. Level 2 A significant problem affecting a limited number of users in production. Level 3 Causes errors, minor problems for users, or a heavy system load. Level 4 A minor problem that affects the service but no serious impact on users. Level 5 A low-level deficiency that causes minor problems Levels 29
  • 30. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification • The financial institution determines how many levels, their definitions, and the steps that will be taken based upon these levels. • Specific incidents can have more specific steps • Risk-based program Levels 30
  • 31. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Summary • Both security and privacy incidents need to be reflected in your incident response and business continuity plans • Risk-based approach • Identify the potential issues prior to them occurring 31
  • 32. American Security and Privacy, LLC Emergency Management Certification American Security and Privacy, LLC Emergency Management Certification Dr. Kevin Streff American Security and Privacy, LLC  Founder & Managing Partner  www.americansecurityandprivacy.com  Kevin.Streff@americansecurityandprivacy.com  605.270.4427 32 American Security and Privacy, LLC