{"id":1162,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail39-suw13-rsgsv-net\/"},"modified":"2021-12-30T11:38:52","modified_gmt":"2021-12-30T11:38:52","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail39-suw13-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail39-suw13-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail39.suw13.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Analyzing Spear Phishing Attacks<br \/>\nIn this post, we recommend defenses and key performance indicators for Phase 3:Analyze.<br \/>\nOnce an attack is detected, it needs to be analyzed to determine the best mitigation strategy.<br \/>\nThe objective of the Analyze phase is to quickly establish sufficient threat context to drive the appropriate next action.<br \/>\nTo manage the Analyze phase and assess effectiveness, consider the following key performance indicators.<br \/>\nTime-to-assess<br \/>\nTime-to-context<br \/>\nCompleteness of context<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2f97768238&#038;e=20056c7556<\/p>\n<p>The Cyber Hunting Maturity Model<br \/>\nMany organizations are quickly discovering that threat hunting is the next step in the evolution of the modern SOC, but remain unsure of how to start hunting or how far along they are in developing their own hunt capabilities.<br \/>\nHow can you quantify where your organization stands on the road to effective hunting.<br \/>\nWith a general model that can map hunting maturity across any organization.<br \/>\nWith that definition of hunting in mind, let&#8217;s consider what makes a good hunting program.<br \/>\nThere are three factors to consider when judging an organization&#8217;s hunting ability: the quality and quantity of the data they collect for hunting, the tools they provide to access and analyze the data, and the skills of the analysts who actually use the data and the tools to find security incidents.<br \/>\nThe Hunting Maturity Model, developed by Sqrrl&#8217;s security architect and hunter David Bianco, describes five levels of organizational hunting capability, ranging from HMM0 (the least capable) to HMM4 (the most).<br \/>\nLet&#8217;s examine each level in detail&#8230;.<br \/>\nCISOs that hear that their organization needs to &#8220;get a hunt team&#8221; may legitimately be convinced that an active detection strategy is the right move, and yet still be confused about how to describe what a hunt team&#8217;s capability should actually be.<br \/>\nA maturity model will ideally help anyone thinking of getting into hunting get a good idea of what an appropriate initial capability would be.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c10d19d8b9&#038;e=20056c7556<\/p>\n<p>Introduction to Web fraud detection systems<br \/>\nMany organizations are quickly discovering that threat hunting is the next step in the evolution of the modern SOC, but remain unsure of how to start hunting or how far along they are in developing their own hunt capabilities.<br \/>\nHow can you quantify where your organization stands on the road to effective hunting.<br \/>\nWith a general model that can map hunting maturity across any organization.<br \/>\nWith that definition of hunting in mind, let&#8217;s consider what makes a good hunting program.<br \/>\nThere are three factors to consider when judging an organization&#8217;s hunting ability: the quality and quantity of the data they collect for hunting, the tools they provide to access and analyze the data, and the skills of the analysts who actually use the data and the tools to find security incidents.<br \/>\nThe Hunting Maturity Model, developed by Sqrrl&#8217;s security architect and hunter David Bianco, describes five levels of organizational hunting capability, ranging from HMM0 (the least capable) to HMM4 (the most).<br \/>\nLet&#8217;s examine each level in detail.<br \/>\nCISOs that hear that their organization needs to &#8220;get a hunt team&#8221; may legitimately be convinced that an active detection strategy is the right move, and yet still be confused about how to describe what a hunt team&#8217;s capability should actually be.<br \/>\nA maturity model will ideally help anyone thinking of getting into hunting get a good idea of what an appropriate initial capability would be.<br \/>\nWeb fraud detection systems typically focus on new account origination, account takeover and payment fraud.<br \/>\nWith account takeover and new account origination fraud detection, organizations attempt to root out unauthorized or fraudulent users posing as legitimate users.<br \/>\nPayment fraud detection involves determining whether purchases are being or have been made with stolen payment cards.<br \/>\nSome vendors also offer fraud intelligence services, authentication, malware detection (such as man-in-the-browser infections on computers and mobile devices) and secure clients, as well as managed services in which the vendor is primarily responsible for monitoring and taking action on instances of fraud.<br \/>\nWeb fraud detection software (or cloud-based service) runs background processes that scan transactions and score them based on the possibility of fraud.<br \/>\nTo detect fraud, vendors typically use a predictive behavioral scoring model, in which an account holder&#8217;s behavior is the predominant criteria, or a rule-based system that uses pattern recognition.<br \/>\nSome products or services use both types of scoring models.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3b85cf3cb6&#038;e=20056c7556<\/p>\n<p>Best CISO\/CSO Award Goes to SecureWorld National Advisory Council Member<br \/>\nViewpost North America announced that its Chief Security Officer, Christopher Pierson, has been named recipient of the Best CISO\/CSO Award presented by FireEye, Inc.<br \/>\nOver the past four years, Pierson and his team have designed and implemented cybersecurity and compliance programs with a B2B-focused approach to earn the trust and goodwill of its customers and partners.<br \/>\nPierson also serves as an appointed member of the Department of Homeland Security\u2019s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittees, is a Distinguished Fellow of the Ponemon Institute, and serves as a member of the National Advisory Board of SecureWorld.<br \/>\nPrior to joining Viewpost in 2012, he was the SVP, Chief Privacy Officer for the Royal Bank of Scotland\u2019s U.S. banking operations.<br \/>\nViewpost and Pierson are no strangers to recognition for their diligent implementation of cybersecurity measures and programs.<br \/>\nEarlier this year, Viewpost was named winner of the 2015 CSO50 Award in recognition of the robust security built into its network architecture at the guidance of Pierson\u2019s team.<br \/>\nThe annual award by IDG\u2019s CSO recognizes the 50 security projects and initiatives that have delivered the most groundbreaking business value through the innovative application of risk and security concepts and technologies.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6f2c8974dd&#038;e=20056c7556<\/p>\n<p>Oracle points patching firehose at 154 vulnerabilities<br \/>\nSysadmins forced by circumstance or folly to support Java can get busy again, with 25 fixes for the product among the Scarlet Letter&#8217;s regular patch notice.<br \/>\nThe good news is that Oracle says none of the vulnerabilities in its mammoth bug-splat had been exploited as of 19 October.<br \/>\nThe fixes to Java SE and Java SE Embedded cover vulnerabilities in the CORBA (Common Object Request Broker Architecture), Remote Method Invocation (Java RMI), Java FX, serialisation, 2D, Java API for XML Processing (JAXP), Java Generic Security Services (JGSS), security and deployment sub-components, as well as various library flaws.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2fc01892b8&#038;e=20056c7556<\/p>\n<p>Tripwire Releases IP Expo Survey on Supply Chain Cyber Security<br \/>\nAccording to Tripwire\u2019s survey, 63 percent of the respondents said their organisation would refuse to use partners and suppliers that failed to meet their IT security standards.<br \/>\nDespite these concerns, only 53 percent of the respondents require partners and suppliers to pass security audits.<br \/>\ndditional survey findings included:<br \/>\n&#8211; 62 percent of the respondents said they are required to meet their customers\u2019 security standards, and 63 percent believe their customers would lose confidence in them if one of them suffered a serious data breach.<br \/>\n&#8211; 46 percent of respondents said they would lose contracts and be fined by a regulator or government agency if one of their partners or suppliers suffered from a serious data breach.<br \/>\n&#8211; 22 percent of respondents said their organisations do not have the resources to check supplier contracts and ensure they meet their businesses security requirements.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9689e1702f&#038;e=20056c7556<\/p>\n<p>Federal Government Announces New HIPAA Privacy Audits for Companies That Handle Healthcare Data<br \/>\nHere&#8217;s some news for companies that have to comply with the privacy provisions of the Health Insurance Portability and Accountability Act (&#8220;HIPAA&#8221;).<br \/>\nThe U.S.<br \/>\nDepartment of Health and Human Services (&#8220;HHS&#8221;) has announced plans to begin auditing compliance in early 2016.<br \/>\nThe announcement of a new, permanent audit program follows criticism from the HHS Office of Inspector General (&#8220;OIG&#8221;) in two reports examining HIPAA enforcement.<br \/>\nOIG expressed the need for a permanent audit program, noting that &#8220;[w]ithout fully implementing such a program, OCR [the HHS Office of Civil Rights] cannot proactively identify covered entities that are noncompliant with the privacy standard.&#8221; Currently, HHS relies primarily on complaints or tips, and voluntary disclosures of data breaches, as the bases for investigating alleged HIPAA violations.<br \/>\nOCR indicated that it will target high-risk areas and entities which have consistently been non-compliant, and include both onsite visits and remote desk reviews.<br \/>\nThe audits will also include both covered entities and their business associates.<br \/>\nWith the audits expected to begin in early 2016, covered entities and their business associates should consider reviewing and following the HIPAA Audit Program Protocol, which addresses privacy, security, and breach notification.<br \/>\nHHS is in the process of updating the protocol, and you may keep up with new developments here.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=21b72a484f&#038;e=20056c7556<\/p>\n<p>Australia: Metadata retention commences, but breach notification is delayed<br \/>\nOn 13 October 2015, substantial amendments to the Australian Telecommunications (Interception and Access) Act 1979 (Cth) (TIA) took effect to introduce a new metadata retention scheme into the TIA.<br \/>\nThis scheme requires telecommunications carriers and internet service providers (telcos) operating in Australia to maintain records of certain telecommunications data, known as \u2018metadata\u2019, for a period of two years.<br \/>\nUnder the metadata retention scheme, the metadata to be kept includes:<br \/>\n&#8211; subscriber or account-holder details;<br \/>\n&#8211; the source of the communication (whether it is an account, service or device);<br \/>\n&#8211; the destination of the communication (whether it is an account, service or device);<br \/>\n&#8211; the date, time and duration of the communication or connection;<br \/>\n&#8211; the type of communication (voice, SMS, email, instant message, forum post or social media) and the type of service used (such as ADSL, Wi-Fi, VoIP or a 3G or 4G telecommunications network); and<br \/>\n&#8211; the location of the equipment or device at the start and end of the communication (such as a mobile tower or Wi-Fi hotspot).<br \/>\nUnder the scheme, metadata is required to be retained so that law enforcement and security agencies can access this data for law enforcement and security purposes (which they can do without needing to first obtain a warrant).<br \/>\nIn the case of metadata relating to journalists, a specific \u2018journalist information warrant\u2019 must be obtained before an agency can access metadata about a journalist.<br \/>\nOnce mandatory data breach notification does become law, and there now seems little doubt this will occur during the course of the next year or so, it will put a whole new spin on privacy reform.<br \/>\nThere will be nowhere to hide in the case of a serious privacy breach, with the very real prospect of a costly class action following the breach.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=46a1b6975e&#038;e=20056c7556<\/p>\n<p>Employee activities that every security team should monitor<br \/>\nIT security professionals typically have no visibility into what users are actually doing once logged in, but instead are drowning in log data that tells them just about everything else about their environments.<br \/>\nOrganizations are rightly concerned about this lack of oversight.<br \/>\nA recent study by the Ponemon Institute and ObserveIT found that 71 percent of more than 600 security practitioners discovered major deficiencies in their monitoring of users and their application usage.<br \/>\nThe survey also uncovered three types of business applications that are the top sources of risk for insider threat:<br \/>\n&#8211; Ecommerce<br \/>\n&#8211; Financial<br \/>\n&#8211; CRM<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a4d5f45fdd&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=07261213f9)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage1.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Analyzing Spear Phishing Attacks In this post, we recommend defenses and key performance indicators for Phase 3:Analyze. Once an attack is detected, it needs to be analyzed to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1162","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1162"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1162\/revisions"}],"predecessor-version":[{"id":3649,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1162\/revisions\/3649"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}