There are few proven tools and methodologies for reliable early detection of data exfiltration. Most organizations are likely to be breached in some way, and although there are many reliable indicators of compromise (IOCs), they are complex, constantly changing, and are not specific enough. These indicators have not been credibly tied to precursors to data exfiltration in an effective way. In fact, on average, it takes an organization 99 days to discover network penetration and 201 days for data exfiltration to be discovered.
In this session, we will identify and corroborate the precursors for early mitigation of the next large complex data breach using a 6-pronged approach to mitigation.
- With a simple script or installed tool, external hackers or malicious insiders can quickly discover encryption keys.
- Split tunneling exploits can be ripe for DNS spoofing allowing a covert data exfiltration tunnel out.
- Poorly configured systems with web facing vulnerabilities happen very often during M&As (mergers and acquisitions) which is exacerbated by too much complexity.
About Jeremy Swenson
Mr. Swenson has worked or consulted at 10 organizations in 7 industries on progressively complex and difficult problems in business technology including: proj. mgmt., business analysis, data archival, audit, web application, and information security. From governments, banks, insurance companies, technology companies, and healthcare companies, he has a wealth of abstract experience. Impressively, the results are double-digit risk reductions, corrected strategic decisions, vetted process improvements, improved security, executive accolades, and $25+ million on average or more in savings per project. He is also a known writer/blogger and speaker at the intersection of information security, process improvement, and disruptive creativity. He has an MBA from Saint’s University of MN and Master’s in Security Technologies from the University of MN. He is the CEO of Abstract Forward Consulting, an information security management consultancy.