iTnews

The good thing about getting hacked

By Staff Writers on May 29, 2015 1:00PM
The good thing about getting hacked

How PTV regrouped and built up its security.

That a teen hacker not only managed to find an easily exploitable security hole in Public Transport Victoria's website is bad enough, but it got a whole lot worse when he took his findings to the news media.

The story unfolded during the Christmas holidays when people were on leave, but that didn't stop the publicity from damaging the PTV brand. Security experts lambasted the agency for not taking good care of customer data.

The case - unsurprisingly - sparked off a drive within the organisation to manage future incidents better and to ensure security breaches were minimised.

While the incident did not constitute a data breach - the data involved was old and out of date - it nevertheless showed up weaknesses in PTV’s security posture as well as the organisation’s preparedness for when incidents occur.

Putting out the fires from this attack may seem like an unenviable task to take on, but PTV’s manager of information security, Abbas Kudrati, approached the problem strategically and implemented a cyber security incident plan with a business focus.

“It was a methodical build-up to boost the security posture of PTV, following best practices and standards," Kudrati said.

This involved using frameworks such as the US National Institute of Standards and Technology (NIST) and the Control Objectives for Information and Related Technology version 5 (COBIT 5) to assess PTV’s cyber security incident response capability.

Picking a set of partners such as AusCERT and CyberSource for early alarm and network monitoring, and implementing credit card fraud analytics, also formed part of the plan to get on top of PTV’s security readiness.

The first two phases of the project took nine months. An ongoing follow-up phase with continuous reviews completed the project implementation.

According to Kudrati, the results were worth it: after implementing CyberSource's analysis engine - used for every Myki purchase - over 8000 credit cards linked through false registrations were blocked, taking a major chunk out of the $1.1 million in credit card fraud PTV had suffered since July 2013.

It has reduced PTV's financial exposure by a staggering 75 percent.

Every hacking attempt on PTV portals is now analysed with classification and priority levels assigned as per a predefined process; no more “panic mode” when a new attack is discovered.

For Kudrati, the incident and successful rollout of the program has also meant much greater visibility within the business for his work.

“The board wants to be briefed on security now and there’s recognition by the chief executive on the importance of the work,” Kudrati said.

“Ultimately, the experience has been to turn something very negative into a positive thing, and it’s been great to see that happen."

Public Transport Victoria's incident management plan is a finalist in the SC Benchmark awards. 

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:
abbas kudratiauscertcobit 5nistptvpublic transport victoriasecintsecurity

Partner Content

Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits
The case for postponing mainframe migration has eroded
Partner Content The case for postponing mainframe migration has eroded
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Staff Writers
May 29 2015
1:00PM
0 Comments

Related Articles

  • Public Transport Victoria extends real-time occupancy data to buses
  • China spied on Russian defence research institutes
  • 'White hat' hackers no longer risk prosecution by the US
  • Careful you don't unwittingly hire North Korean IT freelancers
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Digital Nation

COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.