Top Banner
© 2017 Jack Henry & Associates, Inc. ® 1 © 2017 Jack Henry & Associates, Inc. ® Security Awareness Training: Addressing Your Weakest Link Presented by: Patrick Barry and Karen Crumbley March 27, 2019
37

Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

May 27, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®1© 2017 Jack Henry & Associates, Inc.®

Security Awareness Training: Addressing Your Weakest Link

Presented by: Patrick Barry and Karen Crumbley

March 27, 2019

Page 2: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Session Objectives

• Define Information Security Awareness and

Cybersecurity Awareness Training

• Understand FFIEC guidance on Information Security and

Cybersecurity Awareness Training, Examiner Scrutiny

• Effective techniques; the science of human behavior

• How social engineering impacts security awareness

Page 3: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Insider Threat to Financial Institutions

https://iapp.org/news/a/data-indicates-human-error-prevailing-cause-of-breaches-incidents/

Page 4: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Guidance on Information Security and Cybersecurity Awareness

• FFIEC Information Technology Examination Handbook, Information Security, Appendix A: Examination Procedures

https://ithandbook.ffiec.gov/it-booklets/information-security/appendix-a-examination-procedures.aspx

• Cybersecurity Assessment Tool (CAT) Cybersecurity Maturity: Domain 1https://www.ffiec.gov/pdf/cybersecurity/FFIEC_CAT_May_2017_Cybersecurity_Maturity_June2.pdf

• FFIEC Information Technology Examination Handbook, IT Booklets

https://ithandbook.ffiec.gov/it-booklets/management.aspx

• FFIEC Information Technology Examination Handbook, Information Security Booklet

https://ithandbook.ffiec.gov/it-booklets/information-security.aspx

• 501b Gramm-Leach-Bliley Acthttps://www.ffiec.gov/exam/infobase/documents/02-con-501b_gramm_leach_bliley_act-991112.pdf

Page 5: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Understanding What Needs to be Protected

• Data Classification

– Three categories: Confidential, Sensitive, Public

• Non-public Information (NPI)

• Confidentiality, Integrity, and Availability

Page 6: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Threat Environment Actors

• Cyber Criminals

• Nation States

• Hacktivists

• Insiders

Page 7: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Threat Types

Page 8: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information
Page 9: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

Internet of Things (IoT)

Page 10: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

Internet of Things (IoT)

Page 11: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Clean Desk Policy

Page 12: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Clean Desk Policy

Page 13: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Document Shredding Procedures

Page 14: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Document Shredding Procedures

Page 15: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Shoulder Surfing

Page 16: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Shoulder Surfing

Page 17: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Situational Awareness

Page 18: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Situational Awareness

HEY YOU

THE PIN CODE FOR THE DOOR IS…..

1234

Page 19: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

USB Devices

Page 20: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

USB Devices

Page 21: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Social Media Communication

Page 22: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Social Media Communication

Page 23: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Social Media Communication

Page 24: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Password Security

Page 25: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

Password

Security

Page 26: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Password

Security

Page 27: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Mobile Devices

Page 28: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Mobile Devices

Page 29: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Phone Scams

Page 30: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Phone Scams

Custom Vishing Campaign Examples

– Try to gain account balance details acting as a distressed

customer at a car dealership

– Contact Bank personnel impersonating the IT Department,

looking to gain details about employee passwords

– Contact mortgage bankers to discuss a loan application

delivered via email – Dropbox with a malware tainted PDF

Page 31: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Unauthorized Visitors

Page 32: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Unauthorized Visitors

Page 33: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Unauthorized Visitors

Bank Social Engineering Engagement

Scenario: Working with IT Audit to review the server area and badges.

– Cloned a teller’s badge

– Access to the Sherriff’s office IT Closet, shared with the bank

– Provided 4 digit PIN to access the bank’s server closet

– Access to server/router/switches

Page 34: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information
Page 35: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

Phishing

Page 36: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

End User Policies and Incident Response Plans

• Incorporate into your Information Security and

Cybersecurity Awareness Programs

Page 37: Security Awareness Training: Addressing Your Weakest Link · 2020-02-22 · Security Awareness Training: Addressing Your Weakest Link ... Session Objectives • Define Information

© 2017 Jack Henry & Associates, Inc.®© 2019 Jack Henry & Associates, Inc.®

Questions

Patrick Barry – Rebyc Security [email protected]

Karen Crumbley – Gladiator [email protected]