(Go: >> BACK << -|- >> HOME <<)

SlideShare a Scribd company logo
© International Institute for Learning, Inc., All rights reserved. 1
Intelligence, Integrity and Innovation
© International Institute for Learning, Inc., All rights reserved.
Thank you for joining us today.
This webinar is brought to you by IIL – a global leader in:
Project, Program and Portfolio Management
Microsoft® Project and Project Server
Lean Six Sigma | Business Analysis
Agile | PRINCE2® | ITIL®
Leadership and Interpersonal Skills
Data Security Breach
The Sony & Staples Story
© International Institute for Learning, Inc., All rights reserved. 2
Intelligence, Integrity and Innovation
Global IIL Companies
IIL US
IIL Asia (Singapore)
IIL Australia
IIL Brasil
IIL Canada
IIL China
IIL Europe (United Kingdom)
IIL Finland
IIL France
IIL Germany
IIL Hong Kong
IIL Hungary
IIL India
IIL Japan
IIL Korea (Seoul)
IIL México
IIL Middle East (Dubai)
IIL Spain
© International Institute for Learning, Inc., All rights reserved. 3
Intelligence, Integrity and Innovation
In today’s world, companies generate and consume massive
amounts of data, as a day-to-day prerequisite of doing business.
This accumulated data becomes the most strategic asset of the
organization and more often than not gives a competitive
advantage in the market.
This critical nature of data makes it the new corporate target!
Data
© International Institute for Learning, Inc., All rights reserved. 4
Intelligence, Integrity and Innovation
Data security involves protecting data from the unwanted
actions of unauthorized users.
BUT
Data security must not come at the cost of not being available
when necessary.
Data Security
© International Institute for Learning, Inc., All rights reserved. 5
Intelligence, Integrity and Innovation
A security breach is any incident that results in unauthorized
access of data, applications, services, networks, and/or devices
by perpetrators bypassing underlying security mechanisms.
Security Breach
© International Institute for Learning, Inc., All rights reserved. 6
Intelligence, Integrity and Innovation
Data Breaches – Causes
© International Institute for Learning, Inc., All rights reserved. 7
Intelligence, Integrity and Innovation
“Well-meaning” insiders: who have no intention to breach but
inadvertently do so because they fail to follow security policies.
‒ Lost devices
‒ Exposed data – no measures in place
‒ Poor business processes
Targeted Attacks: Coordinated effort involving humans or
automated software to cyber attack another individual, entity or
organization.
‒ System vulnerabilities
‒ Malware
‒ Stolen credentials
Data Breaches Occur Through:
© International Institute for Learning, Inc., All rights reserved. 8
Intelligence, Integrity and Innovation
Malicious insiders: who intentionally breach security policies.
Terminated employees
Company data stored on home computers for career
progression
Industrial espionage
Data Breaches Occur Through:
© International Institute for Learning, Inc., All rights reserved. 9
Intelligence, Integrity and Innovation
Incursion: Hackers break into the company's network by
exploiting system vulnerabilities.
Discovery: The hacker maps out the organization's systems and
automatically scans for confidential data.
Capture: Exposed data on unprotected systems is immediately
accessed. Components called root kits are surreptitiously
installed on targeted systems and networks.
Exfiltration: Confidential data is sent back to the hacker team.
The Anatomy of a Data Breach
© International Institute for Learning, Inc., All rights reserved. 10
Intelligence, Integrity and Innovation
The Anatomy of a Data Breach
© International Institute for Learning, Inc., All rights reserved. 11
Intelligence, Integrity and Innovation
Damaged Intellectual Property: Blueprints, technical
specifications, designs, launch plans
Revenue Lost: Downtime
Theft: Bank information, transfer codes
Vandalism: False or discrediting information
Ruined reputation
Consequences of a Security Breach
© International Institute for Learning, Inc., All rights reserved. 12
Intelligence, Integrity and Innovation
Confidentiality, integrity, and availability, also known as the CIA
triad, is a model designed to guide policies for information security
within an organization.
Balances the competing requirements of confidentiality, integrity,
and integrity with equal emphasis on each.
Information Security Basics:
The CIA Triad
© International Institute for Learning, Inc., All rights reserved. 13
Intelligence, Integrity and Innovation
Confidentiality is required to prevent sensitive information from
reaching the wrong people.
Simple ways of ensuring confidentiality: data encryption, user
IDs and passwords or, for highly sensitive information, in hard-
copy form only.
More advanced techniques: storage on air-gapped computers,
disconnected storage devices.
Confidentiality
© International Institute for Learning, Inc., All rights reserved. 14
Intelligence, Integrity and Innovation
Integrity involves maintaining the consistency, accuracy, and
trustworthiness of data over its entire life cycle.
Data must not be changed in transit, and steps must be taken to
ensure that data cannot be altered by unauthorized people.
Techniques include the use of checksums and hashing.
Integrity
© International Institute for Learning, Inc., All rights reserved. 15
Intelligence, Integrity and Innovation
Data is meant to be used, when needed, by those authorized to
use it.
Techniques implemented to implement confidentiality and
integrity must not compromise on the availability of information.
Availability of data can be improved through implementing
redundancy, failover, RAID.
Availability
© International Institute for Learning, Inc., All rights reserved. 16
Intelligence, Integrity and Innovation
Part 1: The Sony Story
© International Institute for Learning, Inc., All rights reserved. 17
Intelligence, Integrity and Innovation
It was a release of confidential data belonging to Sony Pictures
Entertainment on November 24, 2014.
100 terabytes of data was stolen containing:
Personal information about Sony Pictures’ employees and
their families
E-mails between employees
Information about executive salaries at the company
Copies of unreleased Sony films
Sony Pictures Entertainment Hack – 2014
© International Institute for Learning, Inc., All rights reserved. 18
Intelligence, Integrity and Innovation
It is alleged that the attack was orchestrated by a group calling
themselves the “Guardians of Peace” or GOP.
There are alternate theories proposing that the Government of
North Korea and even former Sony employees were behind the
attack.
By whom?
© International Institute for Learning, Inc., All rights reserved. 19
Intelligence, Integrity and Innovation
A malware called Wiper has been identified as the agent used in
the attack and was responsible for destroying data on the
target's hard disk (or similar storage) on systems running
Microsoft® Windows.
The malware comes wrapped in an executable “dropper” that
installs it and supporting files. In this case, the “dropper” installs
itself as a Windows service when executed.
How was the Breach Orchestrated?
© International Institute for Learning, Inc., All rights reserved. 20
Intelligence, Integrity and Innovation
The malware service appears to create a network file share –
which points to the location of Windows system files in the PC’s
file directory structure (usually WINDOWS).
It then gives unrestricted access to that share, allowing any
other computer on the local network to access it.
Mechanics of the Attack
© International Institute for Learning, Inc., All rights reserved. 21
Intelligence, Integrity and Innovation
The dropper then communicates with a set of IP addresses in
Japan, possibly connected to Sony's corporate network. Then it
shuts itself down.
At some point – either based on a hard-coded time within the
malware package or after some other communication with the
attackers – the nasty part of the malware package gets
launched.
Mechanics of the Attack – II
© International Institute for Learning, Inc., All rights reserved. 22
Intelligence, Integrity and Innovation
Wiper then communicates with 3 IP addresses (one each in Italy,
Poland, and Thailand) to transfer the contents of the computer.
The malware starts accessing the hard drive and deleting its
contents sector by sector.
Once it’s complete, it suspends Windows for two hours, then
reboots the computer when it wakes.
At this point, the drive is completely wiped out – even making
physical changes to the hard drive.
Coup de Grâce
© International Institute for Learning, Inc., All rights reserved. 23
Intelligence, Integrity and Innovation
An e-mail released in the hack showed that Angelina Jolie
wanted David Fincher to direct her film Cleopatra.
In another e-mail, Scott Rudin referred to Jolie as "a minimally
talented spoiled brat“.
Several future Sony Pictures films, including Annie, Mr. Turner,
Still Alice, and To Write Love on Her Arms, were also leaked.
The Saucier Bits in the Stolen Data
© International Institute for Learning, Inc., All rights reserved. 24
Intelligence, Integrity and Innovation
Industry estimates that the data breach will cost Sony about
Y100 billion, or $1.25 billion from:
Lost business,
Various compensation costs and
New investments
Consequences for Sony
© International Institute for Learning, Inc., All rights reserved. 25
Intelligence, Integrity and Innovation
Maybe not! But the consequences could have been lesser if:
Sensitive IPR data was segregated
Back-up networks were disconnected from the primary network
so that back-ups are not affected.
The malware was identified early by having up-to-date patches.
The infected machine(s) were isolated immediately after
detection.
Sony had learned from the Sony 2011 PlayStation incident and
educated its users on what to look out for.
Could It Have Been Prevented?
© International Institute for Learning, Inc., All rights reserved. 26
Intelligence, Integrity and Innovation
Part 2: The Staples Story
© International Institute for Learning, Inc., All rights reserved. 27
Intelligence, Integrity and Innovation
Cardholder names, card numbers, expiration dates, and card
verification codes of 1.16 million customer credit and debit cards
used at 119 Staples locations in 35 American states.
This data was stolen over a period of up to six months.
Staples Data Breach 2014
© International Institute for Learning, Inc., All rights reserved. 28
Intelligence, Integrity and Innovation
It is alleged that a cybercrime gang using malware known as
Anunak was behind the Staples breach.
This same gang is believed to behind breaches at Sheplers (a
cowboy apparel chain) and Bebe (a women's clothing retailer),
as well as attacks on the Russian banking sector.
By whom?
© International Institute for Learning, Inc., All rights reserved. 29
Intelligence, Integrity and Innovation
Speculation is that the malware was cascaded using one of these
two methods:
Method 1:
Using rented computers called “BotNets”, Anunak members
sent phishing e-mails to the company’s employees.
The e-mails may have appeared to be from the Central Bank
of the Russian Federation, but actually contained malware
designed to infect the employees' computers.
Method 2:
A company-wide update might have pushed this malware to
all PoS terminals
How was the Breach Orchestrated?
© International Institute for Learning, Inc., All rights reserved. 30
Intelligence, Integrity and Innovation
The malware then infects the Point of Sale (PoS) terminals to
capture the information from cards swiped on these terminals.
Once the stolen card information was located the PoS’ memory,
after a card swipe, it is transmitted to a programmed IP where
the stolen data reaches the attackers.
Mechanics of the Attack – II
© International Institute for Learning, Inc., All rights reserved. 31
Intelligence, Integrity and Innovation
The attack cost Target $148 million, and cost financial
institutions $200 million.
Profits fell 46 percent in the fourth quarter of 2013.
Resignation of Beth M. Jacob, the company’s most senior
technology officer in February, and Gregg Steinhafel, CEO and
chairman of the board, in May.
Consequences for Staples
© International Institute for Learning, Inc., All rights reserved. 32
Intelligence, Integrity and Innovation
This attack may have been prevented if:
Secure readers for card data capture were used
Encrypting of data, upstream of the POS, all the way to the
payment processing host, beyond the retail store network was
done
No live data was stored on the PoS memory
Exclusive use of chip and pin cards
Prevention Methods
© International Institute for Learning, Inc., All rights reserved. 33
Intelligence, Integrity and Innovation
Data security breaches have the power to cripple a corporation
and often result in large losses, both monetary and non-
monetary.
Techniques for preventing breaches:
Stop targeted attacks through a combination of policies, patches,
encryption, and isolation.
Keep aligned with the global security intelligence.
Actively identify the most sensitive information.
Automate IT controls to prevent human errors and internal theft.
Prevent data exfiltration once stolen [Isolation and Disconnection]
Closing Notes
© International Institute for Learning, Inc., All rights reserved. 34
Intelligence, Integrity and Innovation
 White Paper, “Why breaches happen and what to do about it?”
 2014 Sony Pictures Entertainment hack,
http://en.wikipedia.org/wiki/Sony_Pictures_Entertainment_hack
 Wiper Malware – A detection deep dive
http://blogs.cisco.com/security/talos/wiper-malware
 Inside the “wiper” malware that brought Sony Pictures to its knees
http://arstechnica.com/security/2014/12/inside-the-wiper-malware-
that-brought-sony-pictures-to-its-knees/
 Wiper (malware) http://en.wikipedia.org/wiki/Wiper_%28malware%29
 Target Hit by Credit-Card Breach
http://www.wsj.com/articles/SB100014240527023047731045792667432
30242538
References:
© International Institute for Learning, Inc., All rights reserved. 35
Intelligence, Integrity and Innovation
We invite you to get a closer look at what IIL can do for you
and your organization, by visiting www.iil.com or email
learning@iil.com and let us know how we can meet your
learning needs.
Please connect with IIL Socially:
Like us on: facebook.com/IIL.inc
Follow us: twitter.com/IILGLOBAL
Join our Discussions on LinkedIn
At IIL, Our Greatest Accomplishments are Yours

More Related Content

What's hot

Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
VarunLala2
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
Ana Meskovska
 
WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
Dinesh O Bareja
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
Kirti Ahirrao
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
RickWaldman
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
Kudzai Rerayi
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
Lancope, Inc.
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
PECB
 
NSA: Edward Snowden Case Study
NSA: Edward Snowden Case StudyNSA: Edward Snowden Case Study
NSA: Edward Snowden Case Study
Michael Nickle
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
Shethwala Ridhvesh
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
Dhrumil Panchal
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
Information security
Information securityInformation security
Information security
Sina Bagherinezhad
 

What's hot (20)

Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Cyber breach at target.pptx
Cyber breach at target.pptxCyber breach at target.pptx
Cyber breach at target.pptx
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
NSA: Edward Snowden Case Study
NSA: Edward Snowden Case StudyNSA: Edward Snowden Case Study
NSA: Edward Snowden Case Study
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Information security
Information securityInformation security
Information security
 

Viewers also liked

Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Cyphort
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
Baltimax
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
Dylan Holbrook
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
Seculert
 
Sony case study
Sony case studySony case study
Sony case study
surabhi agarwal
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
corelink11
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
GuardEra Access Solutions, Inc.
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
Rohana K Amarakoon
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
Ashley Chase
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
Eversheds Sutherland
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
Bradford Bach
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
Wasef Al-Hakim
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
dnomura
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
AlienVault
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
Edge Pereira
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
YanivTaieb
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].
Alexander Decker
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army
blackflags
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
Matthew Rosenquist
 

Viewers also liked (20)

Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
Sony case study
Sony case studySony case study
Sony case study
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Sony Pictures Entertainment Case A
Sony Pictures Entertainment Case ASony Pictures Entertainment Case A
Sony Pictures Entertainment Case A
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
And automotive gas oil [ago].
 And automotive gas oil [ago]. And automotive gas oil [ago].
And automotive gas oil [ago].
 
Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army Terrorism & Human Rights Violation By Pakistani Facist Army
Terrorism & Human Rights Violation By Pakistani Facist Army
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 

Similar to Data Security Breach: The Sony & Staples Story

Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
GFI Software
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
Mukesh Chinta
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
YazanSalileh
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
Irsandi Hasan
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
EhabRushdy1
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Fidelis Cybersecurity
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
Jenna Murray
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
Simone Onofri
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
Jeff Lemmermann
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
360mnbsu
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
RamaNingaiah
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
Ian Dave Balatbat
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
ssuser6c59cb
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
Somesh Kumar
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
IBM Government
 

Similar to Data Security Breach: The Sony & Staples Story (20)

Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Network security
Network securityNetwork security
Network security
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis ElevateInsider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
IT-Security-20210426203847.ppt
IT-Security-20210426203847.pptIT-Security-20210426203847.ppt
IT-Security-20210426203847.ppt
 
Security information for internet and security
Security information  for  internet and securitySecurity information  for  internet and security
Security information for internet and security
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 

More from International Institute for Learning

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
International Institute for Learning
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
International Institute for Learning
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
International Institute for Learning
 
PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification
International Institute for Learning
 
2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR) 2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR)
International Institute for Learning
 
Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business
International Institute for Learning
 
Applying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in HealthcareApplying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in Healthcare
International Institute for Learning
 
Global Business Etiquette
Global Business Etiquette Global Business Etiquette
Global Business Etiquette
International Institute for Learning
 
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideThe Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
International Institute for Learning
 
Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication
International Institute for Learning
 
Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...
International Institute for Learning
 
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
International Institute for Learning
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
International Institute for Learning
 
Emerging Trends in PMO Governance
Emerging Trends in PMO Governance Emerging Trends in PMO Governance
Emerging Trends in PMO Governance
International Institute for Learning
 
Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server
International Institute for Learning
 
Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma
International Institute for Learning
 
Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!
International Institute for Learning
 
Grateful Leadership
Grateful Leadership Grateful Leadership
CAPM® EDGE
CAPM® EDGECAPM® EDGE
Knowledge Management Principles for Project Managers
Knowledge Management Principles for Project ManagersKnowledge Management Principles for Project Managers
Knowledge Management Principles for Project Managers
International Institute for Learning
 

More from International Institute for Learning (20)

Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!Developing an Agile Schedule in Microsoft Project - It is Possible!
Developing an Agile Schedule in Microsoft Project - It is Possible!
 
Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013Expand Your Communication Skills within Microsoft Project 2013
Expand Your Communication Skills within Microsoft Project 2013
 
PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification PMI Professional in Business Analyisis (PMI-PBA) Certification
PMI Professional in Business Analyisis (PMI-PBA) Certification
 
2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR) 2015 - New PMI Continuing Certification Requirements (CCR)
2015 - New PMI Continuing Certification Requirements (CCR)
 
Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business Leverage the Power of Coaching within Your Projects and Business
Leverage the Power of Coaching within Your Projects and Business
 
Applying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in HealthcareApplying Lean Six Sigma in Healthcare
Applying Lean Six Sigma in Healthcare
 
Global Business Etiquette
Global Business Etiquette Global Business Etiquette
Global Business Etiquette
 
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the RideThe Pharmaceutical Project Roller Coaster: How to Improve the Ride
The Pharmaceutical Project Roller Coaster: How to Improve the Ride
 
Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication Project Management in the Cloud: Dynamic Communication
Project Management in the Cloud: Dynamic Communication
 
Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...Improving Business Writing: How to Write Communications That Are Retrieved, R...
Improving Business Writing: How to Write Communications That Are Retrieved, R...
 
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
Risks - Threats and Opportunities: How Not to Bury Your Head in the Sand
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
 
Emerging Trends in PMO Governance
Emerging Trends in PMO Governance Emerging Trends in PMO Governance
Emerging Trends in PMO Governance
 
Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server Critical Success Factors for Optimal Use of Project Server
Critical Success Factors for Optimal Use of Project Server
 
Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma Improving Project Management Skills with Lean Six Sigma
Improving Project Management Skills with Lean Six Sigma
 
Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!Webinar: Metrics Management - Be Careful What You Wish For!
Webinar: Metrics Management - Be Careful What You Wish For!
 
Grateful Leadership
Grateful Leadership Grateful Leadership
Grateful Leadership
 
CAPM® EDGE
CAPM® EDGECAPM® EDGE
CAPM® EDGE
 
Knowledge Management Principles for Project Managers
Knowledge Management Principles for Project ManagersKnowledge Management Principles for Project Managers
Knowledge Management Principles for Project Managers
 

Recently uploaded

Matka Boss otg Satta Matta Matka Kalyan Matka Indian Matka
Matka Boss otg Satta Matta Matka Kalyan Matka Indian MatkaMatka Boss otg Satta Matta Matka Kalyan Matka Indian Matka
Matka Boss otg Satta Matta Matka Kalyan Matka Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Satta Matka Kalyan Satta Matka guessing.
Satta Matka Kalyan Satta Matka guessing.Satta Matka Kalyan Satta Matka guessing.
Satta Matka Kalyan Satta Matka guessing.
Matka Guessing ❼ʘ❷ʘ❻❻➃➆➆➀ Matka Result
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Indian Matka Dpboss Matka guessing satta matka kalyan matka
Indian Matka Dpboss Matka guessing satta matka kalyan matkaIndian Matka Dpboss Matka guessing satta matka kalyan matka
Indian Matka Dpboss Matka guessing satta matka kalyan matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otgSatta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Satta Matta Matka 143 Matka Boss DP boss
Satta Matta Matka 143 Matka Boss DP bossSatta Matta Matka 143 Matka Boss DP boss
Satta Matta Matka 143 Matka Boss DP boss
Matka Guessing ❼ʘ❷ʘ❻❻➃➆➆➀ Matka Result
 
nika_myrthil_EB_fb1_2024-06.pptxpj......
nika_myrthil_EB_fb1_2024-06.pptxpj......nika_myrthil_EB_fb1_2024-06.pptxpj......
nika_myrthil_EB_fb1_2024-06.pptxpj......
NikaMyrthil
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
DPBOSS GUESSING KALYAN SATTA MATKA KALYAN CHATRT
DPBOSS GUESSING KALYAN SATTA MATKA KALYAN CHATRTDPBOSS GUESSING KALYAN SATTA MATKA KALYAN CHATRT
How AI is Disrupting Service Industry More Than Design Thinking
How AI is Disrupting Service Industry More Than Design ThinkingHow AI is Disrupting Service Industry More Than Design Thinking
How AI is Disrupting Service Industry More Than Design Thinking
Body of Knowledge
 
Satta Matka Dpboss Kalyan Matka Result matka boss otg
Satta Matka Dpboss Kalyan Matka Result matka boss otgSatta Matka Dpboss Kalyan Matka Result matka boss otg
Indian Matka Dpboss Matka Guessing Tara Matka boss otg
Indian Matka Dpboss Matka Guessing Tara Matka boss otgIndian Matka Dpboss Matka Guessing Tara Matka boss otg
Kalyan Satta Matka Guessing Dp boss..143
Kalyan Satta Matka Guessing Dp boss..143Kalyan Satta Matka Guessing Dp boss..143
Kalyan Satta Matka Guessing Dp boss..143
Matka Guessing ❼ʘ❷ʘ❻❻➃➆➆➀ Matka Result
 
Matka boss otg Satta Matta Matka Indian Matka Dpboss Matka Guessing
Matka boss otg Satta Matta Matka Indian Matka Dpboss Matka GuessingMatka boss otg Satta Matta Matka Indian Matka Dpboss Matka Guessing
Matka boss otg Satta Matta Matka Indian Matka Dpboss Matka Guessing
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Matka boss otg satta matka kalyan matka Dpboss Matka guessing Indian Matka
Matka boss otg satta matka kalyan matka Dpboss Matka guessing Indian MatkaMatka boss otg satta matka kalyan matka Dpboss Matka guessing Indian Matka
Matka boss otg satta matka kalyan matka Dpboss Matka guessing Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Matka guessing satta Matta matka Dpboss Matka boss otg
Matka guessing satta Matta matka Dpboss  Matka boss otgMatka guessing satta Matta matka Dpboss  Matka boss otg
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg
➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg
➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian Matka
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian MatkaSatta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian Matka
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 

Recently uploaded (20)

Matka Boss otg Satta Matta Matka Kalyan Matka Indian Matka
Matka Boss otg Satta Matta Matka Kalyan Matka Indian MatkaMatka Boss otg Satta Matta Matka Kalyan Matka Indian Matka
Matka Boss otg Satta Matta Matka Kalyan Matka Indian Matka
 
Satta Matka Kalyan Satta Matka guessing.
Satta Matka Kalyan Satta Matka guessing.Satta Matka Kalyan Satta Matka guessing.
Satta Matka Kalyan Satta Matka guessing.
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka boss otg
 
Indian Matka Dpboss Matka guessing satta matka kalyan matka
Indian Matka Dpboss Matka guessing satta matka kalyan matkaIndian Matka Dpboss Matka guessing satta matka kalyan matka
Indian Matka Dpboss Matka guessing satta matka kalyan matka
 
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otgSatta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg
 
Satta Matta Matka 143 Matka Boss DP boss
Satta Matta Matka 143 Matka Boss DP bossSatta Matta Matka 143 Matka Boss DP boss
Satta Matta Matka 143 Matka Boss DP boss
 
nika_myrthil_EB_fb1_2024-06.pptxpj......
nika_myrthil_EB_fb1_2024-06.pptxpj......nika_myrthil_EB_fb1_2024-06.pptxpj......
nika_myrthil_EB_fb1_2024-06.pptxpj......
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
DPBOSS GUESSING KALYAN SATTA MATKA KALYAN CHATRT
DPBOSS GUESSING KALYAN SATTA MATKA KALYAN CHATRTDPBOSS GUESSING KALYAN SATTA MATKA KALYAN CHATRT
DPBOSS GUESSING KALYAN SATTA MATKA KALYAN CHATRT
 
How AI is Disrupting Service Industry More Than Design Thinking
How AI is Disrupting Service Industry More Than Design ThinkingHow AI is Disrupting Service Industry More Than Design Thinking
How AI is Disrupting Service Industry More Than Design Thinking
 
Satta Matka Dpboss Kalyan Matka Result matka boss otg
Satta Matka Dpboss Kalyan Matka Result matka boss otgSatta Matka Dpboss Kalyan Matka Result matka boss otg
Satta Matka Dpboss Kalyan Matka Result matka boss otg
 
Indian Matka Dpboss Matka Guessing Tara Matka boss otg
Indian Matka Dpboss Matka Guessing Tara Matka boss otgIndian Matka Dpboss Matka Guessing Tara Matka boss otg
Indian Matka Dpboss Matka Guessing Tara Matka boss otg
 
Kalyan Satta Matka Guessing Dp boss..143
Kalyan Satta Matka Guessing Dp boss..143Kalyan Satta Matka Guessing Dp boss..143
Kalyan Satta Matka Guessing Dp boss..143
 
Matka boss otg Satta Matta Matka Indian Matka Dpboss Matka Guessing
Matka boss otg Satta Matta Matka Indian Matka Dpboss Matka GuessingMatka boss otg Satta Matta Matka Indian Matka Dpboss Matka Guessing
Matka boss otg Satta Matta Matka Indian Matka Dpboss Matka Guessing
 
Matka boss otg satta matka kalyan matka Dpboss Matka guessing Indian Matka
Matka boss otg satta matka kalyan matka Dpboss Matka guessing Indian MatkaMatka boss otg satta matka kalyan matka Dpboss Matka guessing Indian Matka
Matka boss otg satta matka kalyan matka Dpboss Matka guessing Indian Matka
 
Matka guessing satta Matta matka Dpboss Matka boss otg
Matka guessing satta Matta matka Dpboss  Matka boss otgMatka guessing satta Matta matka Dpboss  Matka boss otg
Matka guessing satta Matta matka Dpboss Matka boss otg
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg
➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg
➒➌➎➏➑➐➋➑➐➐ Satta matka Dpboss kalyan Result Indian Matka matka boss otg
 
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian Matka
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian MatkaSatta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian Matka
Satta Matta Matka Indian Matka Satta Matka Dpboss Matka boss otg Indian Matka
 

Data Security Breach: The Sony & Staples Story

  • 1. © International Institute for Learning, Inc., All rights reserved. 1 Intelligence, Integrity and Innovation © International Institute for Learning, Inc., All rights reserved. Thank you for joining us today. This webinar is brought to you by IIL – a global leader in: Project, Program and Portfolio Management Microsoft® Project and Project Server Lean Six Sigma | Business Analysis Agile | PRINCE2® | ITIL® Leadership and Interpersonal Skills Data Security Breach The Sony & Staples Story
  • 2. © International Institute for Learning, Inc., All rights reserved. 2 Intelligence, Integrity and Innovation Global IIL Companies IIL US IIL Asia (Singapore) IIL Australia IIL Brasil IIL Canada IIL China IIL Europe (United Kingdom) IIL Finland IIL France IIL Germany IIL Hong Kong IIL Hungary IIL India IIL Japan IIL Korea (Seoul) IIL México IIL Middle East (Dubai) IIL Spain
  • 3. © International Institute for Learning, Inc., All rights reserved. 3 Intelligence, Integrity and Innovation In today’s world, companies generate and consume massive amounts of data, as a day-to-day prerequisite of doing business. This accumulated data becomes the most strategic asset of the organization and more often than not gives a competitive advantage in the market. This critical nature of data makes it the new corporate target! Data
  • 4. © International Institute for Learning, Inc., All rights reserved. 4 Intelligence, Integrity and Innovation Data security involves protecting data from the unwanted actions of unauthorized users. BUT Data security must not come at the cost of not being available when necessary. Data Security
  • 5. © International Institute for Learning, Inc., All rights reserved. 5 Intelligence, Integrity and Innovation A security breach is any incident that results in unauthorized access of data, applications, services, networks, and/or devices by perpetrators bypassing underlying security mechanisms. Security Breach
  • 6. © International Institute for Learning, Inc., All rights reserved. 6 Intelligence, Integrity and Innovation Data Breaches – Causes
  • 7. © International Institute for Learning, Inc., All rights reserved. 7 Intelligence, Integrity and Innovation “Well-meaning” insiders: who have no intention to breach but inadvertently do so because they fail to follow security policies. ‒ Lost devices ‒ Exposed data – no measures in place ‒ Poor business processes Targeted Attacks: Coordinated effort involving humans or automated software to cyber attack another individual, entity or organization. ‒ System vulnerabilities ‒ Malware ‒ Stolen credentials Data Breaches Occur Through:
  • 8. © International Institute for Learning, Inc., All rights reserved. 8 Intelligence, Integrity and Innovation Malicious insiders: who intentionally breach security policies. Terminated employees Company data stored on home computers for career progression Industrial espionage Data Breaches Occur Through:
  • 9. © International Institute for Learning, Inc., All rights reserved. 9 Intelligence, Integrity and Innovation Incursion: Hackers break into the company's network by exploiting system vulnerabilities. Discovery: The hacker maps out the organization's systems and automatically scans for confidential data. Capture: Exposed data on unprotected systems is immediately accessed. Components called root kits are surreptitiously installed on targeted systems and networks. Exfiltration: Confidential data is sent back to the hacker team. The Anatomy of a Data Breach
  • 10. © International Institute for Learning, Inc., All rights reserved. 10 Intelligence, Integrity and Innovation The Anatomy of a Data Breach
  • 11. © International Institute for Learning, Inc., All rights reserved. 11 Intelligence, Integrity and Innovation Damaged Intellectual Property: Blueprints, technical specifications, designs, launch plans Revenue Lost: Downtime Theft: Bank information, transfer codes Vandalism: False or discrediting information Ruined reputation Consequences of a Security Breach
  • 12. © International Institute for Learning, Inc., All rights reserved. 12 Intelligence, Integrity and Innovation Confidentiality, integrity, and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Balances the competing requirements of confidentiality, integrity, and integrity with equal emphasis on each. Information Security Basics: The CIA Triad
  • 13. © International Institute for Learning, Inc., All rights reserved. 13 Intelligence, Integrity and Innovation Confidentiality is required to prevent sensitive information from reaching the wrong people. Simple ways of ensuring confidentiality: data encryption, user IDs and passwords or, for highly sensitive information, in hard- copy form only. More advanced techniques: storage on air-gapped computers, disconnected storage devices. Confidentiality
  • 14. © International Institute for Learning, Inc., All rights reserved. 14 Intelligence, Integrity and Innovation Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people. Techniques include the use of checksums and hashing. Integrity
  • 15. © International Institute for Learning, Inc., All rights reserved. 15 Intelligence, Integrity and Innovation Data is meant to be used, when needed, by those authorized to use it. Techniques implemented to implement confidentiality and integrity must not compromise on the availability of information. Availability of data can be improved through implementing redundancy, failover, RAID. Availability
  • 16. © International Institute for Learning, Inc., All rights reserved. 16 Intelligence, Integrity and Innovation Part 1: The Sony Story
  • 17. © International Institute for Learning, Inc., All rights reserved. 17 Intelligence, Integrity and Innovation It was a release of confidential data belonging to Sony Pictures Entertainment on November 24, 2014. 100 terabytes of data was stolen containing: Personal information about Sony Pictures’ employees and their families E-mails between employees Information about executive salaries at the company Copies of unreleased Sony films Sony Pictures Entertainment Hack – 2014
  • 18. © International Institute for Learning, Inc., All rights reserved. 18 Intelligence, Integrity and Innovation It is alleged that the attack was orchestrated by a group calling themselves the “Guardians of Peace” or GOP. There are alternate theories proposing that the Government of North Korea and even former Sony employees were behind the attack. By whom?
  • 19. © International Institute for Learning, Inc., All rights reserved. 19 Intelligence, Integrity and Innovation A malware called Wiper has been identified as the agent used in the attack and was responsible for destroying data on the target's hard disk (or similar storage) on systems running Microsoft® Windows. The malware comes wrapped in an executable “dropper” that installs it and supporting files. In this case, the “dropper” installs itself as a Windows service when executed. How was the Breach Orchestrated?
  • 20. © International Institute for Learning, Inc., All rights reserved. 20 Intelligence, Integrity and Innovation The malware service appears to create a network file share – which points to the location of Windows system files in the PC’s file directory structure (usually WINDOWS). It then gives unrestricted access to that share, allowing any other computer on the local network to access it. Mechanics of the Attack
  • 21. © International Institute for Learning, Inc., All rights reserved. 21 Intelligence, Integrity and Innovation The dropper then communicates with a set of IP addresses in Japan, possibly connected to Sony's corporate network. Then it shuts itself down. At some point – either based on a hard-coded time within the malware package or after some other communication with the attackers – the nasty part of the malware package gets launched. Mechanics of the Attack – II
  • 22. © International Institute for Learning, Inc., All rights reserved. 22 Intelligence, Integrity and Innovation Wiper then communicates with 3 IP addresses (one each in Italy, Poland, and Thailand) to transfer the contents of the computer. The malware starts accessing the hard drive and deleting its contents sector by sector. Once it’s complete, it suspends Windows for two hours, then reboots the computer when it wakes. At this point, the drive is completely wiped out – even making physical changes to the hard drive. Coup de Grâce
  • 23. © International Institute for Learning, Inc., All rights reserved. 23 Intelligence, Integrity and Innovation An e-mail released in the hack showed that Angelina Jolie wanted David Fincher to direct her film Cleopatra. In another e-mail, Scott Rudin referred to Jolie as "a minimally talented spoiled brat“. Several future Sony Pictures films, including Annie, Mr. Turner, Still Alice, and To Write Love on Her Arms, were also leaked. The Saucier Bits in the Stolen Data
  • 24. © International Institute for Learning, Inc., All rights reserved. 24 Intelligence, Integrity and Innovation Industry estimates that the data breach will cost Sony about Y100 billion, or $1.25 billion from: Lost business, Various compensation costs and New investments Consequences for Sony
  • 25. © International Institute for Learning, Inc., All rights reserved. 25 Intelligence, Integrity and Innovation Maybe not! But the consequences could have been lesser if: Sensitive IPR data was segregated Back-up networks were disconnected from the primary network so that back-ups are not affected. The malware was identified early by having up-to-date patches. The infected machine(s) were isolated immediately after detection. Sony had learned from the Sony 2011 PlayStation incident and educated its users on what to look out for. Could It Have Been Prevented?
  • 26. © International Institute for Learning, Inc., All rights reserved. 26 Intelligence, Integrity and Innovation Part 2: The Staples Story
  • 27. © International Institute for Learning, Inc., All rights reserved. 27 Intelligence, Integrity and Innovation Cardholder names, card numbers, expiration dates, and card verification codes of 1.16 million customer credit and debit cards used at 119 Staples locations in 35 American states. This data was stolen over a period of up to six months. Staples Data Breach 2014
  • 28. © International Institute for Learning, Inc., All rights reserved. 28 Intelligence, Integrity and Innovation It is alleged that a cybercrime gang using malware known as Anunak was behind the Staples breach. This same gang is believed to behind breaches at Sheplers (a cowboy apparel chain) and Bebe (a women's clothing retailer), as well as attacks on the Russian banking sector. By whom?
  • 29. © International Institute for Learning, Inc., All rights reserved. 29 Intelligence, Integrity and Innovation Speculation is that the malware was cascaded using one of these two methods: Method 1: Using rented computers called “BotNets”, Anunak members sent phishing e-mails to the company’s employees. The e-mails may have appeared to be from the Central Bank of the Russian Federation, but actually contained malware designed to infect the employees' computers. Method 2: A company-wide update might have pushed this malware to all PoS terminals How was the Breach Orchestrated?
  • 30. © International Institute for Learning, Inc., All rights reserved. 30 Intelligence, Integrity and Innovation The malware then infects the Point of Sale (PoS) terminals to capture the information from cards swiped on these terminals. Once the stolen card information was located the PoS’ memory, after a card swipe, it is transmitted to a programmed IP where the stolen data reaches the attackers. Mechanics of the Attack – II
  • 31. © International Institute for Learning, Inc., All rights reserved. 31 Intelligence, Integrity and Innovation The attack cost Target $148 million, and cost financial institutions $200 million. Profits fell 46 percent in the fourth quarter of 2013. Resignation of Beth M. Jacob, the company’s most senior technology officer in February, and Gregg Steinhafel, CEO and chairman of the board, in May. Consequences for Staples
  • 32. © International Institute for Learning, Inc., All rights reserved. 32 Intelligence, Integrity and Innovation This attack may have been prevented if: Secure readers for card data capture were used Encrypting of data, upstream of the POS, all the way to the payment processing host, beyond the retail store network was done No live data was stored on the PoS memory Exclusive use of chip and pin cards Prevention Methods
  • 33. © International Institute for Learning, Inc., All rights reserved. 33 Intelligence, Integrity and Innovation Data security breaches have the power to cripple a corporation and often result in large losses, both monetary and non- monetary. Techniques for preventing breaches: Stop targeted attacks through a combination of policies, patches, encryption, and isolation. Keep aligned with the global security intelligence. Actively identify the most sensitive information. Automate IT controls to prevent human errors and internal theft. Prevent data exfiltration once stolen [Isolation and Disconnection] Closing Notes
  • 34. © International Institute for Learning, Inc., All rights reserved. 34 Intelligence, Integrity and Innovation  White Paper, “Why breaches happen and what to do about it?”  2014 Sony Pictures Entertainment hack, http://en.wikipedia.org/wiki/Sony_Pictures_Entertainment_hack  Wiper Malware – A detection deep dive http://blogs.cisco.com/security/talos/wiper-malware  Inside the “wiper” malware that brought Sony Pictures to its knees http://arstechnica.com/security/2014/12/inside-the-wiper-malware- that-brought-sony-pictures-to-its-knees/  Wiper (malware) http://en.wikipedia.org/wiki/Wiper_%28malware%29  Target Hit by Credit-Card Breach http://www.wsj.com/articles/SB100014240527023047731045792667432 30242538 References:
  • 35. © International Institute for Learning, Inc., All rights reserved. 35 Intelligence, Integrity and Innovation We invite you to get a closer look at what IIL can do for you and your organization, by visiting www.iil.com or email learning@iil.com and let us know how we can meet your learning needs. Please connect with IIL Socially: Like us on: facebook.com/IIL.inc Follow us: twitter.com/IILGLOBAL Join our Discussions on LinkedIn At IIL, Our Greatest Accomplishments are Yours