2014 ANNUAL REPORT FIREEYE THREAT INTELLIGENCE Intelligence to Identify, Block EAT in E THR TELLI and Respond to Attacks EEY GEN FIR CE

Total Page:16

File Type:pdf, Size:1020Kb

2014 ANNUAL REPORT FIREEYE THREAT INTELLIGENCE Intelligence to Identify, Block EAT in E THR TELLI and Respond to Attacks EEY GEN FIR CE 2014 ANNUAL REPORT FIREEYE THREAT INTELLIGENCE Intelligence to identify, block EAT IN E THR TELLI and respond to attacks EEY GEN FIR CE MOBILE NETWORK MOBILE NETWORK Identiffy, analyze and Combat web-based block mobile attacks cyber attacks ENDPOINT Detect, analyze and EMAIL Identiffy, analyze and resolve incidents on EMAIL block email attacks the endpoint ENDPOINT POWEREDD BBY ANALYTICS CONTENT Identify threats and MVX TECHNOLOGTECHNOLOGY Combat malware in improve response in data centers and file real time servers ANALYTICS CONTENT FORENSICS F IREEY VICE E AS A SER FORENSICS Actionable intelligence to improve incident response FIREEYE AS A SERVICE Security managed by you, with you orr forr you -8' @',8'!;8'='2ধ32£!Ĥ381 FireEye solutions protect an organization’s valuable assets from the consequences of the most damaging cyber attacks, including advanced persistent threats and targeted multi-vector attacks. The combination of our threat prevention produts, dynamic and contextual threat intelligence, DQGDGYDQFHGVHFXULW\H[SHUWLVHKHOSVRUJDQL]DWLRQVĆQGDQGVWRSDWWDFNHUVDWHYHU\VWDJHRIWKH attack, in the shortest possible time. As an integral piece of our Adaptive Defense strategy, our state-of-the-art network, endpoint and cloud security products detect and block cyber attacks that bypass legacy signature-based security products, such as anti-virus software, intrusion prevention/ GHWHFWLRQV\VWHPV ,36,'6 DQGQHWZRUNĆUHZDOOV FireEye | 2014 ANNUAL REPORT 1 Our goal is to protect our customers from advanced cyber attacks. Dear Stockholders, I am pleased to report that 2014 was a very strong year for FireEye. Our passion for our mission – to protect our customers from advanced persistent threats (APTs) and targeted attacks – continues to fuel our growth. By year-end, the powerful synergies of FireEye and Mandiant were generating new business and delivering strong growth in the sales of security platforms and VHUYLFHV)LUH(\HDFKLHYHGLWVĆUVWPLOOLRQELOOLQJVTXDUWHULQWKHVHFRQG TXDUWHURIDQGPRUHWKDQGRXEOHGWKDWDPRXQWWRRYHUPLOOLRQLQWKH IRXUWKTXDUWHU)RUWKH\HDUELOOLQJVLQFUHDVHGSHUFHQWRYHUWR PLOOLRQDQGUHYHQXHLQFUHDVHGSHUFHQWWRPLOOLRQ1 :HDGGHGPRUHWKDQQHZFXVWRPHUVGXULQJWKH\HDULQFOXGLQJDVLJQLĆFDQW number of global 2000 organizations. We also extended our reach into new market segments and expanded our channel partner programs worldwide. Finally, we improved our non-GAAP operating margin while continuing to invest in establishing our market, expanding our platform and increasing our global presence. 1 %LOOLQJVDUHDQRQ*$$3PHWULFPDWKHPDWLFDOO\HTXLYDOHQWWRUHY HQXHSOXVFKDQJHLQGHIHUUHGUHYHQXH A reconciliation of billings to revenue can be found in the table at the end of this publication. 2 FireEye | 2014 ANNUAL REPORT Security Reimagined Customers We set out to reimagine security with our MVX™ technology 3,100 and Adaptive Defense™ security model, and build a scalable and sustainable growth engine based on our technology, expertise, and intelligence. Looking back on 2014, I believe 2,000 we “crossed the chasm” and delivered on both objectives. From threat research to incident response, no other company did more than FireEye to address the most serious breaches the world saw unfold last year. 900 500 We continued to reimagine cyber security throughout the year with new and enhanced security platforms, advanced ‘11 ‘12 ‘13 ‘14 analytics and forensics tools, and value-added services. Perhaps most important was the introduction of FireEye As of 12/31. Rounded to nearest 100. as a Service™, which combined our products, people, and 2013 includes Mandiant SURFHVVHVLQWKHLQGXVWU\èVĆUVWJOREDOVHFXULW\DVDVHUYLFH solution. FireEye as a Service delivers protection from APTs and targeted attacks around the clock, around the world, to FXVWRPHUVRIDOOVL]HVLQDQ\QHWZRUNFRQĆJXUDWLRQ,WLV Employees relevant to any organization with valuable data to protect, 2,400 regardless of industry or geographic region. Our ability to deliver FireEye technology as subscription- 1,700 based services created new partnership opportunities with some of the world’s leading managed security service providers. In 2014, we signed agreements with Singapore Telecommunications Limited (Singtel), Deutsche Telekom’s 76\VWHPVDQG9HUL]RQ(QWHUSULVH6ROXWLRQV,QWKHĆUVWKDOI 400 200 RIZHDGGHG7HOHIRQLFD%XVLQHVV6ROXWLRQVDQG%ULWLVK Telecom to the roster of FireEye managed service provider ‘11 ‘12 ‘13 ‘14 partners. These partnerships complement our internal sales teams and value-added reseller network to extend our reach As of 12/31. Rounded to nearest 100. 2013 includes Mandiant into new regions and customer segments. FireEye | 2014 ANNUAL REPORT 3 TODAY’S REALITY of organizations were breached Today’s attackers have evolved their 97% Source: FireEye Cybersecurity’s Maginot Line: A Real-World tactics from just a few years ago. Assessment of the Defense-in-Depth Model. Broad, opportunistic attacks designed for mischief have been eclipsed by median number sophisticated attacks that are advanced, of days to detect targeted, stealthy, and persistent. 205 a breach Source: Mandiant 2015 M-Trends Report FireEye Adaptive Defense is a new cyber security model that leverages our of victims learn they technology, expertise, and intelligence to were breached from 69% a third party protect against these attacks. Source: Mandiant 2015 M-Trends Report The Opportunity Ahead FireEye is delivering a powerful value proposition – one that goes beyond detection to address the entire threat management cycle. Our Threat Prevention platforms protect all major attack points, including web and email gateways, data centers, Windows and Mac OS X endpoints, and Android and Apple mobile devices. Our security experts span the world with a direct presence in every major region, and our threat intelligence platform integrates attack data from more than nine million virtual machines and four million endpoint agents. I would like to thank our partners and our more than 2,400 FireEye employees for their commitment and hard work. Together, we have built FireEye into the world’s leader in protecting against and responding to advanced cyber attacks. I also want to thank our customers and our stockholders for their continued support. We’ve had an incredible journey so far, and I believe even greater opportunity lies ahead. ,ORRNIRUZDUGWRUHSRUWLQJRXUSURJUHVVLQ Sincerely, David G. DeWalt &KDLUPDQRIWKH%RDUGDQG&KLHI([HFXWLYH2IĆFHU 4 FireEyeE e | 2014 ANNUAL REPORT SELECTED FINANCIAL DATA FireEye completed the acquisition of Mandiant on 12/30/13. Balance sheet metrics for year-end 2013 include the net assets, deferred revenue, cash and cash equivalents, and stockholders’ equity of Mandiant. Dollars in thousands, except employee data 2011 2012 2013 2014 Revenue $33,658 $83,316 $161,552 $425,662 Deferred revenue $30,102 $76,406 $187,514 $352,543 Cash and cash equivalents $10,676 $60,200 $173,918 $402,208 Total assets $35,646 $125,273 $1,376,313 $1,758,881 Total stockholders’ equity $(14,651) $5,390 $1,048,102 $1,250,828 Employees 183 416 1,679 2,418 $426 Revenue Deferred $353 (millions) Revenue (millions) $188 $162 $83 $76 $34 $30 ‘11 ‘12 ‘13 ‘14 ‘11 ‘12 ‘13 ‘14 Proxy Statement 2015 PROXY STATEMENT FIREEYE, INC. 1440 McCarthy Blvd. Milpitas, California 95035 NOTICE OF ANNUAL MEETING OF STOCKHOLDERS To Be Held at 11:00 a.m. Pacific Time on Thursday, June 11, 2015 Dear Stockholder: You are cordially invited to attend the 2015 annual meeting of stockholders (the “Annual Meeting”) of FireEye, Inc., a Delaware corporation (“FireEye”). The Annual Meeting will be held on Thursday, June 11, 2015 at 11:00 a.m. Pacific Time, at 1390 McCarthy Blvd., Milpitas, California 95035, for the following purposes, as more fully described in the accompanying proxy statement: 1. To elect two Class II directors to serve until the 2018 annual meeting of stockholders or until their successors are duly elected and qualified; 2. To ratify the appointment of Deloitte & Touche LLP as our independent registered public accounting firm Proxy Statement for our fiscal year ending December 31, 2015; and 3. To transact such other business as may properly come before the Annual Meeting or any adjournments or postponements thereof. Our board of directors has fixed the close of business on April 13, 2015 as the record date for the Annual Meeting. Only stockholders of record on April 13, 2015 are entitled to notice of and to vote at the Annual Meeting. Further information regarding voting rights and the matters to be voted upon is presented in the accompanying proxy statement. On or about April 24, 2015, we expect to mail to our stockholders a Notice of Internet Availability of Proxy Materials (the “Notice”) containing instructions on how to access our proxy statement and our annual report. The Notice provides instructions on how to vote via the Internet or by telephone and includes instructions on how to receive a paper copy of our proxy materials by mail. The accompanying proxy statement and our annual report can be accessed directly at the Internet address listed on the Notice. YOUR VOTE IS IMPORTANT. Whether or not you plan to attend the Annual Meeting, we urge you to submit your vote via the Internet, telephone or mail as soon as possible so that your shares can be voted at the Annual Meeting in accordance with your instructions. Thank you for your continued support of FireEye. By order of the Board of Directors, David G. DeWalt Chief Executive Officer and Chairman of the Board Milpitas, California April 24, 2015 [THIS PAGE INTENTIONALLY LEFT BLANK] TABLE OF CONTENTS Page QUESTIONS AND ANSWERS
Recommended publications
  • THE PROTECTIVE STATE the PLANT FLOOR? the Evolving Role of Governments in Cybersecurity
    BROUGHT TO YOU BY THE VISIONEXPERTISE DELIVERED STRAIGHT FROM THE FRONTLINES OF CYBER ATTACKS PAGE 3 STATE OF THE NATIONS A global look at the rise in State sponsered cyber attacks in 2018 PAGE 4 A FINANCIAL STRONGHOLD How one bank is winning the war on cyber crime PAGE 6 WHAT ABOUT THE PROTECTIVE STATE THE PLANT FLOOR? The evolving role of Governments in cybersecurity different threats. With cybersecurity vital to a governments are not even the primary security POLITICAL properly functioning and prosperous economy, provider, such as when they don’t provide it is critical that governments take the lead, and close supervision of, or operational control The role of governments as their that this is recognized by its citizens. over, critical infrastructures operated by the nations’ primary provider of private sector. security against all threats is as So far, the 21st century has seen continued compelling as ever. Yet few still wide scale deregulation and privatisation, This changing global landscape shouldn’t Our six subversive concerns for with many nations’ critical infrastructure – in mean a lesser responsibility for governments industrial environments have difficulty in grasping the rapid increase in interconnectedness and sectors such as energy, transport, finance as legitimate providers of security, but rather and medicine – now in the hands of the that they should work to understand the interdependency to determine how private sector. These sectors are constantly changing world and their role within this new best to use a Regulate, Facilitate, under threat, not least because of increased environment of increasing interconnectedness. PAGE 8 FOLLOW Collaborate (RFC) model for the THE MONEY globalisation of societies and economies.
    [Show full text]
  • APT28: a Window Into Russia's Cyber Espionage Operations? | Fireeye
    SPECIAL REPORT APT28: A WINDOW INTO RUSSIA’S CYBER ESPIONAGE OPERATIONS? SECURITY REIMAGINED APT 28: A Window into Russia’s Cyber Espionage Operations? CONTENTS EXECUTIVE SUMMARY ................................................................................................................................................................................................................................................................................... 3 APT28 TARGETING REFLECTS RUSSIAN INTERESTS ........................................................................................................................................................................ 6 APT28 interest in the Caucasus, Particularly Georgia ........................................................................................................................................................... 7 APT28 Targeting of the Georgian Ministry of Internal Affairs (MIA) ....................................................................................... 8 APT28 Targeting of the Georgian Ministry of Defense ....................................................................................................................................... 9 APT28 Targeting a Journalist Covering the Caucasus ...................................................................................................................................... 10 APT28’s Other Targets in the Caucasus ......................................................................................................................................................................................
    [Show full text]
  • Cyber Evolution: En Route to Strengthening Resilience in Asia-Pacific 3
    En Route to Strengthening CYBER Resilience in Asia-Pacific EVOLUTION WHITE PAPER 2 WHITE PAPER CONTENTS Executive Summary 3 The shifting cyber threat landscape across Asia-Pacific 4 Recent cyber trends in Asia-Pacific 8 Key drivers of cyber challenges in Asia-Pacific 18 Asia-Pacific’s evolving regulatory climate 20 How companies can build cyber resilience 22 A call to action 24 AUTHORS Jaclyn Yeo Rob van der Ende Senior Research Analyst Vice President, Asia Pacific & Japan MMC Asia Pacific Risk Center Mandiant, a FireEye Company [email protected] [email protected] CONTRIBUTORS FireEye Marsh & McLennan Companies Bryce Boland Matthew McCabe, Marsh, US Vivek Chudgar Stephen R Vina, Marsh, US Patty Hullinger Richard D Green, Marsh, Asia Patrick Neighorn Douglas Ure, Marsh Risk Consulting, Asia Tony Sapienza Kelly Butler, Marsh, Australia Lynn Thorne Leslie Chacko, MMC Global Risk Center Timothy Wellsmore Wolfram Hedrich, MMC Asia Pacific Risk Center CYBER EVOLUTION: EN ROUTE TO STRENGTHENING RESILIENCE IN ASIA-PACIFIC 3 Knowing no boundaries, cyber incidents or data fraud and thefts that originate from North America or the European continent quickly impact APAC. Executive Summary The cyber threat landscape is morphing Cyber challenges in APAC, such as low constantly and dramatically. Around the world, cybersecurity investments and long dwell times, cyber dependency grows as increasing digital can be attributed to the complex geopolitical interconnection among people, things, and tensions, exposed critical infrastructure, and organizations expand. Asia-Pacific (APAC) is the severe shortage of cybersecurity talents in no different. the region. Knowing no boundaries, cyber incidents or data Fortunately, the regulatory climate in APAC is fraud and thefts that originate from North changing – slowly but surely.
    [Show full text]
  • Threat Report the State of Influence Operations 2017-2020
    May 2021 Threat Report The State of Influence Operations 2017-2020 The State of Influence Operations 2017-2020 2 TABLE OF CONTENTS Executive Summary 3 Introduction 9 Section 1: Defining IO 11 Section 2: The State of IO, 2017- 2020 15 Threat actors 15 Trends in IO 19 Section 3: Targeting the US Ahead of the 2020 Election 28 Section 4: Countering IO 34 Combination of automation and investigations 34 Product innovation and adversarial design 36 Partnerships with industry, government and civil society 38 Building deterrence 39 Section 5: Conclusion 41 Appendix: List of CIB Disruptions, 2017-May 2021 44 Authors 45 The State of Influence Operations 2017-2020 3 Executive Summary Over the past four years, industry, government and civil society have worked to build our collective response to influence operations (“IO”), which we define as “c oordinated efforts to manipulate or corrupt public debate for a strategic goal.” The security teams at Facebook have developed policies, automated detection tools, and enforcement frameworks to tackle deceptive actors — both foreign and domestic. Working with our industry peers, we’ve made progress against IO by making it less effective and by disrupting more campaigns early, before they could build an audience. These efforts have pressed threat actors to shift their tactics. They have — often without success — moved away from the major platforms and increased their operational security to stay under the radar. Historically, influence operations have manifested in different forms: from covert campaigns that rely on fake identities to overt, state-controlled media efforts that use authentic and influential voices to promote messages that may or may not be false.
    [Show full text]
  • 2015 Annual Report the Fireeye Threat Management Platform
    2015 ANNUAL REPORT THE FIREEYE THREAT MANAGEMENT PLATFORM | | | | FIED CONSO| | | NI LE | U | | | | S E | E C E D | C I R ET | PA E | U E C V R T | P R R A | D N I HINE D T E | N AC INT | A M E EE L P IR Y Y S F E S R | | S E A A E V A D | S E V | S S N T L E I S S E A R N T | I T | S G A A A I N A I H D R T N | M Y A I | S Y I M T NT IC E T E V | L | I R | R | V U | I A | C C N D | N A | L O E E YZE ESP | AND R | S | | | | | | | O | | R | N CHESTRATIO As attacks change, defense measures must evolve. At FireEye we believe that next-generation security architectures need to be adaptive and nimble to have true long-term relevance. To achieve this, we’ve combined state-of-the-art products, highly skilled security experts and real-time threat intelligence in a comprehensive threat management platform that extends from the endpoint to the network perimeter and into the cloud. The foundation of our platform is an intelligent core that combines FireEye’s patented virtual machine-based detection and analytics technology with Mandiant’s deep incident-derived insights and iSIGHT Partners’ vast threat intelligence gleaned from worldwide tracking of over 16,000 adversaries. Together, these capabilities provide early visibility into new threats and allow organizations to reduce risk across the entire attack lifecycle.
    [Show full text]
  • WORLD WAR C : Understanding Nation-State Motives Behind Today’S Advanced Cyber Attacks
    REPORT WORLD WAR C : Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks Authors: Kenneth Geers, Darien Kindlund, Ned Moran, Rob Rachwald SECURITY REIMAGINED World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks CONTENTS Executive Summary ............................................................................................................................................................................................................................................................................................................... 3 Introduction ............................................................................................................................................................................................................................................................................................................................................... 4 A Word of Warning ................................................................................................................................................................................................................................................................................................................. 5 The FireEye Perspective ...........................................................................................................................................................................................................................................................................................
    [Show full text]
  • Fireeye Braintree
    LOS ANGELES | SAN FRANCISCO | NEW YORK | BOSTON | SEATTLE | MINNEAPOLIS | MILWAUKEE July 22, 2013 Michael Pachter Sanjit Singh Gil Luria (213) 688-4474 (212) 938-9922 (213) 688-4501 [email protected] [email protected] [email protected] PRISM … Progress Report for Internet and Social Media In This Issue: FireEye, Braintree FireEye Cyber-security company founded in 2004. Specializes in protection against advanced persistent threats (APTs). Experienced rapid revenue growth; 55,413% from 2007 through 2011. Over $100 million in total venture funding; expected to go public later this year. We estimate FireEye’s total value to be approximately $2.25 billion. Braintree Online payment processing software developer founded in 2007. Has seen rapid expansion thanks to adoption by fast-growing Web 2.0 merchants. Self-funded until 2011; now has $69 million in total venture funding. THE INFORMATION HEREIN IS ONLY FOR ACCREDITED INVESTORS AS DEFINED IN RULE 501 OF REGULATION D UNDER THE SECURITIES ACT OF 1933 OR INSTITUTIONAL INVESTORS. WEDBUSH PRIVATE COMPANY STRATEGIES GROUP Wedbush Securities does and seeks to do business with companies covered in its research reports. Thus, investors should be aware that the firm may have a conflict of interest that could affect the objectivity of this report. Investors should consider this report as only a single factor in making their investment decision. Please see page 11 of this report for analyst certification and important disclosure information. FireEye FireEye, a cyber security company founded in 2004, plans an initial public offering this year at a total valuation estimated at $1.25 billion (according to an article by Business Insider).
    [Show full text]
  • Selected Prior Participants CEO/President Nikesh Arora, CEO
    Selected Prior Participants CEO/President Nikesh Arora, CEO, Palo Alto Networks Kevin Mandia, CEO, FireEye Scott Johnston, CEO, Docker Jonathan Roberts, COO, CVS Tom Hanenburg, COO, Northern California, Kaiser Permanente Rohit Ghai, President, RSA Tony Werner, President, Technology, Product, and Xperience, Comcast Jan Geldmacher, President, Sprint Business Lane Bess, Former CEO, Palo Alto Networks Chris Anderson, CEO, 3D Robotics Jamie Iannone, CEO, eBay Gwen Morrison, CEO, The Americas, The Store, WPP Sailesh Chittipeddi, CEO, Integrated Device Technology, Renesas Pedro Pablo Perez, CEO, Business Security Unit, Telefonica John Petrie, CEO, NTT Security Elena Kvochko, COO, Cybersecurity, Bank of America Anand Chandrasekher, Former President, Qualcomm Datacenter CIO Mary Gendron, CIO, Qualcomm Michael Smith, CIO, Estee Lauder Matt Minetola, CIO, E*TRADE Marco Trecroce, CIO, Four Seasons Pete Kelso, CITO, Aflac Doug Rousso, CITO, MGM Dennis Howard, CIO, Charles Schwab Nancy Flores, CIO and CTO, McKesson Abhi Dhar, CIO and CTO, TransUnion Mark Murphy, Global CIO, Abbott Laboratories Yves Caseau, Group CIO, Michelin Bill Graff, CIO, Cerner Mike Anderson, CIO, Schneider Electric Sally Gilligan, CIO, Gap Eileen Mahoney, CIO, PVH Patrick Browning, CIO, E.W. Scripps Charles Brooks, CIO, Kemper Vijay Sankaran, CIO, TD Ameritrade Harry Moseley, CIO, Zoom Sangy Vatsa, CIO, Comerica Dilip Venkatachari, CIO, Digital, U.S. Bank Steve Mills, Global CIO, iHeartMedia David Shive, CIO, US General Services Administration Missy Young, CIO, Switch Kristin
    [Show full text]
  • Redline Drawn: Chinese Cyber Espionage Report | Fireeye
    FIREEYE iSIGHT INTELLIGENCE REDLINE DRAWN: CHINA RECALCULATES ITS USE OF CYBER ESPIONAGE SPECIAL REPORT / JUNE 2016 CONTENTS Introduction 3 Key Findings 4 Factors Influencing Chinese Cyber Operations 5 China in Transition: Xi’s Military and Domestic Reforms Centralize Cyber Operations 5 China Exposed: 2013 Reports and Disclosures Jolt Government Cyber Operations to the Forefront of the U.S. Security Dialogue 7 Indictments and Sanctions: U.S. Undertakes Measures to Confront Chinese Economic Espionage 8 Observed Changes in Chinese Cyber Operations 10 Network Compromises Continue; Mid-2014 Decline in Overall Activity from Suspected China-Based Groups 10 Active Network Compromises Conducted by 72 Suspected China-Based Groups by Month 11 Suspected China-based Activity Against Corporate Victims, Late 2015 to Mid-2016 13 2015-2016 Regional Spear Phishing Activity Reflects Security Concerns 14 The Myth of the Monolith: Some Groups Revamp Operations While Others Carry On 15 Conclusion 15 INTRODUCTION On September 25, 2015, President Barack Obama and Chinese President Xi Jinping agreed that neither government would “conduct or knowingly support cyber-enabled theft of intellectual property”1 for an economic advantage. Some observers hailed the agreement as a game changer for U.S. and Chinese relations, while skeptics saw this as little more than a diplomatic formality unlikely to stymie years of state-sponsored intellectual property theft.2 3 Since the agreement, there has been much discussion and speculation as to what impact, if any, it would have on Chinese cyber operations. To investigate this question, FireEye iSIGHT Between September 2015 and June 2016, Intelligence reviewed the activity of 72 groups we observed 13 active China-based groups that we suspect are operating in China or oth- conduct multiple instances of network compro- erwise support Chinese state interests.
    [Show full text]
  • CDS2018-Exec-S2-The 2018 SEC Guidance on Cybersecurity and the Responsibilities of the Board of Directors-FINAL-Clean
    The 2018 SEC Guidance on Cybersecurity and the Responsibilities of the Board of Directors Navigating Legal Landmines in Cybersecurity Lisa J. Sotto www.huntonprivacyblog.com OCTOBER 1 – 4, 2018 | WASHINGTON, D.C. The Privacy and Cybersecurity Team at Hunton Andrews Kurth § Over 35 privacy and data security professionals in the U.S., EU and Asia § Our privacy clients have included 6 of the Fortune 10 § Represent clients across multiple industry sectors, including technology, financial services, publishing, advertising, retail, consumer products, transportation, energy and health care § Centre for Information Policy Leadership at Hunton Andrews Kurth § www.HuntonPrivacyBlog.com § @hunton_privacy 3 Roadmap § U.S. Data Security Rules § SEC Guidance and Enforcement § EU and Global Legal Cybersecurity Developments § Legal Issues in a Cyber Attack § The Role of the Board in Cyber Governance § Lessons Learned ©2018 FireEye U.S. Data Security Rules 5 U.S. Data Security Rules § Federal Data Security Requirements – Consumer personal information (FTC) – Financial data (Gramm-Leach-Bliley) – Health information (HIPAA/HITECH) – Medical device cybersecurity vulnerabilities (FDA) – Energy infrastructure (NERC CIP, DOE reporting, NRC cyber regs) – Cybersecurity risk disclosure (SEC) ©2018 FireEye U.S. Data Security Rules (continued) § State Data Security Requirements – Data security laws (CA, CO, MA, NV and progeny) – Data breach notification laws (50 states + DC, Guam, PR and USVI) – Financial institution/insurer cyber regulations (e.g., NYDFS, NAIC)
    [Show full text]
  • Operation Saffron Rose 2013
    SPECIAL REPORT OPERATION SAFFRON ROSE 2013 Authors: Nart Villeneuve, Ned Moran, Thoufique Haq and Mike Scott SECURITY REIMAGINED Fireeye: Operation Saffron Rose 2013 CONTENTS Introduction ............................................................................................................................................................................................................................................................................................................................................... 2 Background .................................................................................................................................................................................................................................................................................................................................. 2 Attack Vectors ..................................................................................................................................................................................................................................................................................................................................... 4 The “Stealer” Malware ................................................................................................................................................................................................................................................................................................... 6 The “Stealer” Builder and Tools .......................................................................................................................................................................................................................................................
    [Show full text]
  • How Equifax Neglected Cybersecurity and Suffered a Devastating Data Breach
    United States Senate PERMANENT SUBCOMMITTEE ON INVESTIGATIONS Committee on Homeland Security and Governmental Affairs Rob Portman, Chairman Tom Carper, Ranking Member HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH STAFF REPORT PERMANENT SUBCOMMITTEE ON INVESTIGATIONS UNITED STATES SENATE HOW EQUIFAX NEGLECTED CYBERSECURITY AND SUFFERED A DEVASTATING DATA BREACH TABLE OF CONTENTS EXECUTIVE SUMMARY ......................................................................................................... 1 The Subcommittee’s Investigation ..................................................................................... 6 Findings of Fact and Recommendations ........................................................................... 6 I. BACKGROUND ............................................................................................................ 12 A. Consumer Reporting Agencies ................................................................................ 14 1. Equifax ......................................................................................................................... 15 2. Experian ....................................................................................................................... 15 3. TransUnion ................................................................................................................. 16 B. Federal Regulation of Consumer Reporting Agencies ....................................... 16 C. The Federal Government’s Role in Sharing Information
    [Show full text]