BayPay Forum BayPay Forum

Menu

  • Home
  • Events
    • Past Events
  • News
    • Payments News
    • Crypto News
    • Fintech News
    • Retail News
    • Fraud News
    • Regulation News
    • Security News
    • Markets News
  • Our Podcasts
    • Our Weekly Podcast
    • Our Daily Podcast
  • Join Us
  • Login
BayPay Forum BayPay Forum
  • Home
  • Events
    • Past Events
  • News
    • Payments News
    • Crypto News
    • Fintech News
    • Retail News
    • Fraud News
    • Regulation News
    • Security News
    • Markets News
  • Our Podcasts
    • Our Weekly Podcast
    • Our Daily Podcast
  • Join Us
  • Login

New White House Policy Defines Coordination of Cyber Response

Details
Category: Security News
31 December 1969

Governance , Incident Response

Directive Issuance Comes as Russians Suspected in Meddling in U.S. Elections Eric Chabrow (GovInfoSecurity) • July 26, 2016     New White House Policy Defines Coordination of Cyber Response

The Obama administration is implementing a presidential policy directive designed to coordinate response to a large-scale cyber incident.

See Also: 2016 Enterprise Security Study - the Results

"This directive establishes a clear framework to coordinate the government's response to [significant] incidents," Lisa Monaco, assistant to the president for homeland security and counter terrorism, told the International Conference on Cybersecurity, that met in New York on July 26. "It spells out which federal agencies are responsible. And it will help answer a question heard too often from corporations and citizens alike - 'In the wake of an attack, who do I call for help?'"

The administration defines a significant cyber incident as one that either on its own, or as part of a group of related incidents, would likely result in demonstrable harm to national security interests, foreign relations, the economy of the United States, public confidence, civil liberties or public health and safety of the American people.

Issuance of the directive comes as some highly regarded cyber and policy experts suspect the Russian government could be meddling in the U.S. presidential election by hacking and then leaking emails from Democratic National Committee computers (see How Should U.S. Respond If Russians Hacked DNC System? and DNC Breach More Severe Than First Believed).

Five Guiding Principles

According to a White House fact sheet, the directive outlines five principles that will guide the government during a cyber incident response:

Shared Responsibility: Individuals, the private sector and government agencies have a shared vital interest and complementary roles and responsibilities in protecting them from malicious cyber activity and managing cyber incidents and their consequences. Risk-Based Response: The federal government will determine its response actions and resource needs based on an assessment of the risks posed to an entity, national security interests, foreign relations or economy of the United States or to the public confidence, civil liberties or public health and safety of the American people. Respecting Affected Entities: Federal government responders will safeguard details of the incident, as well as related privacy and civil liberties and sensitive private sector information. Unity of Effort: Whichever federal agency first becomes aware of a cyber incident will rapidly notify other relevant agencies in order to facilitate a unified federal response and ensure that the right combination of agencies responds to a particular incident. Enabling Restoration and Recovery: Federal response activities will be conducted in a manner to expedite restoration and recovery of an entity that has experienced a cyber incident, balancing investigative and national security requirements with the need to return to normal operations as quickly as possible.

Applying Lessons Learned

In explaining why the directive is needed, the White House says the United States has been faced with managing increasingly significant cyber incidents that affect the federal government and private sector.

"We have applied the lessons learned from these events, as well as our experience in other areas such as counterterrorism and disaster response," a White House statement says. "That experience has allowed us to hone our approach but also demonstrated that significant cyber incidents demand a more coordinated, integrated and structured response. We have also heard from the private sector the need to provide clarity and guidance about the federal government's roles and responsibilities."

As part of the directive, the administration released a cyber incident severity schema that establishes a common framework within the government to evaluate and assess the severity of cyber incidents and help identify significant cyber incidents in which the directive coordination procedures would apply.

According to the White House, the schema describes a cyber incident's severity from a national perspective, defining six levels, zero through five, in ascending order of severity. Each level describes the incident's potential to affect public health or safety, national security, economic security, foreign relations, civil liberties or public confidence. An incident that ranks at a level 3 or above on this schema is considered "significant" and will trigger application of the directive's coordination mechanisms.

Three Lines of Effort

The directive organizes federal response activities into three lines of effort - threat response, asset response and intelligence support activities - and establishes a federal lead agency for each.

"When a federal agency is a victim of a significant cyber incident, that agency will be the lead for this fourth line of effort," the White House statement says. "In the case of a private victim, the federal government typically will not play a role in this line of effort, but will remain cognizant of the victim's response activities consistent with these principles and coordinate with the victim."

Original link

DNC Breach More Severe Than First Believed

Details
Category: Security News
31 December 1969

Anti-Malware , Data Breach , Data Loss

The Big Question: Will the US Respond? Jeremy Kirk (jeremy_kirk) • July 26, 2016     DNC Breach More Severe Than First Believed

As the fallout from the leaked Democratic National Committee files continues, a new finding from an analysis of the more than 19,000 emails published by WikiLeaks suggests cyberattackers also had access to at least one staffer's personal email account.

See Also: How to Mitigate Credential Theft by Securing Active Directory

A DNC consultant saw several warnings that her Yahoo account may have been compromised by state-sponsored attackers, according to a story published on July 25 by Michael Isikoff, Yahoo's chief investigative correspondent .

The DNC consultant, Alexandra Chalupa, had been investigating connections between Republican presidential candidate Donald Trump's campaign chairman, Paul Manafort, and pro-Russian political leaders in the Ukraine, Isikoff wrote.

Meanwhile, the growing concern over the hacking of the DNC, first revealed in June, has prompted the FBI to depart from its normal protocol of staying silent about investigations.

"The FBI is investigating a cyber intrusion involving the DNC and is working to determine the nature and scope of the matter," the bureau says in a statement. "A compromise of this nature is something we take very seriously, and the FBI will continue to investigate and hold accountable those who pose a threat in cyberspace."

Democratic presidential candidate Hillary Clinton's campaign theorizes that the release of 19,252 emails and 8,034 attachments is a well-timed play by Russia intended to disrupt the Democratic Party and increase Donald Trump's standing before the November election. Although it's unlikely to ever be proven, the incident stands as a curious example of using stolen data to attempt to influence global events at a crucial political moment.

That has prompted calls from at least one expert for the U.S. government to take action, treat WikiLeaks as a counterintelligence target and come forward with more definitive evidence of who perpetrated the DNC attacks.

"American inaction now risks establishing a de facto norm that all election campaigns in the future, everywhere, are fair game for sabotage - sabotage that could potentially affect the outcome and tarnish the winner's legitimacy," writes Thomas Rid, a professor in the Department of War Studies at King's College in London, in Vice's MotherBoard.

"State-Sponsored Actors" Alert

image Pictured: Screenshot of a Yahoo alert forwarded to DNC by consultant Alexandra Chalupa in May. (Source: WikiLeaks.)

Chalupa, the DNC's director of ethnic engagement, on May 3 wrote an email to Luis Miranda, the organization's communications director. It included a screenshot of a Yahoo warning, alerting her that her account might have been compromised by "state-sponsored actors."

"Since I started digging into Manafort, these messages have been a daily occurrence on my Yahoo account despite changing my password often," she wrote.

Yahoo first began providing alerts to users that their accounts might be the target of state-sponsored actors in December 2015. That was well after Google, which instituted such warnings in June 2012. In January 2010, Google was the first technology company to openly accuse China of coordinated attacks against Gmail accounts of activists, in the so-called Operation Aurora incident.

Chalupa's frustration in seeing the warning repeatedly would suggest that her computer was infected with malware. That would have made it easy for attackers to obtain her new passwords with a keystroke logger, rendering futile any subsequent attempts she might make to secure her Yahoo account.

Given attackers' apparent access to a wide range of DNC email accounts - as revealed by the WikiLeaks DNC leaks - compromising Chalupa's computer would theoretically have been easy. Attackers could have sent her a malware-laced document or malicious link from a legitimate DNC account, thus tricking her into falling for an exploit designed to give attackers persistent access to her machine.

Will the U.S. Respond?

Because of increasing concerns over the impact of state-funded hacking, the United States has previously confronted governments for hack attacks, particularly when cyberattacks have been directed at private companies.

In May 2014, U.S. prosecutors indicted five alleged members of Unit 61398, a Chinese Army signals intelligence unit, for allegedly stealing industrial trade secrets from six U.S. organizations over eight years. It was the first such indictment of its kind, intended to send a strong message to China that intellectual property theft would not be tolerated, although the accused still remain at large.

In December 2014, just a few weeks after Sony Pictures Entertainment experienced a devastating attack that stole gigabytes of information and destroyed computers, the U.S. government attributed the attack to North Korea.

Just two days after hackers were booted from the DNC's network, meanwhile, the DNC hired incident response firm CrowdStrike, which published a blog post saying it believed two Russian groups - nicknamed Cozy Bear and Fancy Bear - were responsible, based on forensic clues. Last year, Cozy Bear broke into the unclassified networks of the State Department, White House and Joint Chiefs of Staff. Fancy Bear, suspected to be linked with Russia's GRU intelligence unit, is believed to have attacked Germany's Parliament and France's TV5 Monde.

Rid, in his Vice report, summarizes what looks to be compelling technical evidence that there's a Russian connection to the DNC hack attacks and says that it's also possible that Guccifer 2.0 - who leaked DNC documents on a WordPress blog and claimed to have passed the emails to WikiLeaks - might be working with Russia. Guccifer 2.0 has claimed to have separately breached the DNC and to have been operating alone.

The influence of the leak and disruption of an ongoing campaign likely meets the "red line" for strong action by the U.S. government, says Justin Harvey, CSO of Fidelis Cybersecurity. "The American people deserve to know if the government has evidence that confirms this attack was state-sponsored," he says. "If it was, then a whole new level of foreign policy decisions must be made in relation to the leaks."

Christopher Soghoian, principal technologist with the American Civil Liberties Union, cast the DNC situation in a broader light on Twitter. "OK, now that serious people believe that a foreign government is trying to impact U.S. elections, can we agree that internet voting is too dangerous?"

It's easy to forget, but the CIA Director's AOL account was hacked by a teenager just a few months back. DC politicos are easy cyber prey.

July 25, 2016
Original link

Avoid 75% of all Data Breaches by Keeping Privileged Credentials Secure

Details
Category: Security News
31 December 1969

Cybersecurity , Data Breach , Risk Management

Avoid 75% of all Data Breaches by Keeping Privileged Credentials Secure Presented by Skyport Systems     60 minutes     Given the severity of credential hijacking currently taking place, securing Microsoft Active Directory Services and relevant privileged credentials has become a top business priority. In 2015, over 75 percent of all compromised records from data breaches was traced directly to the loss or theft of a privileged credential. Too often, attackers use these stolen credentials to access networks without detection for weeks, and sometimes months. Organizations lose revenue, suffer diminished reputation and experience operational havoc. However, perspective, guidance and effective tools are available to protect your organization and to help mitigate the impact of credential theft. This webinar, hosted by Skyport Systems, will walk you through these best practices and introduce its SkySecure Platform, designed specifically to protect your Microsoft Identity infrastructure. Credential appropriation and theft plagues many large enterprises, particularly those that use Microsoft Active Directory. Microsoft recently released a comprehensive set of cybersecurity guidelines for Credential Theft Mitigation, but the complexity and cost involved in implementing these advanced recommendations has been a barrier in deploying them. In this lively webinar, Doug Gourlay, Executive Vice President at Skyport Systems, will discuss: The threats and past cyberattacks that underscore the critical need of protecting your Microsoft Identity infrastructure; A prescriptive roadmap based on Microsoft's Best Practices Guidance that most organizations can easily implement; The ways in which Skyport's SkySecure Platform can protect your privileged credentials from theft. You might also be interested in … President's Cyber Response Directive Gets Mixed Reviews President's Cyber Response Directive Gets Mixed Reviews
Athens Orthopedic Clinic Confirms 'Dark Overlord' Attack
Athens Orthopedic Clinic Confirms 'Dark Overlord' Attack
New White House Policy Defines Coordination of Cyber Response
New White House Policy Defines Coordination of Cyber Response
DNC Breach More Severe Than First Believed
DNC Breach More Severe Than First Believed
2016: A Watershed Year for HIPAA Enforcement
2016: A Watershed Year for HIPAA Enforcement
'No More Ransom' Portal Offers Respite From Ransomware
'No More Ransom' Portal Offers Respite From Ransomware
Leaked DNC Emails Show Lax Cybersecurity
Leaked DNC Emails Show Lax Cybersecurity
SWIFT Heists: The New Account Takeovers?
SWIFT Heists: The New Account Takeovers?
Report: New York Fed Fumbled Cyber-Heist Response
Report: New York Fed Fumbled Cyber-Heist Response
Original link

A Practical Approach to Digital Clinician and Patient Credentials

Details
Category: Security News
31 December 1969

Cybersecurity , Data Breach , Risk Management

A Practical Approach to Digital Clinician and Patient Credentials Presented by Vasco     60 minutes     Healthcare is in the middle of a major evolution toward digital, personalized medicine and the empowered patient. This massive push toward digital medicine brings about numerous security and interoperability challenges, including a shift in thinking from "supposedly known users" to "secure and trusted identities." Ongoing regulatory and monetary incentive programs are driving healthcare providers to increase their EHR and E-Prescribing adoption. Additionally, the U.S. Office of the National Coordinator for Health Information Technology (ONC) is focused on strengthening identity-proofing and authentication of all participants in the healthcare system: providers, staff, business associates, and patients. With many organizations including HIMSS, AHIMA and CHIME calling for a nationwide unique patient identifier with support from the National Strategy for Trusted Identities in Cyberspace's (NSTIC), Identity Ecosystem Steering Group, a trusted digital identity will likely soon be on your IT agenda. Knowing who is accessing PHI at any point in time is beyond critical to ensure security. How can the healthcare community move closer to making this leap to digital medicine without sacrificing security and confidentiality? This exclusive webinar, sponsored by VASCO, will talk about ways your healthcare organization can create a secure bridge between the verified identity in the physical world and the online identity in the cyberspace on a state or national level. Co-hosts Michael Magrath, Director of Business Development at VASCO and a nationally recognized leader in the healthcare identity management field, and Andrew Showstead, Director of Technical Consultancy at VASCO, will discuss how your organization can deploy a unique, reusable and trusted digital patient credential that provides interoperability and links multiple players via a trust framework. In this exclusive webinar, Magrath and Showstead will also discuss: Different options to provide better patient and provider electronic authentication; How superior identity management naturally leads to improved HIPAA and HITECH compliance; How to implement remote ID verification; How to secure end-to-end communications between patients and providers. Slide Previews image
image

You might also be interested in …

President's Cyber Response Directive Gets Mixed Reviews
President's Cyber Response Directive Gets Mixed Reviews
Athens Orthopedic Clinic Confirms 'Dark Overlord' Attack
Athens Orthopedic Clinic Confirms 'Dark Overlord' Attack
New White House Policy Defines Coordination of Cyber Response
New White House Policy Defines Coordination of Cyber Response
DNC Breach More Severe Than First Believed
DNC Breach More Severe Than First Believed
2016: A Watershed Year for HIPAA Enforcement
2016: A Watershed Year for HIPAA Enforcement
'No More Ransom' Portal Offers Respite From Ransomware
'No More Ransom' Portal Offers Respite From Ransomware
Leaked DNC Emails Show Lax Cybersecurity
Leaked DNC Emails Show Lax Cybersecurity
SWIFT Heists: The New Account Takeovers?
SWIFT Heists: The New Account Takeovers?
Report: New York Fed Fumbled Cyber-Heist Response
Report: New York Fed Fumbled Cyber-Heist Response
Original link

Secure Access in a Hybrid IT World

Details
Category: Security News
31 December 1969

Cybersecurity , Technology

Secure Access in a Hybrid IT World Presented by Pulse Secure     60 minutes     Secure Access in a Hybrid IT WorldToday's organization needs to provide its employees, partners, applications and even networks access to its data and IT environment regardless of how they access it. But trying to maintain security and compliance in this increasingly complex hybrid IT world becomes a challenge - particularly if those solutions end up limiting productivity and hobble innovation and competitiveness. Identity management and device compliance is essential to today's organizations, whether they are accessing information via traditional enterprise applications or through cloud services on their personal devices. That's why centrally managed "Secure Access," the ability to safeguard credentials across hybrid IT infrastructures, is the best method for ensuring data security and compliance for your organization. Register for this session to hear from David Goldschlag, Senior Vice President of Strategy and CTO at Pulse Secure, to learn why secure access and flexibility go hand in hand in forming a successful and secure IT network. To ensure that your employees and partners maintain data security no matter how they access your hybrid IT infrastructure, you need to have a central authentication and compliance solution in place. And leveraging a solution like Pulse Connect Secure enables organizations to deliver fast, secure, and optimized access to data center applications and cloud services while ensuring a consistent native-user experience across any device. In this informative webinar, Pulse Secure CTO David Goldschlag will discuss: The importance of having a single authentication and compliance policy for your hybrid IT infrastructure; How to improve visibility and context to filter traffic and enforce secure access policies; Real-world examples of how Pulse Secure's Secure Access architecture enables users to securely access Microsoft Office365 and SAP from iOS devices. You might also be interested in … President's Cyber Response Directive Gets Mixed Reviews President's Cyber Response Directive Gets Mixed Reviews
Athens Orthopedic Clinic Confirms 'Dark Overlord' Attack
Athens Orthopedic Clinic Confirms 'Dark Overlord' Attack
New White House Policy Defines Coordination of Cyber Response
New White House Policy Defines Coordination of Cyber Response
DNC Breach More Severe Than First Believed
DNC Breach More Severe Than First Believed
2016: A Watershed Year for HIPAA Enforcement
2016: A Watershed Year for HIPAA Enforcement
'No More Ransom' Portal Offers Respite From Ransomware
'No More Ransom' Portal Offers Respite From Ransomware
Report: New York Fed Fumbled Cyber-Heist Response
Report: New York Fed Fumbled Cyber-Heist Response
Preventing Breaches Involving Personal Email
Preventing Breaches Involving Personal Email
France Slams Windows 10 Privacy, Security Controls
France Slams Windows 10 Privacy, Security Controls
Original link

More Articles …

  1. Solving Big Risk Problems One Small Step at a Time
  2. How Should US Respond If Russians Hacked DNC System?
  3. The Evolution of Ransomware
  4. Defining a Smart City's Security Architecture
  • 3465
  • 3466
  • 3467
  • 3468
  • 3469
  • 3470
  • 3471
  • 3472
  • 3473
  • 3474

Page 3470 of 3546