SlideShare a Scribd company logo
Retail: An Irresistible Target for Cyber Attacks
Pete Pouridis
Industry Expert
Pouridis Group, LLC
Scott Frost
CISO, Belk
Presented By
Retail – An Irresistible Target
Credit Card
Data
Dedicated
Attacker
Defenses:
• Tall Tower
• Electrical Lines
• Watchers
Metrics on Breaches
2014 Year of the Breach
Identity Theft Resource Center (ITRC)
Number of reported breaches hit a record high (783) – a 27.5% increase over 2013.
Regional chains increasingly becoming targets.
Business
(Retail, Hospitality and Tourism, Payment Processors,
etc.)
# of Reported Breaches: 258 # of Reported Records: 68,237,914
% of Reported Breaches: 33.0% % of Reported Records: 79.7%
• Business Expectations
• Targets, Vectors, Actors
• The Plan
• What Data To Protect
• Managing the Risk
• Incident Response
• Lessons Learned
Agenda
• Threats are Persistent v. Static
– Multi-Layered and Zero Day
• End Users (aka Customers) are an attack vector
– Technology Is In Their Hands
• Mobilization of Devices and Payments
– Company Issued v. BYOD
• Omni Strategy Business Model
– Marketing, Advertising and Creative
– “Front Door” Blurred Lines
Business Expectations
• High Awareness and Accountability
• Collecting More Data
– Privacy Spawns Loyalty “Opting In” Strategies
– Outsourcing and Off Shoring Data
– “The Cloud”
• High Price of Procuring Capital Funding
Business Expectations
• No One is Immune
• All Sectors – Large and Small
• Any Technology End Users
– Consumers, Employees, Children
• PCI and PII
• Social Engineering
– SPAM
– Whale and Spear PHISHING
– VISHING
• Conversion Rates
– eCommerce v. SPAMMers
• Capitalize on Fear and Greed
Targets and Vectors
The Actors
• State Funded
– i.e. China and Russia
• Organized Crime - ORC
• Individuals
• Hactivists and Social Groups
• Insider Threat
– Disgruntled Employee
– Corporate Espionage
The Plan
• Minimize Value of Data
– Tokenization and Encryption
• Focus Security Strategy on What Works
– Segmentation of Critical/Sensitive Data
– Two Factor Authentication
– Monitoring and Analytics
• Drill!! Drill!! Drill!
– Documented Incident Response Plan
– War Games and Tabletop Exercises
– Retain External SME’s (Breach Insurance, Communications, Forensics,…)
• Communication Strategy
– “Control The Message”
– Pre Website [hidden] page and Social Media Templates
• Define Company’s “Crown Jewels”
– Personally Identifiable Information (PII)
– Payment Card Industry (PCI)
– Intellectual Property (IP)
• Big Repositories
– Marketing/Advertising
– Loss Prevention/Asset Protection
– Human Resources
– Finance
• Perform Discovery
– 1:1 Interviews with Sys and Business Owners
– Regular assertions
– Vulnerability Scans – Incorporate with other mandatory scanning
– DLP Scans
Data To Protect
Managing The Risk
• Technology Platforms/Solutions
– Governance, Risk and Compliance (GRC)
– IT Security Operation Center (SOC)
– Firewalls, Network Segregation, SEIM/Event Logging
– Data Loss Prevention Solutions
– Internet Traffic Monitoring
– SPAM/Mail Administration
• Well Defined Data Protection Policies/Procedures
– Technical and Practical
– Permission Controls
– Strong Administration of System Credentials
– Two Factor Authentication for Remote and DB Users
• Awareness and Education
– Strong Passwords and Not Shared
– PHISHing
– End User/Customers
– Employees
• Storing Data
• Obtain Data
• Protecting Their Data
– Auditing
– Social Engineering Testing
– Vulnerability and Pen Testing
Managing The Risk
“When The Breach Occurs, The Time For Preparation Is Past”
• Incident Response Plan – Living, Breathing, Exercised
– Written (and shared)
– Drilled (often)
– Revised
• Essential Elements
– “Break glass” follow documented steps – stay focused
– Communications Plan (internal/external/when/how/who)
– Incident Response Partners (Public Relations, Forensics, Breach Insurance Carrier,
Acquiring Banks, FBI, …)
– Internal/External contact lists
– Dedicated crisis communications channels (secure email, conference bridges)
Incident Response
“When The Breach Occurs, The Time For Preparation Is Past”
• Key Members
– Core Team (HR, Legal, Communications/PR, Operations, Physical Security,
Cybersecurity, Network, Operations)
– Adhoc Team (Internal Business Partners, Other teams based on the incident)
• Essential Goals
– “Stop The Bleeding” – Identify IOC and Contain The Incident
– “Eradicate And Recover” – Restore Business Processes
– “Manage the Message” – Internal and External
– Document Your Steps
– Post-Incident Activities (Lessons Learned)
Incident Response
Lessons Learned
• Elimination – Tokenization and P2PE
• Segmentation, Monitoring, and Analytics
• Preparation and Prevention (Drill! Drill! Drill!)
• Communication
– Internal versus External
– Immediate, Direct, Honest, Frequent
– Control Social Media, Blogger, Pundits
• Focus on…
– Containment not Blame
– Communication not Spin
– Depend on Internal not External Resource
Nominate an attendee or speaker
from this session as a PROTECT MVP.
#PROTECTMVP
THANK YOU!
Scott Frost
CISO, Belk
Scott_Frost@belk.com
Pete Pouridis
Industry Expert,
Merchant and Retail
pete@pouridis.com

More Related Content

PPTX
Identity theft and data responsibilities
PDF
Building an insider threat program
PPTX
Pre-PostBreach_Are_Your_Ready
PPTX
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
PPTX
Moving to the Cloud: A Security and Hosting Introduction
PDF
2015 Atlanta CHIME Lead Forum
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
PDF
Identity theft and data responsibilities
Building an insider threat program
Pre-PostBreach_Are_Your_Ready
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Moving to the Cloud: A Security and Hosting Introduction
2015 Atlanta CHIME Lead Forum
Using Threat Intelligence to Address Your Growing Digital Risk

What's hot (20)

PPTX
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
PPTX
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
PPTX
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
PPT
Introduction to information security - by Ivan Nganda
PPTX
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
PPTX
NumaanHuq_Hackfest2015
PPTX
Cybersecurity Seminar March 2015
PPTX
2011 hildebrandt institute cio forum data privacy and security presentation...
PDF
Identity Intelligence: From Reactionary Support to Sustained Enabler
PPTX
Core Elements of Retail LP Shortened version 15MB
PDF
Practical approach to combating cyber crimes
PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PDF
Protecting Essential Information
PDF
2. Asset Security
PDF
Its not ITs problem
PPTX
Achieving Caribbean Cybersecuirty
PPT
Point of Sale Insecurity: A Threat to Your Business
PPT
Introduction to Information Security
PDF
Co3 rsc r5
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Introduction to information security - by Ivan Nganda
Integrated APT-IGA Solution - Future of IT Security (Vladislav Shapiro, Immer...
NumaanHuq_Hackfest2015
Cybersecurity Seminar March 2015
2011 hildebrandt institute cio forum data privacy and security presentation...
Identity Intelligence: From Reactionary Support to Sustained Enabler
Core Elements of Retail LP Shortened version 15MB
Practical approach to combating cyber crimes
CNIT 160 Ch 4c: Security Program Development (Part 3)
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Protecting Essential Information
2. Asset Security
Its not ITs problem
Achieving Caribbean Cybersecuirty
Point of Sale Insecurity: A Threat to Your Business
Introduction to Information Security
Co3 rsc r5
Ad

Viewers also liked (20)

PDF
4024+restarauntebook (1)
PDF
Silabo invope12015
PPTX
E i iii a yaquelyn puma mamani producto 2
PPTX
hidrocarburos
PPTX
El mito de cuniraya y cahuillaca
PDF
Project Management for IS-IT Professionals
PDF
LVWM_Beth Fisher
PDF
Heartland not Middleman
PPTX
Top 8 customer service liaison resume samples
DOCX
CV Pantazis 2
PPTX
Top 8 golf course mechanic resume samples
PPTX
Top 8 gui developer resume samples
PPTX
Top 8 chaplain assistant resume samples
PPTX
Top 8 general manager of a hotel resume samples
PPTX
Top 8 general manager of restaurant resume samples
PPTX
2015 NOLA_HHM_SE_PP_092015
PDF
2014 f 150
PDF
סרדיניה סופי
PPTX
Presentación
PPTX
Como conhecer a vontade de Deus
4024+restarauntebook (1)
Silabo invope12015
E i iii a yaquelyn puma mamani producto 2
hidrocarburos
El mito de cuniraya y cahuillaca
Project Management for IS-IT Professionals
LVWM_Beth Fisher
Heartland not Middleman
Top 8 customer service liaison resume samples
CV Pantazis 2
Top 8 golf course mechanic resume samples
Top 8 gui developer resume samples
Top 8 chaplain assistant resume samples
Top 8 general manager of a hotel resume samples
Top 8 general manager of restaurant resume samples
2015 NOLA_HHM_SE_PP_092015
2014 f 150
סרדיניה סופי
Presentación
Como conhecer a vontade de Deus
Ad

Similar to NRF Presentation v2 (20)

PDF
Incident Response
PDF
Robert beggs incident response teams - atlseccon2011
PPTX
Incident Response in the age of Nation State Cyber Attacks
PPTX
ISO27k Awareness presentation v2.pptx
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PDF
Road map for actionable threat intelligence
PPTX
ISO27k Awareness presentation.pptx
PPT
Meeting the cyber risk challenge
PPTX
Information Security Risk Management and Compliance.pptx
PPTX
Office 365 : Data leakage control, privacy, compliance and regulations in the...
PPTX
Deconstructing Data Breach Cost
PPTX
Unit II Developing Cyber Threat Intelligence Requirements.pptx
PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
PPTX
Cybersecurity by the numbers
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
PDF
Cybersecurity for Small Business
PDF
2015 Atlanta CHIME Lead Forum
PDF
2015 Atlanta CHIME Lead Forum
Incident Response
Robert beggs incident response teams - atlseccon2011
Incident Response in the age of Nation State Cyber Attacks
ISO27k Awareness presentation v2.pptx
Threat Intelligence 101 - Steve Lodin - Submitted
How to Mitigate Risk From Your Expanding Digital Presence
Road map for actionable threat intelligence
ISO27k Awareness presentation.pptx
Meeting the cyber risk challenge
Information Security Risk Management and Compliance.pptx
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Deconstructing Data Breach Cost
Unit II Developing Cyber Threat Intelligence Requirements.pptx
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
Cybersecurity by the numbers
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cybersecurity for Small Business
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum

NRF Presentation v2

  • 1. Retail: An Irresistible Target for Cyber Attacks Pete Pouridis Industry Expert Pouridis Group, LLC Scott Frost CISO, Belk Presented By
  • 2. Retail – An Irresistible Target Credit Card Data Dedicated Attacker Defenses: • Tall Tower • Electrical Lines • Watchers
  • 3. Metrics on Breaches 2014 Year of the Breach Identity Theft Resource Center (ITRC) Number of reported breaches hit a record high (783) – a 27.5% increase over 2013. Regional chains increasingly becoming targets. Business (Retail, Hospitality and Tourism, Payment Processors, etc.) # of Reported Breaches: 258 # of Reported Records: 68,237,914 % of Reported Breaches: 33.0% % of Reported Records: 79.7%
  • 4. • Business Expectations • Targets, Vectors, Actors • The Plan • What Data To Protect • Managing the Risk • Incident Response • Lessons Learned Agenda
  • 5. • Threats are Persistent v. Static – Multi-Layered and Zero Day • End Users (aka Customers) are an attack vector – Technology Is In Their Hands • Mobilization of Devices and Payments – Company Issued v. BYOD • Omni Strategy Business Model – Marketing, Advertising and Creative – “Front Door” Blurred Lines Business Expectations
  • 6. • High Awareness and Accountability • Collecting More Data – Privacy Spawns Loyalty “Opting In” Strategies – Outsourcing and Off Shoring Data – “The Cloud” • High Price of Procuring Capital Funding Business Expectations
  • 7. • No One is Immune • All Sectors – Large and Small • Any Technology End Users – Consumers, Employees, Children • PCI and PII • Social Engineering – SPAM – Whale and Spear PHISHING – VISHING • Conversion Rates – eCommerce v. SPAMMers • Capitalize on Fear and Greed Targets and Vectors
  • 8. The Actors • State Funded – i.e. China and Russia • Organized Crime - ORC • Individuals • Hactivists and Social Groups • Insider Threat – Disgruntled Employee – Corporate Espionage
  • 9. The Plan • Minimize Value of Data – Tokenization and Encryption • Focus Security Strategy on What Works – Segmentation of Critical/Sensitive Data – Two Factor Authentication – Monitoring and Analytics • Drill!! Drill!! Drill! – Documented Incident Response Plan – War Games and Tabletop Exercises – Retain External SME’s (Breach Insurance, Communications, Forensics,…) • Communication Strategy – “Control The Message” – Pre Website [hidden] page and Social Media Templates
  • 10. • Define Company’s “Crown Jewels” – Personally Identifiable Information (PII) – Payment Card Industry (PCI) – Intellectual Property (IP) • Big Repositories – Marketing/Advertising – Loss Prevention/Asset Protection – Human Resources – Finance • Perform Discovery – 1:1 Interviews with Sys and Business Owners – Regular assertions – Vulnerability Scans – Incorporate with other mandatory scanning – DLP Scans Data To Protect
  • 11. Managing The Risk • Technology Platforms/Solutions – Governance, Risk and Compliance (GRC) – IT Security Operation Center (SOC) – Firewalls, Network Segregation, SEIM/Event Logging – Data Loss Prevention Solutions – Internet Traffic Monitoring – SPAM/Mail Administration • Well Defined Data Protection Policies/Procedures – Technical and Practical – Permission Controls – Strong Administration of System Credentials – Two Factor Authentication for Remote and DB Users
  • 12. • Awareness and Education – Strong Passwords and Not Shared – PHISHing – End User/Customers – Employees • Storing Data • Obtain Data • Protecting Their Data – Auditing – Social Engineering Testing – Vulnerability and Pen Testing Managing The Risk
  • 13. “When The Breach Occurs, The Time For Preparation Is Past” • Incident Response Plan – Living, Breathing, Exercised – Written (and shared) – Drilled (often) – Revised • Essential Elements – “Break glass” follow documented steps – stay focused – Communications Plan (internal/external/when/how/who) – Incident Response Partners (Public Relations, Forensics, Breach Insurance Carrier, Acquiring Banks, FBI, …) – Internal/External contact lists – Dedicated crisis communications channels (secure email, conference bridges) Incident Response
  • 14. “When The Breach Occurs, The Time For Preparation Is Past” • Key Members – Core Team (HR, Legal, Communications/PR, Operations, Physical Security, Cybersecurity, Network, Operations) – Adhoc Team (Internal Business Partners, Other teams based on the incident) • Essential Goals – “Stop The Bleeding” – Identify IOC and Contain The Incident – “Eradicate And Recover” – Restore Business Processes – “Manage the Message” – Internal and External – Document Your Steps – Post-Incident Activities (Lessons Learned) Incident Response
  • 15. Lessons Learned • Elimination – Tokenization and P2PE • Segmentation, Monitoring, and Analytics • Preparation and Prevention (Drill! Drill! Drill!) • Communication – Internal versus External – Immediate, Direct, Honest, Frequent – Control Social Media, Blogger, Pundits • Focus on… – Containment not Blame – Communication not Spin – Depend on Internal not External Resource
  • 16. Nominate an attendee or speaker from this session as a PROTECT MVP. #PROTECTMVP THANK YOU! Scott Frost CISO, Belk Scott_Frost@belk.com Pete Pouridis Industry Expert, Merchant and Retail pete@pouridis.com

Editor's Notes

  • #3: Have this slide show the actual youtube video of the bear (https://www.youtube.com/watch?v=BwresrBSoS8) A bear, in Canada, climbed a tall electrical tower to reach “an irresistible target” – the nest of a pair of ravens to consume the eggs Though the ravens built their nest on the top of a tall structure, next to high powered electrical lines, and vigorously tried to defend their nest – they were no match for a dedicated attacker As long as retailers have credit card data in the clear – they will be an irresistible target by those with the means and skills to bypass whatever security controls the retailer has put in place.
  • #4: Slide sub-heading could be titled, 2013/2014/2015… Year of the Breaches Credit Card data exposures continues to climb
  • #6: Mobility and SmartDevices placed Technology in every ones control No longer just the select IT few Front Door – Unified Shopping Cart Ex: BOPS; BISO, BOSS
  • #7: High Awareness and Accountability Collecting more Data Privacy Spawns Loyalty – “Opting In” Outsourcing and Off Shoring Data “The Cloud” Capital Funds come with a high price
  • #11: Don’t Try and Boil the Ocean