Visit www.barracudasecurity.com

Legend

Location Of Theft in AQUA BLUE
URL Of Linked Article In STEEL BLUE or GREEN
Full Content Of Article In BLACK
Theft Description In Body Of Article in RED

Friday, March 20, 2009

US VERY GOOD VA WATCHDOG ARTICLE ON COMPUTER SECURITY Printer Friendly Version

VA'S LAPTOP THEFT TURNS INTO SECURITY LESSONS

LEARNED -- The theft in 2006 of an employee laptop

that contained personal information on 26 million

veterans taught the VA some hard lessons.

A complete history of the VA laptop theft and other data breaches can be found on this page...
http://www.vawatchdog.org/va%20data%20theft%20news.htm

Story here... http://gcn.com/articles/20
09/03/23/update1-va-incident-response.aspx

Story below:

Your comments accepted at bottom of page.


Share story/email link.
-------------------------

VA's security lessons learned

High-profile data breach prompted an overhaul of incident response

By William Jackson



The theft in 2006 of an employee laptop that contained personal information on millions of veterans taught the Veterans Affairs Department some hard lessons. VA became “the poster child of data breaches,” said Kathryn Maginnis, the department's associate deputy assistant secretary for risk management and incident response.

As a result of that incident and several breaches that followed, the department developed a comprehensive incident response program and incident resolution team that evaluates all serious exposures of sensitive data.

“We have a culture of report, report, report,” Maginnis said at the recent FOSE conference in Washington.

The incident response program received a perfect score last year in the VA inspector general’s Federal Information Security Management Act audit, and Maginnis said she expects to get another perfect score this year.

The department developed two in-house online tools to help track and evaluate incidents, said Amanda Graves Scott, director of the incident resolution team. The Formal Event Review and Evaluation Tool uses a 56-question questionnaire to determine the risk category of a data breach, and the VA Incident Response Tracking System automates a manual tracking process for information technology incident response.

Effective incident response also requires good people and effective policy in addition to technology, said information security specialist Steve Emmons. Much of VA's program focuses on promoting policy awareness and educating employees on the need to report all exposure or improper handling of data.

The high-profile laptop theft in May 2006 had immediate and longer-term impacts. It trashed the public’s confidence in the department and led to the requirement that data on laptops be encrypted. The theft also led to a law, passed in December 2006, that requires the department to provide quarterly reports of data breaches to Congress, provide credit protection to possible victims and do independent risk assessments of serious breaches.

Other incidents highlighted additional weaknesses and corrective steps. The theft of a contractor desktop computer led to the department writing stronger security controls into its contracts, including the use of virtual private networks for communication. The theft of a hard drive with hundreds of thousands of patient records from a leased research facility showed the need to improve physical security in all locations, not just in VA facilities.


click for more information -- a disabled veteran owned business

The cost of these breaches far exceeds the value of the stolen hardware. Credit protection services for a single incident can cost millions of dollars, and multimillion-dollar lawsuits are likely. VA recently settled a suit stemming from the 2006 laptop theft, agreeing to pay as much as $20 million for credit-monitoring expenses and other damages to victims of that theft, even though the computer was recovered with the data apparently intact.

“The data doesn’t even have to be misused to have a large financial settlement,” Maginnis said.

The incident response team now produces a daily report on all reported incidents, no matter how small, and meets weekly with an incident resolution team that deals with problems that are potentially more serious. It also produces a monthly summary of major incidents in addition to the mandated quarterly report to Congress.

Agencies now are required to report data breaches to their security operations centers within an hour, and the centers are required to report all serious breaches to the U.S. Computer Emergency Readiness Team in another hour. “We are the US-CERT’s largest customer, because we send everything,” Maginnis said. “In one hour, how do you know” how serious a breach is? “We do triage later.”

Maginnis advised other agencies to learn from VA’s experiences and assume that the same kinds of things will happen to them.

“Your turn will come,” she warned. “Anticipate that you will be in the paper. We don’t see any need for any of our federal brothers and sisters to go through what we went through.”

-------------------------
posted by Larry Scott
Founder and Editor

VA Watchdog dot Org




Printed from: http://www.vawatchdog.org/09/nf09/nfmar09/nf032009-5.htm

No comments: