Wednesday, October 30, 2013

Social Engineering - Hacking Human Nature

Date: Thursday, November 21, 2013
Time: 1:00 PM to 2:00 PM Eastern
Topic: Social Engineering - Hacking Human Nature

CPE Credits: A certificate of completion will be provided upon request to those attendees that require the event to count for CPE credits.

Your organization faces threats from outside and from within - corporate spies, foreign governments, common thieves, disgruntled employees, as well as terrorists or other violent actors. Some or all of them can put at risk your facilities, your people, and your information.

Social engineering testing is an effective - and often dramatic - means of demonstrating how your organization stands up to these threats. By putting your organization to the test in a real-time scenario, you can use social engineering testing to give your organization the information and training you need fix the weaknesses that leave you vulnerable. Social engineering combines both technical and non-technical tests to identify how aware your organization is and if the “mentality” of security is deep-rooted within your organization.

Join ERM for this webinar where we will explore specific threats and discuss how you can use both technical and non-technical social engineering testing to improve your organization’s security.

About The Speakers
Stacey Blau is a Physical Security Penetration Expert with Enterprise Risk Management, Inc. She is an expert in security training, physical protection and recovery, security and vulnerability assessments, due diligence, corporate investigations, and social engineering.  Blau worked ten years at the Central Intelligence Agency (CIA) primarily focused on clandestine human intelligence collection. She is a graduate of the CIA’s Field Tradecraft Course, its paramilitary course, and other several advanced surveillance courses. She has worked overseas in Warsaw, Riga, and Tbilisi and speaks expert Russian and Polish. She is also proficient in Spanish and French. Blau is a graduate of the Massachusetts Institute of Technology majoring in Mathematics and Computer Science.

George Mortakis is the Director of Consulting Services with Enterprise Risk Management, Inc. With close to 20 years of experience in the information security industry, Mortakis has worked with a very wide range of industry verticals in information security implementation and assessment projects.  He holds multiple Masters and Bachelor degrees in Computer Information Systems and Marketing, from the University of Miami. Mortakis is certified as a CISSP, CISA, CRISC, PCI QSA, GSEC, and GSNA.

Enterprise Risk Management, Inc. offers expert cybersecurity consulting services, ranging from assessment to implementation, and digital forensics expertise for over 15 years.

Click Here To Register.

Tuesday, October 15, 2013

Fraud Threat Intelligence - Protecting Your Organization From Fraud

Date: Thursday, October 31, 2013
Time: 1:00 PM to 2:00 PM Eastern
Topic: Fraud Threat Intelligence - Protecting Your Organization From Fraud

CPE Credits: A certificate of completion will be provided upon request to those attendees that require the event to count for CPE credits.

When people consider fraud protection, very few think of watching their brand. Most fraud is considered to occur at the transaction level, and when dealing with financial loss this would true. But what if the gains were not tied directly to money? What if you can prevent fraud in the inception stages? What if you had a way to identify becoming a direct target?

We are not talking about the random malware attack, or the commodity Phishing that by chance captures some of your customers account credentials. We are talking about someone who has targeted your institution, your brand, or your customers and is using it for their personal advantage. This happens every day - you need to know what can be done about it. Fake websites, mobile applications, blogs, social media, and advertising can all be masked to insinuate associations and credibility with a brand name, image, or company profile. Being aware of these fake sites helps protect your customers from providing their credentials to harvesters, redirected to watering holes or black holes, stop attrition from redirecting traffic, and ensures a positive online sentiment for your branded items.

As part of a comprehensive, total fraud protection platform, you must engage fraud activity at multiple levels. Fraud Threat Intelligence is a tool used by many companies to help proactively identify, close, or remove the threats that risk brand reputation. Brand Threat Intelligence scrubs the internet for these malicious activities, while Special Operation Centers have dedicated analysts who visit underground forums, and hacker information sharing sites that sell data associated with brand related theft.

Join ERM for this webinar where our trusted partner, Easy Solutions, will show you how you can give yourself an advantage, take proactive steps to retain or remove this information from the internet, make yourself a harder target than the competition, and keep your brand, and more importantly your customers, safe and confident in using your brand online.

About The Speaker
Bryan Jardine is a Product Manager for Easy Solutions, a trusted partner of Enterprise Risk Management, Inc.  During his time as an anti-fraud professional, Bryan spent over 8 years building, deploying, and managing anti-fraud organizations as well as selecting and integrating anti-fraud tools.  Bryan has designed and developed a number of programs related to strategic deployment and tactical operations of teams responsible for fraud, risk, reporting, and threat intelligence.


You can register here.

Friday, September 13, 2013

Security Breaches - How To Respond

Date: Thursday, September 26, 2013
Time: 11:00 AM to 12:00 PM Eastern
Topic: Security Breaches - How To Respond

CPE Credits: A certificate of completion will be provided upon request to those attendees that require the event to count for CPE credits.

Information Security Breaches are everywhere. No matter what industry your business belongs to, cyber-security breaches and information theft is rampant and omnipresent. Organizations today need to know how to defend themselves against cyber-attacks and data leaks – defense is the best offense in today’s trying times.

News stories report information security breaches on a daily basis.  Even the biggest names in business haven’t been spared.  To complicate matters, attacks are increasingly originating from outside the U.S. and the countries of origin often don’t crack down on cyber-crime as diligently as victim businesses would expect.  The laws governing these countries and their interpretations further obfuscate the resolution process while the affected business faces an endless wait for answers.

A security breach holds serious consequences for your business.  If a security breach were to compromise your customer information, your business could face some serious regulatory ramifications and some very bad press – when combined could potentially put you out of business.

While security breaches are sometimes considered “inevitable”, they don’t have to be.  No matter what your industry, join ERM for this webinar where we will show you how to protect your business from cyber-attacks, security breaches, and data leaks; and how to respond to security breaches.

About The Speaker
Esteban Farao is an Information Security Director with Enterprise Risk Management, Inc.  With close to 20 years of information security industry experience, Farao has worked with a very wide range of industry verticals and possesses very deep expertise in information security implementation.

His industry experience includes large multinational organizations such as PriceWaterHouse Coopers.  He holds multiple Masters and Bachelor degrees in International Business Administration, Management Information Systems, and Information Systems from the Florida International University and the State University of New York at Albany.  Farao also holds multiple industry certifications including the CISSP, CISA, CRISC, PCI QSA, and PCIP.


You can register here.

Friday, August 9, 2013

Universities and Schools under cyberattack: How to Protect your Institution of Excellence - Webinar

Date: Wednesday, August 28, 2013
Time: 11:00 AM to 12:00 PM Eastern
Industry: Education
Topic: Universities and Schools under cyberattack: How to Protect your Institution of Excellence

CPE Credits: A certificate of completion will be provided upon request to those attendees that require the event to count for CPE credits.

The New York Times recently reported that universities face a rising barrage of cyberattacks.  University officials even acknowledge that they often do not learn of cyber break-ins until much later, if ever, and that even after discovering the breaches they may not be able to tell what was taken.  Recent cyber-threats have also targeted schools and entire school districts, in some cases.

Universities in the U.S. are undeniably the coveted innovation centers of the world where the best minds converge to bring cutting-edge inventions and innovations to the fore.  Being targets of cyberattacks is obviously not doing any favors to the solid brand and reputation that U.S. universities have worked hard to build over the years.

Schools and educational institutions too have established a long-standing reputation of being centers of learning and excellence for young minds who will go on to shape our futures.

But the information security challenges faced by universities, schools, and educational institutions are very different from those faced by typical corporations.

The very nature and tenet of a university’s success is based on the free flow of information, open collaboration across borders, and thinkers of an international scale coming together to exchange ideas and learn.  Schools and educational institutions face a slightly different set of challenges in that their students are a lot younger and potentially looked upon as easier targets.

If you represent a university, school, or educational institution and have either faced or are concerned about facing a cyberattack, join ERM for this webinar where we will discuss what you can do to protect your center of excellence from becoming a vulnerable target for hackers.
 
About The Speaker
Brandon Witte is an information security expert with Enterprise Risk Management, Inc.  He has worked closely with several universities and educational institutions, offering them guidance and technical expertise in how to secure their information assets and infrastructures.  His core technical expertise is in the area of security penetration testing and infrastructure-wide security assessment spanning a wide range of technical platforms and implementations.  He also possesses significant experience in performing enterprise-wide security risk assessments including highly technical risk assessments for several educational institutions and centers of excellence.

You can register here.

Thursday, August 8, 2013

FedRAMP Compliance - What You Should Know…In 5 Minutes!


Do you know what FedRAMP is?  Do you know that it affects you if you’re providing pretty much any cloud-based product or service?  Do you think you need to comply with FedRAMP only if you want to do business with the Federal Government?  Do you know how your competitors in the cloud space are using FedRAMP to their advantage? If any of these questions affects you, read on.


FedRAMP In Short

You’re busy and don’t have time to spend researching and understanding the Federal Risk and Authorization Management Program (FedRAMP).  Perfect! Read on.

A quick and dirty way to understand FedRAMP is to think of it as the Federal Information Security Management Act (FISMA) of cloud computing.  The Federal Government began purchasing cloud-based products and services as an early adopter but soon realized that the onus of information security and due diligence needs to be pinned back on the cloud provider and not borne by any of its agencies.  So, they devised FedRAMP on the operationally successful FISMA model and required that a cloud service provider (including sellers of both cloud-based products and services) undergo an independent audit by a certified Third Party Assessment Organization (3PAO) and apply for an Authority To Operate (ATO).

So, FedRAMP is not really a “regulation” or a “certification” as much as it is an “authorization”.  A cloud service provider can apply for this authorization either itself or a Federal agency can apply on its behalf.  The authorization decision is taken by the Joint Authorization Board (JAB) which, at the top, includes CIOs of the Department of Defense (DoD), the Department of Homeland Security (DHS), and the General Services Administration (GSA).

Bottom line for cloud service providers – if you want to do business with the Federal Government, getting a FedRAMP ATO is inevitable. 

Cloud Service Provider…Nope, not us!

One of the most misunderstood phrases in relation to FedRAMP is the term “Cloud Service Provider”.  If you were to directly interpret it as it sounds, you’d probably be excused for thinking that if you’re selling a cloud-based product, or if only a teensy-weensy part of the product is “out there in the cloud”, or if you’re actually a service provider but offer a cloud-based product as a small part of your service, then you don’t fit the definition of a Cloud Service Provider.  The fact is – if any of those apply to you then you too are a Cloud Service Provider.

I don’t care…I don’t do business with the Federal Government!

Firstly, why not? It’s worth pointing out that the Federal Government is actually a market worth exploring with reports estimating that the U.S. Federal Government cloud computing market is set to grow at about 16% CAGR over 2013-2018 to hit $10 Billion by 2018!

But you’re right – technically, you have no need to go through the process of obtaining a FedRAMP ATO if you don’t intend to do business with the Federal Government.  But we’re not talking only about the ATO here.

An interesting thing about FedRAMP is the way it has gathered momentum around the U.S.  FedRAMP was what you could call the “first mover” in terms of regulating and creating a foundational security standard for “what a secure cloud should be like”.  This first-mover advantage has enabled FedRAMP to gain significant importance even in the private sector.

Cloud Service Providers have started looking at FedRAMP as a way to add credibility to their cloud-based offerings.  The fact that FedRAMP is popular, well-known, and heavily discussed, helps these companies gain leverage by adding a unique FedRAMP tag to them.  It’s almost the equivalent of saying – “We didn’t have to comply with FedRAMP, but we decided to anyway”.  And note that there’s no real need to actually obtain the FedRAMP ATO at this point; it’s just complying with the baseline set by FedRAMP to have the ability to offer equivalent security in your cloud to your customers who would expect the highest levels of security.  No ATO, no 3PAO audit.

It’s also important to note that FedRAMP currently has the most stringent requirements in terms of cloud security today.  So, to choose FedRAMP as the baseline for your cloud would be a wise thing to do because then you can easily comply with specific customer security requirements or other frameworks that customers may require your cloud to comply with. 

FedRAMP Baseline Implementation and Audit

If you’re on your way to adding the FedRAMP tag to your cloud offering, ensure that you interpret the requirements of the FedRAMP baseline controls accurately and adequately.  While the controls may appear open-ended, it is important to know where to draw the line on the scope or it can end up being a black hole for your budget.  On the other hand, if you interpret it lightly, it could end up giving you a false sense of compliance with the baseline.

A critical success factor in implementing the FedRAMP baseline is to have a mock audit or a preparedness audit.  Having an independent and experienced set of eyes perform an audit of the implemented controls will save you a lot of pain and effort when (or if) you have the final 3PAO audit.

With the momentum behind FedRAMP, it could well go on to become a commoditized requirement of sorts.  FedRAMP could be the next business driver.


Tuesday, June 11, 2013

Cybersecurity Rises to Top of List at FFIEC

 
Enterprise Risk Management CEO Advises Financial Institutions to Prepare Now

(Miami, June 11, 2013) Cybercrime and “hacking” have reached epidemic proportions, but it’s not clear who’s winning the cyber wars. While corporations are primarily targeted for intellectual property, banks, health care providers, and retailers face continual breaches of their databases, putting thousands of customers at risk for financial fraud and identity theft.


Enterprise Risk Management CEO Silka Gonzalez advises clients, and especially financial institutions, to prepare now for more rigorous examinations and to toughen their internal security. “It’s not enough today to just have a firewall and an anti-virus program,” Gonzalez explained. “You need to make sure that your employees are trained to protect your sensitive data and that access to that data is limited.” Employees have become the weakest link in the security chain.


Gonzalez recommends that all organizations, and especially banks, perform “social engineering” tests. This provides the institutions with a training opportunity, once they see how easily their employees are unintentionally “fooled” into providing sensitive data to outsiders. Most companies are surprised to find out how vulnerable they are internally.


The FFIEC (Federal Financial Institutions Executive Council), recognizing the growing sophistication and volume of cyber attacks and the global importance of critical financial infrastructure, announced the formation of a working group to coordinate efforts and improve communication on issues of critical infrastructure and cybersecurity. Participating in the working group will be the FFIEC’s Information Technology Subcommittee of the Task Force on [financial} Supervision, the Financial and Banking Information Infrastructure Committee, the Financial Services Sector Coordinating Council, and the Financial Services Information Sharing and Analysis Center.


“Given the unlimited resources of the organized criminal groups that perpetrate the vast majority of financial cybercrime,” Gonzalez emphasized,, “ a coordinated approach with strong communication among regulators and and financial institutions is critical.”

Monday, June 10, 2013

GRC-Daily: IT Secruity Lost in the Cloud

Enterprise Risk Management featured on GRC-Daily website


Excerpt from the article:

Florida Bar Joins Other States in Guiding Attorneys on Cloud Confidentiality

Businesses large and small have embraced the convenience of Cloud computing as a way to save money and improve efficiencies.   But what is the real cost of such “savings”?   According to Enterprise Risk Management CEO Silka Gonzalez, “Not all cloud computing services are created equal.” 
Silka Gonzalez
CEO
Enterprise Risk Management


Miami-based Enterprise Risk Management, an IT and security consulting firm has this advice,  “Know who you are working with and do your due diligence before you migrate your data to the Cloud.”   

“Larger Cloud providers should have the resources to provide strong IT security around the technology, right down to their own employees,” explained Gonzalez. “Smaller providers may not be able to offer the same level of comprehensive risk management.” In addition, most Cloud service provider agreements specify that the organization itself is still responsible for their own internal IT security.



 Read the full article here.

Friday, June 7, 2013

Test Thy BCP - Webinar

Date: Thursday, June 27, 2013
Time: 11:00 AM to 12:00 PM EDT
Industry: Banking & Finance, Education, Government & Public Services, Healthcare, Hospitality & Leisure, Legal, Manufacturing, Retailers & Wholesalers, Technology, Telecommunication
Topic: Test Thy BCP
Passcode: TBD
Presented by:  Jacques Lucas, CISA

CPE Credits: A certificate of completion will be provided upon request to those attendees that require the event to count for CPE credits.
Most organizations rely heavily on their information systems without contingency planning in the case of a disaster. Imagine an organization that never tests its business continuity plan (BCP). Is that organization ready to respond effectively and resume operations of mission critical services with minimal disruption?

With Hurricane Season closing in, take a moment to think about whether your organization is fully prepared to effectively deal with contingency situations (natural disasters such as hurricanes, tornadoes, floods, or others like extended power outages and failures) with minimal impact to operations. And if you're part of the Senior Management at your organization, what role do you need to play to ensure this?

Join ERM for this webinar on testing your organization’s BCP where we will cover the importance of testing your BCP, testing standards, and reporting test results.

 You can register here.

Test Thy BCP

Most organizations rely heavily on their information systems without contingency planning in the case of a disaster.  Imagine an organization that never tests its business continuity plan (BCP). Is that organization ready to respond effectively and resume operations of mission critical services with minimal disruption?

The objective of the BCP is to provide the information and procedures necessary to respond to a disaster, notify necessary personnel, assemble business recovery teams, recover data, and resume operations to ensure minimal disruption to the company’s operations.

The BCP identifies the information, material, facilities, personnel and procedures required to facilitate a rapid recovery from a disaster.  The successful recovery of operations depends on performing a periodic comprehensive test of the BCP.  Therefore testing your BCP is an integral component of a successful recovery of operations, if disaster strikes.

The BCP should include documented and tested procedures which will assist in ensuring the availability of critical resources and in maintaining the continuity of operations during an emergency situation.  The BCP should aid in ensuring organizational stability through an orderly recovery process in the event of significant problems and disruptions.  The plan should not be intended to be a procedures manual of how to perform all departmental functions; it should include only those high priority tasks required to ensure successful recovery from a business disruption.


Testing The BCP
Every component of the BCP should be tested annually.  Critical and/or highly volatile components should be tested at least quarterly and after any major technology change.  Call trees should be tested at least semi-annually, and any component which fails the test should be re-tested as soon as possible.  The tests to be performed should address important business processes and related systems classified as highly critical. Management should consider additional non-highly critical processes and systems to be included on future tests as previous tests of highly critical processes are successfully tested.  Under no circumstances should the testing of highly critical processes be limited or excluded.  The following considerations should be evaluated during the planning, coordination, and execution of business recovery tests.
  • Management formal approval of the costs associated with the tests, normal business deadlines, resource requirements (human, material, equipment), and impact on daily operations due to key personnel participating on tests.
  • Definition of recovery scenarios (e.g. partial or full destruction due to natural and man-made disruptions, date and time of simulated event, affected business processes, etc).
  • Definition of test objectives, scope, expected results as well as the criteria to be used to consider the results of the test as successful. The objectives must have measurable goals such as maximum time to recover, time limit to recover, amount of items completed or failed procedures to determine the effectiveness and successfulness of the tests.
  • Documentation of the test objectives, scope, expected results, and test results.
The main reasons for testing the BCP include:
  • Determining the feasibility of the business recovery process.
  • Verifying the compatibility of alternate processing sites, hardware, software, and telecommunications.
  • Identifying deficiencies in existing procedures.
  • Identifying areas in the BCP that need modification or enhancement.
  • Providing training to the Team Managers and Team Members.
  • Ensuring the adequacy of procedures relating to the various teams involved in the recovery process.
  • Demonstrating the ability of the organization to recover within a reasonable time.
  • Providing a mechanism for maintaining and updating the BCP.

Standards For Testing The BCP
An annual test of the BCP is required. Segments of this test process can be staged throughout the year to minimize disruption and yet facilitate testing of the BCP. Depending on your testing methodology and organizational strategic plans, your organization can leverage the following types of tests to ensure the effectiveness of the BCP:
  • Process Review TestingA third party evaluates whether all critical processes for services are addressed.
  • Checklist – Copies of the plan are sent to department and business unit managers to verify and review BCP procedures corresponding to their functional area. This is a simple test and should be used in conjunction with other tests.
  • Structured Walk-through – Team members and other individuals responsible for recovery meet and walk through the plan step-by-step to identify errors or assumptions.
  • Simulation – This is a simulation of an actual emergency. Members of the response team act in the same way as if there was a real emergency.
  • Parallel – This is similar to simulation testing, but the primary site is uninterrupted and critical systems are run in parallel at the alternative and primary sites.
  • Full interruption – This test involves all areas of the company in a response to an emergency. It mimics a real disaster where all steps are performed to test the plan. Systems are shut down at the primary site and all individuals who would be involved in a real emergency, including internal and external organizations, participate in the test. This test is the most detailed, time-consuming, and expensive test.

Testing Report
For item reviews, equipment, and procedures testing, a checklist will work well to illustrate what was tested and the results. The checklist should be prepared in advance. Sampling techniques can be used to review telephone numbers per critical call list, addresses of individuals, vendors, equipment, employee information, and forms.

Test Results
Test results should be reviewed and approved by Management. Tests will be analyzed on the basis of the following criteria:
  • Actual time to complete BCP recovery procedures and steps versus projected time.
  • Elapsed time to perform each activity in a recovery mode.
  • Analysis of the accuracy of each activity and event in the recovery effort.
  • Amount of work completed.
The test should be rated:
  • Satisfactory. Minimal disruption or problems noted; any exceptions would be easily overcome during a real disaster recovery situation.
  • Partially Satisfactory. In these instances, while certain aspects of the test may have been performed satisfactorily, the following situations would result in this rating: too many minor errors were noted; confusion in the process of recovery occurred during the test; slow recovery time; breakdowns in communications; the need for focused improvement.
  • Unacceptable. Significant problems occurred and the institution is at risk.  This rating reflects some aspect of resumption that did not test well, which in turn may produce problem situations in accomplishing orderly business resumption.
Senior Management should review the test results and note areas for enhancement to the BCP and Recovery Procedures. A plan and record of testing should be maintained by the BCP Coordinator to ensure that each relevant area of the BCP and Recovery Procedures are tested at least annually.

Trying Times
In trying times such as the ones we are experiencing today, an organization’s ability to get back on its feet quickly and efficiently when disaster strikes is critical to both customer retention and business reputation.  It could mean the difference between success and failure.  Test Thy BCP!