SlideShare a Scribd company logo
1 of 26
Download to read offline
PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
MANAGING A HACK:
Orchestrating Incident Response to Preserve Brand
Reputation
Sandra Fathi
President, Affect
Email: sfathi@affect.com
tweet: @sandrafathi
web: affect.com
blog: techaffect.com
Cyber Security Summit
Chicago
Sept 26-27th, 2018
PROPRIETARY & CONFIDENTIAL 3@sandrafathi
SECURITY EXPERIENCE
PROPRIETARY & CONFIDENTIAL 4@sandrafathi
CRISIS EXPERIENCE
• Data Breaches, Identity Theft, Website Hacks, Malware (Multiple Companies)
• Product Recall for Potential Lead Poisoning (Baby Product)
• Hurricane Sandy, Hurricane Irene (ConEd)
• Worker Strike, Manhole Cover Explosion, Building Explosion (ConEd)
• Hit & Run (By Company Employee)
• Sexual Harassment and Executive Misconduct (By CEO)
• Executive Arrest for DUI
• Terrorist Activity Interrupts Operations (Tech Company)
• Foreign Mafia Threats on Executives (Tech Company)
• Employee Kidnapping/Release by Militia (Tech Company)
PROPRIETARY & CONFIDENTIAL 5@sandrafathi
ANATOMY OF A BREACH
How does it start?
• IT discovers a breach
• Customers alert company regarding an issue
• Anonymous post on a social network
• Employee finds data for sale on the dark web
• A journalist calls
• A hacker makes contact
PROPRIETARY & CONFIDENTIAL 6@sandrafathi
BASIC INSTINCTS
1. Triage – Stop the bleeding
2. Diagnose – Identify the nature of the breach
3. Investigate – Find the root cause
4. Repair – Implement technical fix
5. Communicate – Inform executive team
• Inform legal counsel
• Inform marcom
• Inform authorities
• Inform customers
• Inform media
Takes too long
Doesn’t always happen
PROPRIETARY & CONFIDENTIAL 7@sandrafathi
SELF-PRESERVATION
Justifications
• We don’t know if data was accessed
• No critical data was accessed
• It’s fixed. We’re out of danger
• Very few customers were impacted
• We don’t want to bring more attention to it
• We don’t know all the facts, so we’ll wait until we do
• We don’t want to appear incompetent
• We don’t want to lose our jobs, customers, revenue etc.
PROPRIETARY & CONFIDENTIAL 8@sandrafathi
ALL 50 STATES
PROPRIETARY & CONFIDENTIAL 9@sandrafathi
ALL 50 STATES
PROPRIETARY & CONFIDENTIAL 10@sandrafathi
WHO’S IN THE ROOM
Crisis Drills/Tabletops
• Tech Leadership
• Executive Leadership
• Legal Counsel
• Operations
• Communications***
Photo Credit: CyberBit
PROPRIETARY & CONFIDENTIAL 11@sandrafathi
FOUR PHASES OF CRISIS
COMMUNICATION
PROPRIETARY & CONFIDENTIAL 12@sandrafathi
I. READINESS
Anticipating a Crisis
1. Crisis Mapping (SWOT Analysis)
2. Policies & Procedures (Prevention)
3. Crisis Monitoring
4. Crisis Communications Plan
• Crisis Action Plan
• Crisis Standard Communications Templates
• Crisis Drills
Photo Credit: CyberTraining 365 Blog
PROPRIETARY & CONFIDENTIAL 13@sandrafathi
THREAT MAPPING
HR Sales Marketing Finance IT
People
Products
Facilities
Environment
Information
Other
Rank Order
High Risk
to
Low Risk
PROPRIETARY & CONFIDENTIAL
CHANNEL MAPPING
PROPRIETARY & CONFIDENTIAL
II. RESPONSE
1. Develop materials:
• Messages/FAQ
• Prepared statements
• Press release template
• Customer letters
2. Train employees
• Awareness
• Anticipation
• Organizational Preparation
3. Prepare channels:
• Hotline
• Dark site
• Social Media
4. Data Breach/Customer Assistance
Resources
• Microsite/Landing Page FAQ
• Identity Theft Remediation Services
• Force Password/Account
Information Change
• Special Customer Advocate/Team
PROPRIETARY & CONFIDENTIAL
PREPARING A RESPONSE
1. Don’t delay
2. Acknowledge situation
3. Acknowledge impact and victims or potential victims
4. Commit to investigate
5. Commit to sharing information and cooperation with relevant
parties
6. Share corrective action plan if available
7. Respond in the format in which the crisis was received**
@sandrafathi
PROPRIETARY & CONFIDENTIAL
PUBLIC BREACH NOTIFICATIONS
@sandrafathi
1. What happened?
2. What do we know?
3. Who/what was impacted?
4. How do we feel about it?
5. What are we going to do about it?
6. When are we going to do it?
7. Who is involved in this process?
8. When/how will we communicate next?
PROPRIETARY & CONFIDENTIAL
CUSTOMER
COMMUNICATION
1. Introduction: Why are we contacting you?
2. What happened?
3. What information was compromised?
4. What are we doing to remedy the situation?
5. What can you do to prevent/mitigate further risk?
6. Where can you find more information?
@sandrafathi
PROPRIETARY & CONFIDENTIAL
III. REASSURANCE
Who to Reassure? - All Stakeholders: Customers, Prospects, Public,
Shareholders, Employees, Partners, Media etc.
1. Develop full response plan
• Policies & procedures
• Technology
• People
2. Put plan into action: Immediate remedy
3. Communicate results of plan and impact
4. Reaffirm commitment to correction
5. Demonstrate results of program
@sandrafathi
PROPRIETARY & CONFIDENTIAL
IV. RECOVERY
Rebuilding reputation, trust and customer loyalty
Implementing preventative measures for long-term crisis mitigation
and/or prevention
1. Review need for operational, regulatory, environmental and
employee changes
2. Develop long-term plan including policies and prevention tactics
3. Reassess crisis plan
4. Regain customer/public trust
@sandrafathi
PROPRIETARY & CONFIDENTIAL 21@sandrafathi
CASE STUDY: EQUIFAX • March – Apache vulnerability discovered,
patch issued next day
• May-July – Hackers infiltrate Equifax servers
with more than 9,000 requests. ~145M
records are accessed, nearly 44% of US
Population
• July 29 – Equifax discovers breach
• Sept 7 - Equifax issues public statement
• Sept 8 – Equifax shares plunge 13.7%
• Sept 12 – CEO apologizes in USA Today Op-Ed
• Sept 15 - Equifax announces CIO & CSO are
retiring
• Sept 21 – Equifax admits sending victims to
bogus website ‘securityequifax2017.com’
• Sept 26 – CEO retires
• Oct 3 – Former CEO testifies for the first time
(of four) in Congress
PROPRIETARY & CONFIDENTIAL 22@sandrafathi
MEDIA REACTIONS
PROPRIETARY & CONFIDENTIAL 23@sandrafathi
CONSEQUENCES TO DATE
• CEO, CIO, CSO ‘Retire’
• 2 employees indicted for insider trading (CIO & Developer)
• CEO testifies at 4 Congressional hearings
• 8 State bank regulators impose orders for increasing security, auditing and
reporting
• CA passes law imposes sanctions/fines for each data breach (up to $750 per
record, effective Jan 2020)
• AL & ND penalties for delayed notifications (60 days/$10K and 45 day/$5K)
• Federal bill for FREE credit ‘freeze’ and ‘thaw’ from all three large bureaus
(previously $5-$10 each)
• 30+ Consumer class action suits
PROPRIETARY & CONFIDENTIAL 24@sandrafathi
BEST PRACTICES I
1. Implement Policies to Address Potential Vulnerabilities
2. Establish a Regular Review Cycle for Crisis Preparation
3. Establish Inter-Departmental Cooperation
4. Establish a Framework for Response
5. Build a Crisis Communications Toolkit
PROPRIETARY & CONFIDENTIAL 25@sandrafathi
BEST PRACTICES II
6. Know Where & How to Respond
7. Prepare Your Employees in Advance
8. Establish Assistance Services for those Impacted
9. Know the Relevant Legal & Regulatory Requirements
10. Be Honest, Be Transparent
PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
Sandra Fathi
President, Affect
Email: sfathi@affect.com
tweet: @sandrafathi
web: affect.com
blog: techaffect.com
Slides Available: Slideshare.net/sfathi

More Related Content

Similar to Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
100311 social business summit (citi)
100311 social  business summit (citi)100311 social  business summit (citi)
100311 social business summit (citi)
Jaime Punishill
 

Similar to Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation (20)

Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Designing Your Product Vision
Designing Your Product VisionDesigning Your Product Vision
Designing Your Product Vision
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Issues Management In The Digital Age
Issues Management In The Digital AgeIssues Management In The Digital Age
Issues Management In The Digital Age
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Websites are a symptom, not the cause
Websites are a symptom, not the causeWebsites are a symptom, not the cause
Websites are a symptom, not the cause
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
100311 social business summit (citi)
100311 social  business summit (citi)100311 social  business summit (citi)
100311 social business summit (citi)
 
IABC & RockDove Solutions - Crisis Preparedness in the Digital Era
IABC & RockDove Solutions - Crisis Preparedness in the Digital EraIABC & RockDove Solutions - Crisis Preparedness in the Digital Era
IABC & RockDove Solutions - Crisis Preparedness in the Digital Era
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!"What Could Go Wrong?" - We're Glad You Asked!
"What Could Go Wrong?" - We're Glad You Asked!
 

More from Sandra Fathi

Trade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingTrade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't Sharing
Sandra Fathi
 
Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers
Sandra Fathi
 

More from Sandra Fathi (20)

News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
 
Women's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change RealityWomen's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change Reality
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake News
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Show Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-SuiteShow Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-Suite
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOW
 
Break From the Pack with Data Visualization & Infographics
Break From the Pack with Data Visualization & InfographicsBreak From the Pack with Data Visualization & Infographics
Break From the Pack with Data Visualization & Infographics
 
Fear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear MostFear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear Most
 
Trade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingTrade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't Sharing
 
Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement
 
Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)
 
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsData-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
 
How to Develop a Content Strategy
How to Develop a Content StrategyHow to Develop a Content Strategy
How to Develop a Content Strategy
 
Payback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR MeasurementPayback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR Measurement
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
 
PR Measurement Clinic: Assessing the Success of a Communications Strategy
PR Measurement Clinic: Assessing the Success of a Communications StrategyPR Measurement Clinic: Assessing the Success of a Communications Strategy
PR Measurement Clinic: Assessing the Success of a Communications Strategy
 
How to Create an Effective Crisis Communications Plan Before Disaster Strikes
How to Create an Effective Crisis Communications Plan Before Disaster StrikesHow to Create an Effective Crisis Communications Plan Before Disaster Strikes
How to Create an Effective Crisis Communications Plan Before Disaster Strikes
 
Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers
 
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
 

Recently uploaded

Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 

Recently uploaded (20)

Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
Call Girls In Majnu Ka Tilla 959961~3876 Shot 2000 Night 8000
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 

Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation

  • 1. PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
  • 2. PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies MANAGING A HACK: Orchestrating Incident Response to Preserve Brand Reputation Sandra Fathi President, Affect Email: sfathi@affect.com tweet: @sandrafathi web: affect.com blog: techaffect.com Cyber Security Summit Chicago Sept 26-27th, 2018
  • 3. PROPRIETARY & CONFIDENTIAL 3@sandrafathi SECURITY EXPERIENCE
  • 4. PROPRIETARY & CONFIDENTIAL 4@sandrafathi CRISIS EXPERIENCE • Data Breaches, Identity Theft, Website Hacks, Malware (Multiple Companies) • Product Recall for Potential Lead Poisoning (Baby Product) • Hurricane Sandy, Hurricane Irene (ConEd) • Worker Strike, Manhole Cover Explosion, Building Explosion (ConEd) • Hit & Run (By Company Employee) • Sexual Harassment and Executive Misconduct (By CEO) • Executive Arrest for DUI • Terrorist Activity Interrupts Operations (Tech Company) • Foreign Mafia Threats on Executives (Tech Company) • Employee Kidnapping/Release by Militia (Tech Company)
  • 5. PROPRIETARY & CONFIDENTIAL 5@sandrafathi ANATOMY OF A BREACH How does it start? • IT discovers a breach • Customers alert company regarding an issue • Anonymous post on a social network • Employee finds data for sale on the dark web • A journalist calls • A hacker makes contact
  • 6. PROPRIETARY & CONFIDENTIAL 6@sandrafathi BASIC INSTINCTS 1. Triage – Stop the bleeding 2. Diagnose – Identify the nature of the breach 3. Investigate – Find the root cause 4. Repair – Implement technical fix 5. Communicate – Inform executive team • Inform legal counsel • Inform marcom • Inform authorities • Inform customers • Inform media Takes too long Doesn’t always happen
  • 7. PROPRIETARY & CONFIDENTIAL 7@sandrafathi SELF-PRESERVATION Justifications • We don’t know if data was accessed • No critical data was accessed • It’s fixed. We’re out of danger • Very few customers were impacted • We don’t want to bring more attention to it • We don’t know all the facts, so we’ll wait until we do • We don’t want to appear incompetent • We don’t want to lose our jobs, customers, revenue etc.
  • 8. PROPRIETARY & CONFIDENTIAL 8@sandrafathi ALL 50 STATES
  • 9. PROPRIETARY & CONFIDENTIAL 9@sandrafathi ALL 50 STATES
  • 10. PROPRIETARY & CONFIDENTIAL 10@sandrafathi WHO’S IN THE ROOM Crisis Drills/Tabletops • Tech Leadership • Executive Leadership • Legal Counsel • Operations • Communications*** Photo Credit: CyberBit
  • 11. PROPRIETARY & CONFIDENTIAL 11@sandrafathi FOUR PHASES OF CRISIS COMMUNICATION
  • 12. PROPRIETARY & CONFIDENTIAL 12@sandrafathi I. READINESS Anticipating a Crisis 1. Crisis Mapping (SWOT Analysis) 2. Policies & Procedures (Prevention) 3. Crisis Monitoring 4. Crisis Communications Plan • Crisis Action Plan • Crisis Standard Communications Templates • Crisis Drills Photo Credit: CyberTraining 365 Blog
  • 13. PROPRIETARY & CONFIDENTIAL 13@sandrafathi THREAT MAPPING HR Sales Marketing Finance IT People Products Facilities Environment Information Other Rank Order High Risk to Low Risk
  • 15. PROPRIETARY & CONFIDENTIAL II. RESPONSE 1. Develop materials: • Messages/FAQ • Prepared statements • Press release template • Customer letters 2. Train employees • Awareness • Anticipation • Organizational Preparation 3. Prepare channels: • Hotline • Dark site • Social Media 4. Data Breach/Customer Assistance Resources • Microsite/Landing Page FAQ • Identity Theft Remediation Services • Force Password/Account Information Change • Special Customer Advocate/Team
  • 16. PROPRIETARY & CONFIDENTIAL PREPARING A RESPONSE 1. Don’t delay 2. Acknowledge situation 3. Acknowledge impact and victims or potential victims 4. Commit to investigate 5. Commit to sharing information and cooperation with relevant parties 6. Share corrective action plan if available 7. Respond in the format in which the crisis was received** @sandrafathi
  • 17. PROPRIETARY & CONFIDENTIAL PUBLIC BREACH NOTIFICATIONS @sandrafathi 1. What happened? 2. What do we know? 3. Who/what was impacted? 4. How do we feel about it? 5. What are we going to do about it? 6. When are we going to do it? 7. Who is involved in this process? 8. When/how will we communicate next?
  • 18. PROPRIETARY & CONFIDENTIAL CUSTOMER COMMUNICATION 1. Introduction: Why are we contacting you? 2. What happened? 3. What information was compromised? 4. What are we doing to remedy the situation? 5. What can you do to prevent/mitigate further risk? 6. Where can you find more information? @sandrafathi
  • 19. PROPRIETARY & CONFIDENTIAL III. REASSURANCE Who to Reassure? - All Stakeholders: Customers, Prospects, Public, Shareholders, Employees, Partners, Media etc. 1. Develop full response plan • Policies & procedures • Technology • People 2. Put plan into action: Immediate remedy 3. Communicate results of plan and impact 4. Reaffirm commitment to correction 5. Demonstrate results of program @sandrafathi
  • 20. PROPRIETARY & CONFIDENTIAL IV. RECOVERY Rebuilding reputation, trust and customer loyalty Implementing preventative measures for long-term crisis mitigation and/or prevention 1. Review need for operational, regulatory, environmental and employee changes 2. Develop long-term plan including policies and prevention tactics 3. Reassess crisis plan 4. Regain customer/public trust @sandrafathi
  • 21. PROPRIETARY & CONFIDENTIAL 21@sandrafathi CASE STUDY: EQUIFAX • March – Apache vulnerability discovered, patch issued next day • May-July – Hackers infiltrate Equifax servers with more than 9,000 requests. ~145M records are accessed, nearly 44% of US Population • July 29 – Equifax discovers breach • Sept 7 - Equifax issues public statement • Sept 8 – Equifax shares plunge 13.7% • Sept 12 – CEO apologizes in USA Today Op-Ed • Sept 15 - Equifax announces CIO & CSO are retiring • Sept 21 – Equifax admits sending victims to bogus website ‘securityequifax2017.com’ • Sept 26 – CEO retires • Oct 3 – Former CEO testifies for the first time (of four) in Congress
  • 22. PROPRIETARY & CONFIDENTIAL 22@sandrafathi MEDIA REACTIONS
  • 23. PROPRIETARY & CONFIDENTIAL 23@sandrafathi CONSEQUENCES TO DATE • CEO, CIO, CSO ‘Retire’ • 2 employees indicted for insider trading (CIO & Developer) • CEO testifies at 4 Congressional hearings • 8 State bank regulators impose orders for increasing security, auditing and reporting • CA passes law imposes sanctions/fines for each data breach (up to $750 per record, effective Jan 2020) • AL & ND penalties for delayed notifications (60 days/$10K and 45 day/$5K) • Federal bill for FREE credit ‘freeze’ and ‘thaw’ from all three large bureaus (previously $5-$10 each) • 30+ Consumer class action suits
  • 24. PROPRIETARY & CONFIDENTIAL 24@sandrafathi BEST PRACTICES I 1. Implement Policies to Address Potential Vulnerabilities 2. Establish a Regular Review Cycle for Crisis Preparation 3. Establish Inter-Departmental Cooperation 4. Establish a Framework for Response 5. Build a Crisis Communications Toolkit
  • 25. PROPRIETARY & CONFIDENTIAL 25@sandrafathi BEST PRACTICES II 6. Know Where & How to Respond 7. Prepare Your Employees in Advance 8. Establish Assistance Services for those Impacted 9. Know the Relevant Legal & Regulatory Requirements 10. Be Honest, Be Transparent
  • 26. PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies Sandra Fathi President, Affect Email: sfathi@affect.com tweet: @sandrafathi web: affect.com blog: techaffect.com Slides Available: Slideshare.net/sfathi