Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
|
|
|
- Helen Gilmore
- 10 years ago
- Views:
Transcription
1 Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90
2 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private sector organisations continue to move into cyberspace, so do criminals. Cyber-crime, which is the collective term for criminal activities carried out by means of a computer or the Internet, has become increasingly sophisticated, making it difficult to detect and combat. Nowadays, cyber-crime cases appear in newspaper headlines on a regular basis, showing the extent and the ever-evolving nature of the cyber criminality landscape: US accuses China of new cyber attacks (The Guardian, 31 January 2013) NSA Prism program taps in to user data of Apple, Google and others (The Guardian, 7 June 2013) 5 hackers charged in largest data-breach scheme (Bloomberg, 26 July 2013) LulzSec hackers sentenced for sophisticated global cyber-attacks (The Independent, 16 May 2013) According to Deloitte s 2012 Global Financial Services Industry Security Study 1, about one-quarter of all banks were victims of a cyber breach in The cost of cybercrime to the global economy to date may already be substantial. Some studies cite figures as high as US$388 billion 2 or US$1 trillion 3, which is larger than the global black market in marijuana, cocaine and heroin combined (US$288 billion). In this context, it goes without saying that cyber security is increasingly becoming a key concern among organisational leadership, including boards of directors. A biennial study of enterprise security governance practices by the Carnegie Mellon University CyLab found a sharp rise in board-level attention paid to the topic. Among companies surveyed in 2012, 48% have a boardlevel risk committee responsible for privacy and security, up from just 8% in The cyber security threats landscape The 2013 Data Breach Investigations Report (DBIR) 4 consolidates information of the data breach incidents in 2012 from diverse sources to facilitate analysing threats a particular industry is exposed to (a total of 47,000 security incidents with a focus on 621 incidents with confirmed data loss). Deloitte is one of the 19 contributing organisations to this report in light of its incident response and investigation services. Which industries are at risk? A definite relationship exists between a particular industry and attack motive, which is most likely a result of the data targeted (e.g. stealing payment cards from retailers and intellectual property from manufacturers): 37% of breaches affected financial organisations, mainly due to a large number of ATM skimming incidents 24% of breaches occurred in retail environments and restaurants 20% of network intrusions involved manufacturing, transportation and utilities What are threat actors and what are their motivations? There are four main categories of malicious actors in cyber security: State actor: the rise of state actors is significant and considered a great threat according to Deloitte. There are several countries that have openly participated in information warfare for the past several years targeting both private companies and governments More than ever, cyberspace is a land of opportunity but also a dangerous world Norton Cybercrime Report The Global Industry Analysts; McAfee, Unsecured Economies: Protecting vital information Verizon 2013 Data Breach Investigation Report 91
3 Organised crime: as explained earlier in this article, cyber crime has surpassed the global drug trade in terms of revenue. This is not simply limited to credit card data, but anything of value Hacktivist/activist: the hacktivist movement is the newest addition to the threats list. Groups like Anonymous, Lords of Dharma, Team Poison and others have garnered a lot of media attention Insider: insiders can range from the negligent employee who loses a laptop to a completely malicious actor who releases confidential data in an act of vengeance Most confirmed cases of data loss are perpetrated by outsiders, generally by organised crime groups or stateaffiliated groups. The largest number of actors reportedly come from China, Romania, the United States, Bulgaria and Russia. How do breaches occur (threat actions)? Threat actions describe what the actor did to cause or to contribute to the breach, taking into consideration that every incident contains one or more actions. 52% used some form of hacking, including all attempts to intentionally access or harm information assets without (or in excess of) authorisation by circumventing or thwarting logical security mechanisms 76% of network intrusions exploited weak or stolen credentials 35% involved physical attacks. Physical threats encompass deliberate actions that involve proximity, possession or force (ATM skimming operations, pointof-sale device tampering, stolen user devices, etc.) 29% adopted tactics such as phishing, bribery, extortion, etc. What is the breach timeline? Understanding the timeline of an incident can greatly increase the ability to assess and improve an organisation s lines of defence. In 84% of network intrusion cases, initial compromise (the time taken for the attacker to get his foot in the door) occurred within hours or less In 69% of network intrusion cases, initial compromise to data exfiltration (point when non-public information is first removed from the victim s environment) also occurred within hours or less In 66% of network intrusion cases, initial compromise to discovery (i.e. when the victim first learns of the incident) took months or more. In addition, approximately 70% of breaches were discovered by external parties who notified the victim While these statistics highlight the need to improve prevention measures (ability of organisations to resist cyber-attacks), we must accept the fact that no barrier is impenetrable, and detection/response represents an extremely critical line of defence. 40% incorporated malware malware is any malicious software, script or code added to an asset that alters its state or function without permission 92
4 Cyber security risks are not new, so what is different? The digital revolution is driving business innovation and growth, but also exposing organisations to new and emerging cyber threats. The threat landscape has changed, and the business case for more mature cyber security is better than before. Actually, new business goals and new ways of working are driving business innovation and growth, but these expose us to new and emerging cyber security threats: Consumerisation ( bring your own ): de-perimeterisation and loss of control of data and devices that have left the traditional data centre boundaries Increased collaboration: cross-channel, crossplatform sharing of large volumes of sensitive data Technology Cloud Mobile Threats Social Analytics Virtualisation Shared services Technology innovation: lack of understanding of risks introduced by new tools and processes Commoditisation of IT (e.g. cloud computing): business functions can procure IT services outside of internal controls Nation states Criminal syndicates Patch failure Market trust: reputational damage of a cyber-attack destroys trust which is very hard to recover Espionage Hactivists Insiders Globalisation: new threats arising from expansion into new markets and new ways of working As organisations increasingly adopt cloud, mobile and social computing, IT environments are becoming more difficult to defend. Most confirmed cases of data loss are perpetrated by outsiders, generally by organised crime groups or state-affiliated groups 93
5 The need for a cyber resilient organisation As illustrated earlier in this article, the adoption of new technologies and the emergence of new threats result in a more complex risk landscape. In this context, many organisations may not be as effective at managing cyber threat risk as they are at managing risk in other areas. Cyber resilience requires that organisations have the agility to prevent, detect and respond quickly and effectively, not just to incidents, but also to the consequences of the incidents. First of all, it s essential to understand the cyber threats to your organisation before you can develop an effective cyber security strategy. For example, cyber risks can be mapped according to three factors: Does the organisation focus on preventing the risk or detecting and responding to it if it occurs? Is the risk known and understood (does it relate to a current threat?), or unknown with little or no understanding (a future threat)? What level of concern does the risk pose? The maturity of an attacker can be measured by their sophistication and determination. Those that are more mature are harder to stop, and there is a decreasing ROI on controls that prevent the most mature attackers. Depending on your risk appetite and the threat landscape for your organisation, one option may be to focus on preventing less mature attackers and detecting and responding to more mature attackers (see figure). Figure 1 Based on this preliminary cyber threat assessment, the next step is to determine the scope of cyber security for your organisation and the underlying security capability model. The prevalence and sophistication of recent cyberattacks on public and private organisations highlights a number of capabilities that are essential to becoming an effective cyber-resilient organisation: Preparation: prepare your organisation to effectively manage cyber risks by ensuring it has the right governance structures in place to enhance and maintain its preventative and detective security capabilities Prevention: defend your organisation against successful cyber-attacks by continuing to invest in enhancing and maintaining measures that protect your digital assets such as (i) next generation security controls (IDM, NAC, etc.), (ii) hardening of critical information infrastructure, (iii) secure services (secure SDLC, vulnerability and patch management, etc.) and (iv) secure workforce and cyber awareness Detection: leverage the wealth of threat intelligence and develop your own capabilities to ensure you are aware of the internal and external threats to your organisation and can pro-actively mitigate them Response: in anticipation of a cyber-attack, ensure you have the ability to rapidly respond to an incident in order to limit any adverse impact on your organisation Risk appetite (Illustrative) State-sponsored Cyber warfare Attacker sophistication Accidental discovery Malware Insider Lone hacker/ Hobbyist Business partner 'Script kiddy' Disgruntled ex-it administrator Competitor Disgruntled customer Disgruntled ex-employee Organised crime Hacker collectives Cyber terrorism 'Hacktivism' Attacker determination Defend Limit impact 94
6 The five commandments for a successful cyber security strategy In conclusion, five key principles should underpin cyber security and promote a cohesive approach to protection from cyber threats: Understand your risk appetite: only when you have fully understood your assets, the risks that threaten them and how these fit into the overall threat landscape can you determine what level of threat maturity you need to defend against and where you draw the line to focus on limiting the impact of a successful attack Ensure close alignment with business goals: ensure that your strategic direction for cyber security is in close alignment with business goals and the organisation s strategy for achieving these. Focus efforts on defending the most strategically important parts of the business, or those that carry most operational risk Prepare for the worst: it is not practical to prevent all forms of cyber-attack, especially those that are particularly sophisticated and targeted (advanced persistent threats or APTs). You should ensure you have the organisational and technical capability to rapidly detect and respond to a successful attack in order to limit its impact Cyber resilience requires that organisations have the agility to prevent, detect and respond quickly and effectively, not just to incidents, but also to the consequences of the incidents Share intelligence: collaborate and share intelligence with industry and national and international cyber threat intelligence organisations. By sharing intelligence with other organisations you will be in a position to receive the benefit of shared wisdom Instil a broad awareness of cyber security: your security is only as strong as the weakest link. Ensure that the risks associated with cyber security and the steps your organisation is taking to combat these risks are understood across the organisation, from the board and senior management, to all staff, partners and third parties 95
The enemies ashore Vulnerabilities & hackers: A relationship that works
The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY BY DR. BRIAN MCELYEA AND DR. EMILY DARRAJ Approved for Public Release: Case # 16-0276 NORTHROP GRUMMAN WHITE PAPER 2016 Northrop Grumman
EY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
Tackling the growing risk of cyber crime
Financial Institutions Customer Industry Community Tackling the growing risk of cyber crime Discussion points for financial institutions Contents Introduction 3 The scale of cyber risk 4 Zurich survey
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
The Recover Report. It s business. But it s personal.
The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014
Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Collateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
CYBER SECURITY THREAT REPORT Q1
CYBER SECURITY THREAT REPORT Q1 Moving Forward Published by UMC IT Security April 2015 0 U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations,
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Risk Management in Global Operating Industry
Risk Management in Global Operating Industry World Financial Symposium 2015 Here is the News Saleema Brohi Aviation Legal Expert Session Sponsor World Financial Symposium 2015 Cyber Attack! - Beyond Firewalls
CYBER SECURITY PROTECTING YOUR BUSINESS James Hatch Director, Cyber Services BAE Systems Applied Intelligence 1 CYBER SECURITY AT BAE SYSTEMS Professional Services Technical Services Prepare Protect Cyber
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience
Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Cyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
An New Approach to Security. Chris Ellis McAfee Senior System Engineer [email protected]
An New Approach to Security Chris Ellis McAfee Senior System Engineer [email protected] Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty
Cyber Security Incident Response Guide. Version 1
Cyber Security Incident Response Guide Version 1 Published by: CREST Tel: 0845 686-5542 Email: [email protected] Web: http://www.crest-approved.org/ Principal Author Jason Creasey, Managing Director,
How do we Police Cyber Crime?
How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry
Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry Templar Executives NIAS 2007 DHR 2008 IAMM 2008 1 st CSS 2009 2 nd CSS 2011 Advising Government & Industry
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
Advanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Defending Against Attacks by Modeling Threat Behaviors
Defending Against Attacks by Modeling Threat Behaviors John Benninghoff Transvasive Security Transparent and Pervasive Security 2013 Verizon DBIR Recommendations What can we do about it? Collect, analyze
Resilience and Cyber Essentials
Resilience and Cyber Essentials Richard Bach Assistant Director Cyber Security Talk outline Why Cyber Essentials: the Policy context What is Cyber Essentials: Scheme background How the Scheme works: accreditation,
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey
Evolving Cybersecurity Risks Results on EY s Global Information Security Survey Agenda Market insights: What are we seeing? Factoring cybersecurity into your planning and risk appetite Marketplace response
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
CYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
Gregg Gerber. Strategic Engagement, Emerging Markets
Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Cyber Risk Management
Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also
CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY
CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY May 21, 2015 WELCOME Jim Ambrosini CISSP, CFE, CISA, CRISC, CRMA is a Managing Director with CohnReznick Advisory Group who leads its cybersecurity
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
20+ At risk and unready in an interconnected world
At risk and unready in an interconnected world Key findings from The Global State of Information Security Survey 2015 Cyber attacks against power and utilities organizations have transitioned from theoretical
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Cyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour
SAMPLE ASSESSMENT MATERIAL Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security Date Morning/Afternoon Time Allowed: 1 hour You must have: The Insert (clean copy case study)
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
