Introduction
Inside the breach
()
The 2017 Equifax Breach
The Equifax breach
()
Inside the Equifax breach
()
Lesson 1: Patch and vulnerability management
()
Lesson 2: Move quickly!
()
Lesson 3: Implement an incident response plan
()
Aftermath of the Equifax breach
()
The 2013 Target Breach
The Target breach
()
Inside the Target breach
()
Lesson 1: Vendor management
()
Lesson 2: Network segmentation
()
Lesson 3: Log monitoring
()
Aftermath of the Target breach
()
The 2006 VA Laptop Theft
The Veterans Affairs (VA) breach
()
Inside the VA breach
()
Lesson 1: Standardize incident escalation and notification
()
Lesson 2: Encryption is essential
()
Lesson 3: Security policy
()
Aftermath of the VA breach
()
The 2018 Atlanta Ransomware Breach
The Atlanta ransomware breach
()
Inside the Atlanta ransomware breach
()
Lesson 1: Perform regular backups
()
Lesson 2: Consider ransom demands
()
Lesson 3: Maintain malware prevention
()
Aftermath of the Atlanta ransomware breach
()
The 2005 TJX Breach
The TJX breach
()
Inside the TJX breach
()
Lesson 1: Control physical access
()
Lesson 2: Secure wireless networks
()
Lesson 3: Limit data retention
()
Aftermath of the TJX breach
()
The 2013 Bowman Dam Breach
The Bowman Dam breach
()
Inside the Bowman Dam breach
()
Lesson 1: Secure the Internet of Things
()
Lesson 2: Segment SCADA networks
()
Lesson 3: Control removable media
()
Aftermath of the Bowman Dam breach
()
The State-Sponsored University Breach
The state-sponsored university breach
()
Inside the state-sponsored university breach
()
Lesson 1: Multifactor authentication
()
Lesson 2: Understand advanced persistent threats
()
Lesson 3: Social engineering
()
After the state-sponsored university breach
()
The Maersk Breach
The Maersk breach
()
Inside the Maersk breach
()
Lesson 1: Protect admin accounts
()
Lesson 2: Apply patches promptly
()
Lesson 3: Test backups
()
After the Maersk breach
()
The Sony Breach
The Sony breach
()
Inside the Sony breach
()
Lesson 1: Defense in depth
()
Lesson 2: Offense is risky
()
Lesson 3: Authentication
()
After the Sony breach
()