Current Threat to the U.S. from Cyber Espionage & Cyberterrorism
|
|
|
- Allison Snow
- 10 years ago
- Views:
Transcription
1 UNCLASSIFIED//FOUO Current Threat to the U.S. from Cyber Espionage & Cyberterrorism Presented by SSA Elvis Chan FBI San Francisco Overall Classification: UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOUO
2 FBI Priorities - Post 9/11 Counterterrorism Foreign Counterintelligence Cyber Public Corruption Civil Rights Criminal Enterprises White Collar Crime Violent Crime
3 The Cyber Threat America's economic prosperity in the 21st century will depend on cyber security President Barack Obama May 29, 2009
4 The Cyber Threat Terrorism does remain the FBI s top priority, but in the not too distant future we anticipate that the cyber threat will pose the greatest threat to our country. FBI Director Robert S. Mueller III March 1, 2012
5 The Cyber Threat I don t see cyber as a thing, I see it as a way. As a vector. FBI Director James B. Comey January 7, 2015
6 Cyber Threats Hacktivism Cyber Crime Cyber Espionage Cyberterrorism Cyber Warfare
7 Cyber Espionage Definition What is cyber espionage? Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary, or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks, or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. -Wikipedia
8 Cyber Espionage What? What is going on? State sponsored adversaries are pursuing sensitive U.S. information and proprietary technologies. U.S. company networks house this information and may be vulnerable to exploitation.
9 Cyber Espionage Who? Who is doing it? Chinese actors are the world s most active & persistent perpetrators of economic espionage. U.S. private sector firms and cyber security specialists have reported an onslaught of computer network intrusions that have originated in China. The governments of China and Russia will remain aggressive and capable collectors of sensitive U.S. economic information and technologies, particularly in cyberspace. Foreign Spies Stealing US Economic Secrets in Cyberspace Office of the Director of National Intelligence Published: October
10 Cyber Espionage How? How do they do it? The exploitation of trust: The trusted incoming . The publicly available trusted web site of appropriate business interest. The download of trusted code from a trusted and authorized vendor. The trusted protocols for data transfer. The inherent trust of the internal corporate network. The trusted external client server.
11 Cyber Espionage Why? Why do they do it? Meet intelligence collection requirements Acquire information for advantage Military Economic Political Target key individuals with access Create future opportunities
12 Cyber Espionage Case Study #1 Ming Zhong and Fei Ye November 2001, two Chinese nationals were arrested at SFO just before boarding a flight to Shanghai. Thousands of proprietary documents and electronic media from NEC, Sun, Transmeta, and Trident were seized.
13 Cyber Espionage Case Study #2 On May 19, 2014, the Dept. of Justice announced a first-of-its-kind cyber espionage case against Chinese military officials. Five PLA officials were charged with hacking into U.S. companies to steal trade secrets.
14 Cyber Espionage Case Study #3 In October 2014, security researchers identify a new sophisticated Chinese cyber espionage group dubbed Axiom. Axiom targets the U.S., other Western countries, and Chinese dissidents inside and outside of China. Active for at least six years: Hikit malware provides advanced persistent threat. Maintenance cycles to switch out malware on victim machines.
15 Cyber Threats Hacktivism Cyber Crime Cyber Espionage Cyberterrorism Cyber Warfare
16 Cyberterrorism What? What is cyberterrorism? Terrorist Use of the Internet vs. Cyberterrorism
17 Terrorist Use of the Internet Example Times Square Bombing Faisal Shahzad Public Web Cameras File-sharing websites Proxy servers Remote conferencing software Claimed attack on YouTube
18 Cyberterrorism Definition What is cyberterrorism? Cyberterrorism is disruptive or destructive acts perpetrated against noncombatant targets at the direction, on behalf, or in support of a terrorist group or their ideology, through the use of computer network attack or exploitation. Such intrusions or attacks are intended to intimidate or coerce a government or population in furtherance of a social, political, ideological, or religious agenda by causing disruption, inducing fear, or undermining confidence. - FBI Definition 18
19 Cyberterrorism Who? Who is conducting Cyberterrorism? Al-Qa ida Islamic State of Iraq and Levant Hizballah Hamas Sympathizers
20 Cyberterrorism How? Spearphishing Brute Force (Password crackers) Vulnerability Attacks (SQLI, XSS, etc.) Distributed Denial of Service (HOIC, LOIC, Lizard Stressor, etc.) 20
21 Cyberterrorism Why? Propaganda or incite terror (website defacements) Fundraising (account hijacking, carding, etc.) Facilitation (Research/reconnaissance for kinetic attack) Disruptive acts to cause harm to life or damage to property 21
22 Cyberterrorism Case Study #1
23 Cyberterrorism Case Study #1 Compromised servers: Stored beheading videos Created proxy servers Established communication channels Identity theft to acquire servers to host extremist sites Created the Youbombit website A YouTube for jihadists Collaborated with criminal hackers and extremists Tested and utilized malware Was planning traditional kinetic attacks in Europe when he was arrested 23
24 Cyberterrorism Case Study #2 On 06 January 2015, CyberCaliphate, successfully took over the Twitter accounts of: Albuquerque News Journal (Albuquerque, NM) Mountain View Telegraph (Moriarty, NM) WBOC News (Baltimore, Maryland). CyberCaliphate also hacked the websites of WBOC News and Mountain View Telegraph (a subsidiary of Albuquerque News Journal), and the Facebook account of Albuquerque News Journal. 24
25 Cyberterrorism Case Study #2 On 12 January 2015, CyberCaliphate obtained access to the Twitter and YouTube accounts for U.S. Central Command (CENTCOM). Hackers utilized the accounts to send the message, American Soldiers, we are coming, watch your back. ISIS. The hackers tweeted the location of purportedly stolen government files on pastebin. 25
26 Cyberterrorism Case Study #2 On 10 February 2015, CyberCaliphate hacking group hacked the Twitter accounts of Newsweek and Latin Times, and the mobile message provider for WBOC News. CyberCaliphate tweeted from the Newsweek Twitter Account: Bloody Valentine s Day, #MichelleObama! We re watching you, your girls, and your husband! 26
27 Cyberterrorism Case Study #3 Team Poison Member Junaid Hussain aka Trick Arrested in July 2012 for denial of service attack on U.K. anti-terror hotline and doxing PM Tony Blair & family 27
28 Cyberterrorism Case Study #3 Team Poison Member Junaid Hussain aka Trick In August 2014, Hussain, while on parole, and his wife travel to Syria to join with ISIS. Jihadi John may have accompanied them. Hussain is now working on behalf of ISIS to set up and run Cyber Caliphate. 28
29 Cyber Trends Computer network operations by adversaries are becoming ubiquitous. Cyber adversaries will increasingly leverage social media for more tailored and targeted operations. The number of vulnerability points for adversaries to exploit will increase as people move to the Internet of Things. 29
30 Guidance - Prevention What can I do to prevent a cyber attack? Establish Security Policies then prioritize Support Established Security Policies Monitor and Analyze Network Traffic Assess Vulnerabilities Configure Systems for Security (may mean $$) Support Training for Employees 30
31 Guidance - Prevention The To Do List Before a Cyber Attack Point of Contact for Legal, Technical and Project Management Legal Banner/Computer Use Agreement Employee Handbook/Corporate Policies Network Topography Maps Internal and External IP address and Host lists List of Network Devices (switches, routers, other devices) Incident Logs (Security, Host, IDS, Web, Database, Network) Archived Network Traffic Forensic Images of Compromised Hosts (live memory captures) Physical Access logs (video cameras, key cards, TFA devices) 31
32 Guidance After the Attack The To Do List After a Cyber Attack Follow your emergency plan and start protecting your data! Call the FBI. Preserve original media as evidence. Conduct analysis from a copy (if possible). Review ALL logs (DNS, Firewall, Proxy, System Event Logs). Contact ISP for additional logs and possible filtering. Begin damage assessment (including damage valuation). 32
33 What can the FBI do for you? Investigate National and global reach Combined technical skills and investigative experience Long-term commitment of resources Forensics Silicon Valley Regional Computer Forensics Laboratory (SVRCFL) Keeps options open for your company Analyze Patterns and Links Bring national security concerns to the U.S. Intelligence Community 33
34 Investigation A Case Study Recent cyber attack at a local company FBI informed the company of possible computer intrusion. Company conducted internal investigation and found malicious software code, which was provided to FBI. FBI reverse engineered malware, identified attack structure, and developed indicators for dissemination. FBI provided indicators to company for its information security team to search logs for additional signs of compromise, and a scrubbed version to sector sharing group. Company can now look for other similar malicious code and help stop the loss of its intellectual property 34
35 What the FBI does not do Take over your systems. Repair your systems. Share proprietary information with competitors. Provide investigation-related information to the media or your shareholders. 35
36 FBI Tools Title 18, United States Code Section 1029, Fraud in connection with access of devices Section 1030 (a)(5)(a)(i) Intentional Damage. 1030(a)(5)(A)(ii)Unauthorized Access, Reckless Damage 1030(a)(7) Extortion Economic Espionage Act Trade Secrets Act. 36
37 Way Forward Threats Goals Actions Cyber Warfare Cyberterrorism Cyber Espionage Cyber Crime Hacktivism Investigation Attribution Disruption Arrest, Seizure, Exploitation Public/Private Partner Engagement HUMINT Surveillance Digital Forensics
38 Way Forward "Maintaining a silence will not benefit you or your company in the long run FBI Director Robert S. Mueller III March 1, 2012 FBI San Francisco Infragard Program Coordinator SA Joy Mihara-Meer [email protected]
39 Questions UNCLASSIFIED//FOUO Questions?
40 Cyber Espionage Case Study #3 In October 2014, security researchers identify a new sophisticated Chinese cyber espionage group dubbed Axiom. Axiom targets the U.S., other Western countries, and Chinese dissidents inside and outside of China. Active for at least six years: Hikit malware provides advanced persistent threat. Maintenance cycles to switch out malware on victim machines.
41 Cyber Threats Hacktivism Cyber Crime Cyber Espionage Cyberterrorism Cyber Warfare
42 Cyberterrorism What? What is cyberterrorism? Terrorist Use of the Internet vs. Cyberterrorism
43 Terrorist Use of the Internet Example Times Square Bombing Faisal Shahzad Public Web Cameras File-sharing websites Proxy servers Remote conferencing software Claimed attack on YouTube
44 Cyberterrorism Definition What is cyberterrorism? Cyberterrorism is disruptive or destructive acts perpetrated against noncombatant targets at the direction, on behalf, or in support of a terrorist group or their ideology, through the use of computer network attack or exploitation. Such intrusions or attacks are intended to intimidate or coerce a government or population in furtherance of a social, political, ideological, or religious agenda by causing disruption, inducing fear, or undermining confidence. - FBI Definition 44
45 Cyberterrorism Who? Who is conducting Cyberterrorism? Al-Qa ida Islamic State of Iraq and Levant Hizballah Hamas Sympathizers
46 Cyberterrorism How? Spearphishing Brute Force (Password crackers) Vulnerability Attacks (SQLI, XSS, etc.) Distributed Denial of Service (HOIC, LOIC, Lizard Stressor, etc.) 46
47 Cyberterrorism Why? Propaganda or incite terror (website defacements) Fundraising (account hijacking, carding, etc.) Facilitation (Research/reconnaissance for kinetic attack) Disruptive acts to cause harm to life or damage to property 47
48 Cyberterrorism Case Study #1
49 Cyberterrorism Case Study #1 Compromised servers: Stored beheading videos Created proxy servers Established communication channels Identity theft to acquire servers to host extremist sites Created the Youbombit website A YouTube for jihadists Collaborated with criminal hackers and extremists Tested and utilized malware Was planning traditional kinetic attacks in Europe when he was arrested 49
50 Cyberterrorism Case Study #2 On 06 January 2015, CyberCaliphate, successfully took over the Twitter accounts of: Albuquerque News Journal (Albuquerque, NM) Mountain View Telegraph (Moriarty, NM) WBOC News (Baltimore, Maryland). CyberCaliphate also hacked the websites of WBOC News and Mountain View Telegraph (a subsidiary of Albuquerque News Journal), and the Facebook account of Albuquerque News Journal. 50
51 Cyberterrorism Case Study #2 On 12 January 2015, CyberCaliphate obtained access to the Twitter and YouTube accounts for U.S. Central Command (CENTCOM). Hackers utilized the accounts to send the message, American Soldiers, we are coming, watch your back. ISIS. The hackers tweeted the location of purportedly stolen government files on pastebin. 51
52 Cyberterrorism Case Study #2 On 10 February 2015, CyberCaliphate hacking group hacked the Twitter accounts of Newsweek and Latin Times, and the mobile message provider for WBOC News. CyberCaliphate tweeted from the Newsweek Twitter Account: Bloody Valentine s Day, #MichelleObama! We re watching you, your girls, and your husband! 52
53 Cyberterrorism Case Study #3 Team Poison Member Junaid Hussain aka Trick Arrested in July 2012 for denial of service attack on U.K. anti-terror hotline and doxing PM Tony Blair & family 53
54 Cyberterrorism Case Study #3 Team Poison Member Junaid Hussain aka Trick In August 2014, Hussain, while on parole, and his wife travel to Syria to join with ISIS. Jihadi John may have accompanied them. Hussain is now working on behalf of ISIS to set up and run Cyber Caliphate. 54
55 Cyber Trends Computer network operations by adversaries are becoming ubiquitous. Cyber adversaries will increasingly leverage social media for more tailored and targeted operations. The number of vulnerability points for adversaries to exploit will increase as people move to the Internet of Things. 55
56 Guidance - Prevention What can I do to prevent a cyber attack? Establish Security Policies then prioritize Support Established Security Policies Monitor and Analyze Network Traffic Assess Vulnerabilities Configure Systems for Security (may mean $$) Support Training for Employees 56
57 Guidance - Prevention The To Do List Before a Cyber Attack Point of Contact for Legal, Technical and Project Management Legal Banner/Computer Use Agreement Employee Handbook/Corporate Policies Network Topography Maps Internal and External IP address and Host lists List of Network Devices (switches, routers, other devices) Incident Logs (Security, Host, IDS, Web, Database, Network) Archived Network Traffic Forensic Images of Compromised Hosts (live memory captures) Physical Access logs (video cameras, key cards, TFA devices) 57
58 Guidance After the Attack The To Do List After a Cyber Attack Follow your emergency plan and start protecting your data! Call the FBI. Preserve original media as evidence. Conduct analysis from a copy (if possible). Review ALL logs (DNS, Firewall, Proxy, System Event Logs). Contact ISP for additional logs and possible filtering. Begin damage assessment (including damage valuation). 58
59 What can the FBI do for you? Investigate National and global reach Combined technical skills and investigative experience Long-term commitment of resources Forensics Silicon Valley Regional Computer Forensics Laboratory (SVRCFL) Keeps options open for your company Analyze Patterns and Links Bring national security concerns to the U.S. Intelligence Community 59
60 Investigation A Case Study Recent cyber attack at a local company FBI informed the company of possible computer intrusion. Company conducted internal investigation and found malicious software code, which was provided to FBI. FBI reverse engineered malware, identified attack structure, and developed indicators for dissemination. FBI provided indicators to company for its information security team to search logs for additional signs of compromise, and a scrubbed version to sector sharing group. Company can now look for other similar malicious code and help stop the loss of its intellectual property 60
61 What the FBI does not do Take over your systems. Repair your systems. Share proprietary information with competitors. Provide investigation-related information to the media or your shareholders. 61
62 FBI Tools Title 18, United States Code Section 1029, Fraud in connection with access of devices Section 1030 (a)(5)(a)(i) Intentional Damage. 1030(a)(5)(A)(ii)Unauthorized Access, Reckless Damage 1030(a)(7) Extortion Economic Espionage Act Trade Secrets Act. 62
63 Way Forward Threats Goals Actions Cyber Warfare Cyberterrorism Cyber Espionage Cyber Crime Hacktivism Investigation Attribution Disruption Arrest, Seizure, Exploitation Public/Private Partner Engagement HUMINT Surveillance Digital Forensics
64 Way Forward "Maintaining a silence will not benefit you or your company in the long run FBI Director Robert S. Mueller III March 1, 2012 FBI San Francisco Infragard Program Coordinator SA Joy Mihara-Meer [email protected]
65 Questions UNCLASSIFIED//FOUO Questions?
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
FBI AND CYBER SECURITY
FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
James R. Clapper. Director of National Intelligence
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
Cyber Security Threat Briefing
Cyber Security Threat Briefing Special Agent Ryan R. Ormond FBI Detroit Cyber Task Force Cyber Threats Cyber is not a thing, it is a vector. Because we as Americans have connected our entire lives to the
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510
TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME Haya Fetais & Mohammed Shabana Saint Leo University COM- 510 November 23, 2014 Introduction Globalization and technological developments have infiltrated
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Advanced & Persistent Threat Analysis - I
Advanced & Persistent Threat Analysis - I Burak Ekici [email protected] Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
INSIDE. Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow
Symantec Security Response WHITE PAPER Cyberterrorism and the Home User By Sarah Gordon, Senior Research Fellow Symantec Security Response INSIDE What it is? How does this affect me? What can I do to make
Advanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
NATO & Cyber Conflict: Background & Challenges
NATO & Cyber Conflict: Background & Challenges Dr. Sean Lawson Department of Communication University of Utah [Full citation: Lawson, Sean. (2012) NATO & Cyber Conflict: Background & Challenges. Presented
COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA
COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA 09/1 8/2009 version UNCLASSIFIED//FOR OFFICIAL USE ONLY Cl VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA DEFINING COUNTERINTELLIGENCE
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
Cyber Security for Start-ups: An Affordable 10-Step Plan
SESSION ID: ECO-W03 Cyber Security for Start-ups: An Affordable 10-Step Plan David Cowan Partner Bessemer Venture Partners @davidcowan Acknowledgements Startups don't like friction to get their job done.
Cybercrime in Canadian Criminal Law
Cybercrime in Canadian Criminal Law Sara M. Smyth, LL.M., Ph. D. Member of the Law Society of British Columbia CARSWELL Table of Contents Preface Table of Cases v xvii PART ONE Introduction to Cybercrime
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014
Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:
Cyber Security. A professional qualification awarded in association with University of Manchester Business School
ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
How do we Police Cyber Crime?
How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL
The virtual battle by Mark Smith Special to INSCOM 4 INSCOM JOURNAL For many, the term cyberspace conjures up images of science fiction, the stuff of novels and movies. In fact, in 1994 this was the term
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Cyber Security Current Trends & Emerging Threats
Cyber Security Current Trends & Emerging Threats Michael Saylor Executive Director Cyber Defense Labs Page 1 Michael Saylor, CISM, CISA Michael (Mike) possesses over 19 years of experience with both domestic
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage
Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies
Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN2249-9598, Volume-III, Issue-IV, July-Aug 2013
Need to understand Cyber Crime s Impact over national Security in India: A case study P.R. Patil and D.V. Bhosale Dept. of Defence & Strategic Studies, Tuljaram Chaturchand College, Baramati, Dist- Pune,
Federal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
DDoS Attacks Can Take Down Your Online Services
DDoS Attacks Can Take Down Your Online Services Dr. Bill Highleyman Managing Editor, Availability Digest Continuity Insights New York 2014 October 8, 2014 [email protected] Who Am I? Dr. Bill
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
