Categories
Innovation in Compliance

The Role of Backup Systems in Cybersecurity Defense with Curtis Preston

According to Curtis Preston, Chief Technical Evangelist at Druva, cyberattacks are not a matter of “if,” but “when.” In this episode, Tom Fox. and Curtis dive into the importance of backup systems and cyber resilience to protect against ransomware and other types of cyberattacks. Curtis shares his insights on how to limit the blast radius of an attack, why you should assume a breach, and the need to have a playbook and a cyber response team in place. They also discuss the role of state-sponsored attacks in non-kinetic warfare and the need for increased cyber resilience as we approach 2030.

W. Curtis Preston has 30 years of experience in the backup and data protection industry. He started his career at MBNA, the second-largest credit card company in 1993, and has been specializing in backup servers ever since. He is currently the Chief Technical Evangelist at Druva, where he talks, writes, and hosts podcasts about data protection systems. Curtis is also known as ‘Mr. Backup’, a moniker that he adopted while writing his first book on backups.

You’ll hear Tom and Curtis discuss:

  • SaaS-based data protection systems are becoming increasingly important as more companies rely on SaaS infrastructures like Microsoft 365 and Google Workspace. Companies should not count on these providers to protect their data; they should consider using SaaS-based backup systems instead.
  • Curtis tells Tom, “There should be security interest, as well as technical and storage and network interest. All of those interests should be reflected in the implementation of such an important system as a data protection system.”
  • Ransomware attackers are now targeting backup systems directly, making it crucial for companies to modernize the security infrastructure of their backup systems. They can do this by using SaaS-based systems that come with modern security features such as multi-factor authentication, triggers and alerts, and the concept of least privilege.
  • The inefficiencies and difficulties of a typical on-premises backup infrastructure, such as overbuilding and overengineering, can be solved by using a SaaS-based system where companies only pay for what they are actually using.
  • Fire drills, or ransomware drills, can help companies develop “muscle memory” and test their incident response playbook before an actual attack occurs.
  • Role-based administration is important to limit the blast radius in case an administrator’s account is compromised. Each person involved in the backup process should have specific roles and responsibilities.
  • State-sponsored attacks on American businesses, especially from Russia, are increasing. It’s important to beef up defenses, assume breaches, and have a playbook ready to respond to ransomware attacks.
  • By 2030, cyber resilience and protection topics will increase as people become more aware of cyberattacks. Passwords will be a thing of the past, and people will have to live in a world of constant cyberattacks.
  • A robust backup plan in place with sufficient security protocols is essential to recover from a cyberattack. It’s important to have the backup system completely air-gapped from the primary network.
  • Druva is a SaaS provider that offers a backup system that is stored behind a different authentication and authorization system. The data and metadata are separated for security reasons and constantly monitored for security purposes.

KEY QUOTES:

“Today, I think the average user is so used to equipment that just works, they don’t really think as much about backup and recovery, I think, as we did back in the day.” – Curtis Preston

“By the way, I do think by 2030, passwords will be a thing of the past.” – Curtis Preston

“It’s also having a robust backup plan in place with sufficient security protocols and that when you are attacked, not if when you are attacked, they can’t take your star player out, and if it all does go down, you have a way to at least build back.” – Curtis Preston

Resources:

Curtis Preston on LinkedIn | Twitter

Backup Central | Druva

Categories
Compliance Into the Weeds

Cyber Security Failures Alleged in Mudge Whistleblower Compliant

Compliance into the Weeds is the only weekly podcast that takes a deep dive into a compliance-related topic, literally going into the weeds to more fully explore a subject. In this episode, we mine the whistleblower allegations by Peiter Zatko, AKA “Mudge,” made against Twitter for lessons for the cyber-security professional and wide compliance discipline. Highlights and questions posed include:

·      The allegations made by Mudge.

·      Why does an organization need a CISO (or CCO or CECO)?

·      How did Twitter get hacked, its employees duped, and its controls bypassed?

·      What is pedestrian yet telling in this saga?

·      Why is data mapping mandatory if not critical?

·      Where were the external auditors?

·      Is there a Caremark claim here?

Resources

Matt in Radical Compliance

Categories
Compliance Into the Weeds

Internal Controls Lessons from Cyber Failures in Wisconsin

Compliance into the Weeds is the only weekly podcast that takes a deep dive into a compliance-related topic, literally going into the weeds to more fully explore a subject. In this episode, we deep dive into recent failures detected in the state of Wisconsin regarding cyber security risks around election integrity. Highlights include:

  • The risks were uncovered.
  • What is a material risk?
  • Why Multi-Factor Authentication is important cyber security control.
  • What are the consequences of a single point of failure?
  • How and when should redefine a hazard?
  • What does CISA say about MFAs?

Resources

Matt in Radical Compliance

Categories
Never the Same

Cyber Security Will Never Be the Same

After the Russian invasion of Ukraine, the business world will never be the same again. Deputy Attorney General Lisa Monaco recently said that the world’s “geopolitical landscape is more challenging and complex than ever. The most prominent example is, of course, Russia’s invasion of Ukraine.” It is “nothing less than a fundamental challenge to international norms, sovereignty and the rule of law that underpins our society.” This is even more so in the current business climate. Over this five-part podcast series, I will consider how the business will never again be the same and how a confluence of events has changed business forever. I am joined in this exploration by Brandon Daniels, CEO of Exiger. We will explore the irrevocable changes in Supply Chain, trade and economic sanctions, anti-corruption, cyber-security and ESG. In Part 4, we look at the changes wrought in cyber-security. Highlights include:

·      Russian invasion made the nature of cyber-security risk explicit.

·      Now continuous non-kinetic warfare.

·      Cyber-security is interconnected to commerce.

·      Quadrant analysis for risk assessment.

·      Jurisdiction risk introduces the where equation.

Categories
Compliance Into the Weeds

Impacts on Compliance of Russian Invasion of Ukraine

Compliance into the Weeds is the only weekly podcast which takes a deep dive into a compliance related topic, literally going into the weeds to more fully explore a subject. This week, Matt and Tom take a deep dive into some of the impacts on compliance from the Russian invasion of Ukraine. Highlights include:

·      How will the invasion impact your Supply Chain?

·      What are the attributes of a compliance program that can lead your corporate response?

·      What about cyber?

·      Will all this lead to a more holistic ERM response?

Resources

Matt in Radical Compliance

Categories
Everything Compliance

Episode 95, the Russia Invades Ukraine Edition


Welcome to the only roundtable podcast in compliance. The entire gang was also recently honored by W3 as a top talk show in podcasting. In this episode, we have the quartet of Jonathan Marks, Karen Woody, Jonathan Armstrong, Tom Fox and Matt Kelly. We dedicate the entire episode to compliance issues arising from the Russia invasion of Ukraine. We conclude with our fan favorite Shout Outs and Rants.

  1. Karen Woody considers the impact of corruption in both Russia and Ukraine going forward. Karen shouts out to the Ukraine’s U.N. Ambassador Sergiy Kyslytsya for his impassioned plea for Russia to stop its invasion of his country this week, at the United Nations.
  1. Matt Kelly looks at the export control issues and sanctions issued by the US and its allies in this arena. Kelly shouts out Jackson Reffitt, who testified against his father in his father’s Capital Insurrection trial.
  1. Jonathan Marks discusses the sanctions which have been levied by the Biden Administration, how to assess this evolving risk and the role of the Board in managing this risk. Marks rants about Bob Blaffert (again)  and shouts out to Sonny Johnson, an autistic basketballer who made the game winning shot that helped his team win its final game of the season.
  1. Jonathan Armstrong looks at how the shooting war in the Ukraine has spilled over into a cyber war across the globe. Armstrong shouts out to Paddington Bear for giving comfort to refugees across the globe and to the voice of Paddington Bear, Ukrainian President Zelensky.
  1. Tom Fox shouts out to the Texas GOP for stopping AG Ken Paxton from renomination in the party’s primary and for forcing him into a run-off with George P. Bush.

 The members of the Everything Compliance are:

  • Jay Rosen– Jay is Vice President, Business Development Corporate Monitoring at Affiliated Monitors. Rosen can be reached at JRosen@affiliatedmonitors.com
  • Karen Woody – One of the top academic experts on the SEC. Woody can be reached at kwoody@wlu.edu
  • Matt Kelly – Founder and CEO of Radical Compliance. Kelly can be reached at mkelly@radicalcompliance.com
  • Jonathan Armstrong –is our UK colleague, who is an experienced data privacy/data protection lawyer with Cordery in London. Armstrong can be reached at armstrong@corderycompliance.com
  • Jonathan Marks is Partner, Firm Practice Leader – Global Forensic, Compliance & Integrity Services at Baker Tilly. Marks can be reached at marks@bakertilly.com

The host and producer, ranter (and sometime panelist) of Everything Compliance is Tom Fox the Voice of Compliance. He can be reached at tfox@tfoxlaw.com. Everything Compliance is a part of the Compliance Podcast Network.

Categories
Daily Compliance News

March 10, 2022 the 4-Day Notice Edition


In today’s edition of Daily Compliance News:
·      Matthew Stephenson speaks. (Harvard Law Today)
·      Black Panther movie director arrested for ‘banking while black’.   (BBC)
·      Sunny Balwani trial to begin. (WSJ)
·      SEC proposes 4-day notice requirement for cyber breach. (Reuters)

Categories
Coffee and Regs

Data Privacy & Building Compliance into the Product Development Lifecycle


 

Categories
Coffee and Regs

Ransomware Attacks – Cybersecurity Concerns & Best Practices to Mitigate Risk

Ransomware Attacks – Cybersecurity Concerns & Best Practices to Mitigate Risk

 
In this episode, our team of cybersecurity experts, E.J. Yerzak and Mike Farrell discuss the latest ransomware attacks in the news, best practices to keep your data secure and hackers out, and what to do first if your firm is hit by an attack.
 

 

About Our Guest Speakers:

E.J. Yerzak CISA®, CISM®, CRISC™ assists firms in assessing and managing their cybersecurity risk – from network vulnerability scanning and penetration testing to onsite cybersecurity assessments and assistance in implementing the NIST cybersecurity framework. E.J. has authored articles and alerts on emerging regulatory and technology issues, and is regularly requested to speak as a cybersecurity expert at industry conferences.

 
 
 



Mike Farrell is a Certified Information Systems Auditor (CISA®) and Certified Information Security Manager (CISM®), and Cybersecurity Consultant at CSS. He analyzes data and conducts cybersecurity risk assessments, policy gap analyses, vulnerability scanning and social engineering testing. His Information technology experience includes network installations and management, hardware and software configuration, and troubleshooting.

 
 

Categories
Integrity Through Compliance

Dionne Lomax and Kelly Graf Take a Look at Privacy and Cybersecurity Issues for 2021

Recorded before the recent Colonial Pipeline Ransomware attack, Affiliated Monitors, Inc.’s Managing Director, Dionne Lomax, sat down with Dentons’ Kelly Graf to discuss Privacy and Cybersecurity Issues for 2021 and Beyond. Kelly shares with our listeners how mature their security programs need to be in light of ransomware, phishing, and a post-COVID-19 Work From Home data protection environment. Now that cybersecurity is in the news more than ever, this conversation couldn’t be more relevant.
 

 
They cover topics including:
• The multi-trillion dollar growth in this criminal industry over the last decade
• The importance of remote working standards and network segmentation
• Class action lawsuits regarding large scale data breaches
• Ongoing trends in FTC enforcement of COPPA
• The modern sophistication of phishing and social engineering attacks
• The perverse incentives created by, and the unintended consequences of, the growing cybersecurity insurance industry
• The creative ways that lawyers have used outdated privacy laws to bring data security lawsuits