Top Banner
A study conducted by Verizon Business Brief by Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT 2009 DATA BREACH INVESTIGATIONS REPORT 2009 DATA BREACH INVESTIGATIONS REPORT
36

Data Breach 2009 ISACA HI

Jul 05, 2015

Download

Documents

My 2009 DBIR presentation @ ISACA Hawaii.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data Breach 2009  ISACA HI

A study conducted by Verizon Business

Brief by Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEIT

2009 DATA BREACH INVESTIGATIONS REPORT2009 DATA BREACH INVESTIGATIONS REPORT

Page 2: Data Breach 2009  ISACA HI

This brief will cover thefollowing:

• My Conclusions• Quick Facts• Key Highlights• Findings, Conclusions,

and Countermeasures• TVM-Doing More For

Less• Summary of

Recommendations• Q & A

This brief will cover thefollowing:

• My Conclusions• Quick Facts• Key Highlights• Findings, Conclusions,

and Countermeasures• TVM-Doing More For

Less• Summary of

Recommendations• Q & A

Page 3: Data Breach 2009  ISACA HI
Page 4: Data Breach 2009  ISACA HI

QUICK FACTSQUICK FACTS

Page 5: Data Breach 2009  ISACA HI

All results are based on firsthand evidence collectedduring 90 data breach investigations occurring in 2008conducted by Verizon Business.

Only confirmed breaches are included. (not “data-at-risk”)

Most of the statistics presented refer to the percentageof cases, the percentage of records breached, or simplythe number of cases.

The authors make no claim that the findings of thisreport are representative of all data breaches in allorganizations at all times.

All results are based on firsthand evidence collectedduring 90 data breach investigations occurring in 2008conducted by Verizon Business.

Only confirmed breaches are included. (not “data-at-risk”)

Most of the statistics presented refer to the percentageof cases, the percentage of records breached, or simplythe number of cases.

The authors make no claim that the findings of thisreport are representative of all data breaches in allorganizations at all times.

Page 6: Data Breach 2009  ISACA HI

Roughly 20 percent of cases involved more than onebreach

Nearly half of the caseload had distinct patterns andcommonalities

A little over 1/3 of the cases were made public (so far)

Roughly 20 percent of cases involved more than onebreach

Nearly half of the caseload had distinct patterns andcommonalities

A little over 1/3 of the cases were made public (so far)

Page 7: Data Breach 2009  ISACA HI

KEY HIGHLIGHTSKEY HIGHLIGHTS

Page 8: Data Breach 2009  ISACA HI
Page 9: Data Breach 2009  ISACA HI
Page 10: Data Breach 2009  ISACA HI
Page 11: Data Breach 2009  ISACA HI

FINDINGS, CONCLUSIONS, ANDFINDINGS, CONCLUSIONS, ANDCOUNTERMEASURESCOUNTERMEASURES

Page 12: Data Breach 2009  ISACA HI
Page 13: Data Breach 2009  ISACA HI
Page 14: Data Breach 2009  ISACA HI
Page 15: Data Breach 2009  ISACA HI
Page 16: Data Breach 2009  ISACA HI
Page 17: Data Breach 2009  ISACA HI
Page 18: Data Breach 2009  ISACA HI
Page 19: Data Breach 2009  ISACA HI
Page 20: Data Breach 2009  ISACA HI
Page 21: Data Breach 2009  ISACA HI
Page 22: Data Breach 2009  ISACA HI
Page 23: Data Breach 2009  ISACA HI
Page 24: Data Breach 2009  ISACA HI
Page 25: Data Breach 2009  ISACA HI
Page 26: Data Breach 2009  ISACA HI
Page 27: Data Breach 2009  ISACA HI
Page 28: Data Breach 2009  ISACA HI
Page 29: Data Breach 2009  ISACA HI
Page 30: Data Breach 2009  ISACA HI
Page 31: Data Breach 2009  ISACA HI
Page 32: Data Breach 2009  ISACA HI
Page 33: Data Breach 2009  ISACA HI
Page 34: Data Breach 2009  ISACA HI

Align process with policyAchieve “Essential” then worry about “Excellent”Secure Business Partner ConnectionsCreate a Data Retention PlanControl data with transaction zonesMonitor event logsCreate an Incident Response PlanIncrease awarenessEngage in mock incident testingChanging default credentials is keyAvoid shared credentialsUser Account ReviewApplication Testing and Code ReviewSmarter Patch Management StrategiesHuman Resources Termination ProceduresEnable Application Logs and Monitor

Align process with policyAchieve “Essential” then worry about “Excellent”Secure Business Partner ConnectionsCreate a Data Retention PlanControl data with transaction zonesMonitor event logsCreate an Incident Response PlanIncrease awarenessEngage in mock incident testingChanging default credentials is keyAvoid shared credentialsUser Account ReviewApplication Testing and Code ReviewSmarter Patch Management StrategiesHuman Resources Termination ProceduresEnable Application Logs and Monitor

Page 35: Data Breach 2009  ISACA HI
Page 36: Data Breach 2009  ISACA HI

Hosam W. El Dakhakhni, CISSP, CISM, CISA, CIA, CGEITPrincipal - R!SC

Visit us at www.it-risc.comContact us at [email protected]