Affect PROPRIETARY & CONFIDENTIAL March 4, 2010 Strategies - - PowerPoint PPT Presentation

affect proprietary confidential march 4 2010
SMART_READER_LITE
LIVE PREVIEW

Affect PROPRIETARY & CONFIDENTIAL March 4, 2010 Strategies - - PowerPoint PPT Presentation

Affect PROPRIETARY & CONFIDENTIAL March 4, 2010 Strategies MANAGING A HACK: Orchestrating Incident Response to Preserve Brand Reputation Cyber Security Summit Chicago Sept 26-27 th , 2018 Sandra Fathi President, Affect Email:


slide-1
SLIDE 1

PROPRIETARY & CONFIDENTIAL March 4, 2010 Affect Strategies

slide-2
SLIDE 2

PROPRIETARY & CONFIDENTIAL March 4, 2010 Affect Strategies

MANAGING A HACK: Orchestrating Incident Response to Preserve Brand Reputation

Sandra Fathi President, Affect Email: sfathi@affect.com tweet: @sandrafathi web: affect.com blog: techaffect.com

Cyber Security Summit Chicago

Sept 26-27th, 2018

slide-3
SLIDE 3

PROPRIETARY & CONFIDENTIAL

3 @sandrafath i

SECURITY EXPERIENCE

slide-4
SLIDE 4

PROPRIETARY & CONFIDENTIAL

4 @sandrafath i

CRISIS EXPERIENCE

  • Data Breaches, Identity Theft, Website Hacks, Malware (Multiple Companies)
  • Product Recall for Potential Lead Poisoning (Baby Product)
  • Hurricane Sandy, Hurricane Irene (ConEd)
  • Worker Strike, Manhole Cover Explosion, Building Explosion (ConEd)
  • Hit & Run (By Company Employee)
  • Sexual Harassment and Executive Misconduct (By CEO)
  • Executive Arrest for DUI
  • Terrorist Activity Interrupts Operations (Tech Company)
  • Foreign Mafia Threats on Executives (Tech Company)
  • Employee Kidnapping/Release by Militia (Tech Company)
slide-5
SLIDE 5

PROPRIETARY & CONFIDENTIAL

5 @sandrafath i

ANATOMY OF A BREACH

How does it start?

  • IT discovers a breach
  • Customers alert company regarding an issue
  • Anonymous post on a social network
  • Employee finds data for sale on the dark web
  • A journalist calls
  • A hacker makes contact
slide-6
SLIDE 6

PROPRIETARY & CONFIDENTIAL

6 @sandrafath i

BASIC INSTINCTS

1. Triage – Stop the bleeding 2. Diagnose – Identify the nature of the breach 3. Investigate – Find the root cause 4. Repair – Implement technical fix 5. Communicate – Inform executive team

  • Inform legal counsel
  • Inform marcom
  • Inform authorities
  • Inform customers
  • Inform media

Takes too long Doesn’t always happen

slide-7
SLIDE 7

PROPRIETARY & CONFIDENTIAL

7 @sandrafath i

SELF-PRESERVATION

Justifications

  • We don’t know if data was accessed
  • No critical data was accessed
  • It’s fixed. We’re out of danger
  • Very few customers were impacted
  • We don’t want to bring more attention to it
  • We don’t know all the facts, so we’ll wait until we do
  • We don’t want to appear incompetent
  • We don’t want to lose our jobs, customers, revenue etc.
slide-8
SLIDE 8

PROPRIETARY & CONFIDENTIAL

8 @sandrafath i

ALL 50 STATES

slide-9
SLIDE 9

PROPRIETARY & CONFIDENTIAL

9 @sandrafath i

ALL 50 STATES

slide-10
SLIDE 10

PROPRIETARY & CONFIDENTIAL

10 @sandrafath i

WHO’S IN THE ROOM

Crisis Drills/Tabletops

  • Tech Leadership
  • Executive Leadership
  • Legal Counsel
  • Operations
  • Communications***

Photo Credit: CyberBit

slide-11
SLIDE 11

PROPRIETARY & CONFIDENTIAL

11 @sandrafath i

FOUR PHASES OF CRISIS COMMUNICATION

slide-12
SLIDE 12

PROPRIETARY & CONFIDENTIAL

12 @sandrafath i

  • I. READINESS

Anticipating a Crisis

  • 1. Crisis Mapping (SWOT Analysis)
  • 2. Policies & Procedures (Prevention)
  • 3. Crisis Monitoring
  • 4. Crisis Communications Plan
  • Crisis Action Plan
  • Crisis Standard Communications Templates
  • Crisis Drills

Photo Credit: CyberTraining 365 Blog

slide-13
SLIDE 13

PROPRIETARY & CONFIDENTIAL

13 @sandrafath i

THREAT MAPPING

HR Sales Marketing Finance IT People Products Facilities Environment Information Other

Rank Order High Risk to Low Risk

slide-14
SLIDE 14

PROPRIETARY & CONFIDENTIAL

CHANNEL MAPPING

slide-15
SLIDE 15

PROPRIETARY & CONFIDENTIAL

  • II. RESPONSE
  • 1. Develop materials:
  • Messages/FAQ
  • Prepared statements
  • Press release template
  • Customer letters
  • 2. Train employees
  • Awareness
  • Anticipation
  • Organizational Preparation
  • 3. Prepare channels:
  • Hotline
  • Dark site
  • Social Media
  • 4. Data Breach/Customer Assistance

Resources

  • Microsite/Landing Page FAQ
  • Identity Theft Remediation Services
  • Force Password/Account

Information Change

  • Special Customer Advocate/Team
slide-16
SLIDE 16

PROPRIETARY & CONFIDENTIAL

PREPARING A RESPONSE

  • 1. Don’t delay
  • 2. Acknowledge situation
  • 3. Acknowledge impact and victims or potential victims
  • 4. Commit to investigate
  • 5. Commit to sharing information and cooperation with relevant

parties

  • 6. Share corrective action plan if available
  • 7. Respond in the format in which the crisis was received**

@sandrafathi

slide-17
SLIDE 17

PROPRIETARY & CONFIDENTIAL

PUBLIC BREACH NOTIFICATIONS

@sandrafathi

  • 1. What happened?
  • 2. What do we know?
  • 3. Who/what was impacted?
  • 4. How do we feel about it?
  • 5. What are we going to do about it?
  • 6. When are we going to do it?
  • 7. Who is involved in this process?
  • 8. When/how will we communicate next?
slide-18
SLIDE 18

PROPRIETARY & CONFIDENTIAL

CUSTOMER COMMUNICATION

  • 1. Introduction: Why are we contacting you?
  • 2. What happened?
  • 3. What information was compromised?
  • 4. What are we doing to remedy the situation?
  • 5. What can you do to prevent/mitigate further risk?
  • 6. Where can you find more information?

@sandrafathi

slide-19
SLIDE 19

PROPRIETARY & CONFIDENTIAL

  • III. REASSURANCE

Who to Reassure? - All Stakeholders: Customers, Prospects, Public, Shareholders, Employees, Partners, Media etc.

  • 1. Develop full response plan
  • Policies & procedures
  • Technology
  • People
  • 2. Put plan into action: Immediate remedy
  • 3. Communicate results of plan and impact
  • 4. Reaffirm commitment to correction
  • 5. Demonstrate results of program

@sandrafathi

slide-20
SLIDE 20

PROPRIETARY & CONFIDENTIAL

  • IV. RECOVERY

Rebuilding reputation, trust and customer loyalty Implementing preventative measures for long-term crisis mitigation and/or prevention

  • 1. Review need for operational, regulatory, environmental and

employee changes

  • 2. Develop long-term plan including policies and prevention tactics
  • 3. Reassess crisis plan
  • 4. Regain customer/public trust

@sandrafathi

slide-21
SLIDE 21

PROPRIETARY & CONFIDENTIAL

21 @sandrafath i

CASE STUDY: EQUIFAX

  • March – Apache vulnerability discovered,

patch issued next day

  • May-July – Hackers infiltrate Equifax servers

with more than 9,000 requests. ~145M records are accessed, nearly 44% of US Population

  • July 29 – Equifax discovers breach
  • Sept 7 - Equifax issues public statement
  • Sept 8 – Equifax shares plunge 13.7%
  • Sept 12 – CEO apologizes in USA Today Op-Ed
  • Sept 15 - Equifax announces CIO & CSO are

retiring

  • Sept 21 – Equifax admits sending victims to

bogus website ‘securityequifax2017.com’

  • Sept 26 – CEO retires
  • Oct 3 – Former CEO testifies for the first time

(of four) in Congress

slide-22
SLIDE 22

PROPRIETARY & CONFIDENTIAL

22 @sandrafath i

MEDIA REACTIONS

slide-23
SLIDE 23

PROPRIETARY & CONFIDENTIAL

23 @sandrafath i

CONSEQUENCES TO DATE

  • CEO, CIO, CSO ‘Retire’
  • 2 employees indicted for insider trading (CIO & Developer)
  • CEO testifies at 4 Congressional hearings
  • 8 State bank regulators impose orders for increasing security, auditing and

reporting

  • CA passes law imposes sanctions/fines for each data breach (up to $750 per

record, effective Jan 2020)

  • AL & ND penalties for delayed notifications (60 days/$10K and 45 day/$5K)
  • Federal bill for FREE credit ‘freeze’ and ‘thaw’ from all three large bureaus

(previously $5-$10 each)

  • 30+ Consumer class action suits
slide-24
SLIDE 24

PROPRIETARY & CONFIDENTIAL

24 @sandrafath i

BEST PRACTICES I

  • 1. Implement Policies to Address Potential Vulnerabilities
  • 2. Establish a Regular Review Cycle for Crisis Preparation
  • 3. Establish Inter-Departmental Cooperation
  • 4. Establish a Framework for Response
  • 5. Build a Crisis Communications Toolkit
slide-25
SLIDE 25

PROPRIETARY & CONFIDENTIAL

25 @sandrafath i

BEST PRACTICES II

  • 6. Know Where & How to Respond
  • 7. Prepare Your Employees in Advance
  • 8. Establish Assistance Services for those Impacted
  • 9. Know the Relevant Legal & Regulatory Requirements
  • 10. Be Honest, Be Transparent
slide-26
SLIDE 26

PROPRIETARY & CONFIDENTIAL March 4, 2010 Affect Strategies

Sandra Fathi President, Affect Email: sfathi@affect.com tweet: @sandrafathi web: affect.com blog: techaffect.com

Slides Available: Slideshare.net/sfathi