BreachExchange mailing list archives

How To Cushion The Impact Of A Data Breach


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 16 Sep 2013 18:42:03 -0600

http://www.darkreading.com/management/how-to-cushion-the-impact-of-a-data-brea/240161188


For five years now, a Ponemon Institute annual report has tried to put a
number on the cost of data breaches. It creates benchmarks for direct costs
such as regulatory fines and the cost of notifying customers, alongside
estimates of indirect costs such as customer churn and lost business. In
2013, Ponemon pegged the cost of a data breach at $136 per lost record on
average across the globe. Ponemon estimated the cost in the U.S. at $188
per record, and $277 per record when the breach came at the hands of
malicious and criminal attacks such as outside hacking or insider theft.

Benchmarks have their role, but everyone knows that some types of breaches
are far more expensive to companies, such as those that expose intellectual
property (IP) such as secret recipes or technological specifications, or
that reveal acquisition information prior to a big deal. Manufacturing
supply chains could be tampered with in sabotage attempts. Or customer
records could be stolen, sometimes from a third-party contractor rather
than the organization entrusted with the information.

Factors such as lost IP don't make it into many breach cost estimates
because the impact is so hard to measure, and because breaches are often
outside regulatory scrutiny and therefore aren't publicly reported. But by
understanding hidden or underreported costs, and threats specific to their
industries, companies can better plan breach response and recovery, set
budgets that fit the risks and reduce the cost of future problems.

*The Hidden Impact Of Breaches*

IT must contend with its costs of forensics and interruptions that go along
with piecing together what was stolen and how. But "hands down, the biggest
cost is loss of productivity," says Vinnie Liu, managing partner for
security consulting firm Bishop Fox, "not just with the IT team but all the
people who are affected by the systems impacted, especially critical
systems. It has a domino effect, and it is a huge multiplier effect that
happens after a breach."

And as Ponemon and others calculate, there are substantial known costs of
notifying affected customers and business partners, paying for credit
monitoring and identity restoration for victims, and staffing call centers
for added customer service calls that all play into the total cost of a
breach.

Then there are potential costs for regulatory investigations, litigation,
the loss of goodwill and the loss of customers, all of which contribute to
the squishy "brand damage" that is impractical to truly measure.

The most commonly neglected cost involves the phenomenon of "organizational
thrash," contends Peter Tran, senior director of the Advanced Cyber Defense
practice at RSA, the security division of EMC. This is the fatigue factor
that hits IT and sometimes other departments after slogging through crisis
mode for months after a breach discovery, examining log data, ferreting out
the adversary, changing infrastructure, and working with lawyers and
communications specialists. Security becomes less effective because IT
teams are "burned out, and they're actually less on the ball than before,"
Tran says.

It's not just the loss of IP such as technical specs that can cost a
company dearly. A company is put at a disadvantage if it loses data on how
much it is willing to bid on a contract, where it plans to set up new
operations or which overseas businesses it plans to negotiate deals with.

Companies also frequently pull back on innovative projects following a
breach, particularly in the tech sector, as they try to identify what IP is
lost, and how it was taken, before investing more into that work. Putting
hard costs on that lost innovation is hard, Tran says, because it's so
intertwined with economic and market factors.

*Take Early Action*

The damage from security breaches tends to increase the longer an attack
goes undetected. If the goal is to steal customer data or intellectual
property, most breaches start small with a malware foothold on some
endpoint, established through a phishing attack or Web-based attack. With a
beachhead established, the attacker looks to escalate privileges on the
machine, move sideways onto other machines and implant multiple back doors
on all the systems the attack touches to maintain persistence. "More
importantly, the longer it takes, the more likely an attacker is to find
and exfiltrate the organizations 'secret sauce,'" says James Phillippe,
leader of threat and vulnerability services for the U.S. at Ernst & Young.

Many compromises today are measured in months, not minutes. The 2013
Verizon RISK Team "Data Breach Investigations Report" found that 66% of
breaches in 2012 remained undiscovered for months or more, up from 41% in
2010. And approximately 70% of those breaches were discovered by third
parties such as business partners or police, not by the affected
organization.

One of the biggest inhibitors to speedy breach detection and response is
the lack of visibility and analysis of network traffic, which would allow
organizations to connect the dots between seemingly isolated attack
symptoms and see them as indicators of a compromised system.

"Many organizations are content to play whack-a-mole when it comes to
incident response," Phillippe says. "They clean malware off the host and
quickly return it to service. This perceived response only treats the
symptom of the issue, the malware."

There are three keys to quickly discovering and responding to breaches,
says Phillippe. First, companies need solid asset management to recognize
all of the devices on the network and establish baseline behavior, which
improves their chances of quickly detecting anomalies.

Second, a well-tuned security, information and event management system is
the "heart of a security operations center" and is the engine connecting
the dots that show that those anomalies amount to an attack.

Third, threat intelligence services give companies the context to recognize
potential attackers. These services offer industry-wide data about attack
patterns and trends occurring at other companies so companies can look out
for certain indicators of compromise.

*Plan For Effective Breach Response*

Early detection offers the chance to reduce the cost of a data breach, but
companies need a breach incident response plan to take advantage of that
knowledge.

"If you have a plan, you'll be ahead of most organizations," says Rick Kam,
president and founder of the post-breach response consultancy ID Experts.
ID Experts, which has worked with hundreds of IT organizations to help them
clean up after breaches, has found that companies that seek its help almost
never have an incident response plan. These same IT organizations may have
disaster recovery or business continuity plans, but no plan for responding
to a big data breach.

According to Ponemon estimates, an incident response plan can help reduce
the cost of a breach by as much as $42 per record for breaches involving
personally identifiable information. Step one to developing an effective
plan is to assess the business impact if a breach were to knock out a
critical asset, shut down a key process or expose vital data. "Then
determine the actual tactical plans to respond to a number of threats to
that element," says Tran.

Similarly, by doing best- and worst-case scenario planning, IT
organizations can determine whether response efforts will be centered on
gathering forensics to bring an attacker to justice or, more commonly,
getting operations back up and running as quickly as possible. "I've seen
people go down rabbit holes and waste all sorts of time," Liu warns.

When an incident is discovered, Liu recommends taking a deep breath and
reassessing those goals to avoid knee-jerk reactions that can lead to
locking all systems down, buying unnecessary software "and just responding
too quickly without an endgame."

Some organizations spend too much time trying to attribute the attack to a
specific attacker. John Walton, principal security manager at Microsoft,
thinks it's worth understanding a company's potential attackers before a
breach happens, since that can help prioritize spending and develop
defenses. But when a breach incident is in progress, attributing it to a
single source shouldn't be a priority.

"Incident response teams can focus too much effort on trying to understand
the adversary or trying to ascertain who it is," Walton says. "That can
take away a lot of resources and valuable time [from] doing other recovery
efforts."

In addition to deep breaths, documentation and testing also are important.

A breach response plan should lay out procedures and processes for
containing a breach, putting the forensics plan into action, and
communicating your breach plan to partners and customers. It should also
identify which experts will be carrying out those processes, says Melissa
Ventrone, an attorney who works as an associate in the data privacy and
security group at the law firm Wilson Elser. A team of technology, legal,
forensics and crisis communication experts should be formed in advance and
review and practice the plan. "Policies are only as good as the people who
abide by them and follow them and test them and make sure they work,"
Ventrone says. "The time to learn whether or not your documents are in
place, or whether you can follow policies, is not during an emergency."

There's a balancing act here: Organizations should conduct breach
management exercises at least once a quarter, says Tran, but he recognizes
the risk of overtraining staff and causing fatigue. To avoid
"organizational thrash" that may follow an actual incident, Tran recommends
cross-training, so that the team can set up a sane work rotation during a
crisis.

"A common pitfall in operations is you leave folks in place in their jobs
way too long," he says. A forensics expert working 12-hour days examining
log data will burn out quickly without some kind of backup staff. "There
needs to be enough relief pitchers out there."

*The Breach Advantage*

While incident response plans are built to help organizations get back to
normal quickly after a breach, IT teams should recognize that a major
security failure likely will change the company and how it thinks about
security. "Your whole outlook changes," says Lucas Zaichkowsky, an
enterprise defense architect at security firm AccessData.

These changes can be good or bad. Bad changes such as lost revenue, brand
damage, customer churn and competitive damage can be limited through
effective planning. Minimizing the damage can also prevent bad change
related to a company becoming overly cautious and pulling back on
innovation. Good changes, based on lessons learned from the breach, should
be maximized to make a meaningful improvement in security operations down
the road.

"There are a lot of normal security operations that still get breached,"
Zaichkowsky says. "As they go through that, they learn a really valuable
lesson: that the everyday noise in security they defend against -- the spam
and rogue AV pop-ups, the junk -- is extremely different from defending
against a real attacker that's going to steal data."

Building up a defensive posture equipped to defend against those kinds of
hacker attacks is a good outcome, he says.

One security practitioner at a large financial organization says his
company has learned important lessons from the recent sting from a
substantial and very public breach. "Sometimes a data breach is exactly
what a big organization needs to get its security act together," said the
security pro, who asked to remain anonymous.

A massive problem is the only thing powerful enough to instill meaningful
IT security changes at a company, the security pro says. For years before
the incident, he says he went blue in the face warning about potential
threats and asking for additional budget.

Organizations that have been through a breach are generally more willing to
spend on the resources needed to respond effectively and reduce the risk
and impact of breaches in the future. "Usually, it's a fairly big wake-up
call that they've got to change what they do," says Liu.

But turning over a new leaf means integrating effective postmortem analysis
into the breach response.

"After the initial incident, take the time to plan out the lessons
learned," Liu says. "Not just cleaning up and not just getting secure, but
making sure you stay secure." That extra work will add to the post-breach
expense, but it's a cost worth bearing.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

# OWASP http://www.appsecusa.org
# Builders, Breakers and Defenders
# Time Square, NYC 20-21 Nov
o()xxxx[{::::::::::::::::::::::::::::::::::::::::>

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security offers security intelligence, risk management services and customized security solutions. The 
YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk 
mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.

Current thread: