EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS
|
|
|
- Abraham Gregory
- 10 years ago
- Views:
Transcription
1 EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS Ian Green Manager, Cybercrime & Intelligence Commonwealth Bank of Australia Session ID: GRC T17 Session Classification: ADVANCED
2 WHY?
3 What keeps you up at night?
4 What keeps you up at night?
5 Extreme events are costly Global Payments Inc. 10% or $400m wiped off market cap
6 How prepared are you? General Keith Alexander Director, National Security Agency Commander, United States Cyber Command Source: The Aspen Security Forum
7 How prepared are you? General Keith Alexander Director, National Security Agency Commander, United States Cyber Command Source: The Aspen Security Forum
8 Cyber Resilience mean time to failure mean time to recovery Can only be achieved by adopting a holistic approach of the management of cyber risk While failures are unavoidable, cyber resilience prevents systems from completely collapsing
9 HOW?
10 Threat Actor Analysis For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Identify actors who pose a significant threat to the organisation
11 Threat Agent Library Intel agent library.pdf
12 Agent Attributes - Intel WHO HOW Intent: Non-hostile, Hostile Access: Internal, External Skill Level: None, Minimal, Operational, Adept Resources: Individual, Club, Contest, Team, Organisation, Government Limits: Code of conduct, Legal, Extra-legal (minor), Extralegal (major) Visibility: Overt, Covert, Clandestine, Don t Care Objective: Copy, Destroy, Injure, Take, Don t Care Outcome: Acquisition / Theft, Business Advantage, Damage, Embarrassment, Technical Advantage
13 Agent Attributes - Intel WHO HOW Intent: Non-hostile, Hostile Access: Internal, External Skill Level: None, Minimal, Operational, Adept Resources: Individual, Club, Contest, Team, Organisation, Government Limits: Code of conduct, Legal, Extra-legal (minor), Extralegal (major) Visibility: Overt, Covert, Clandestine, Don t Care Objective: Copy, Destroy, Injure, Take, Don t Care Outcome: Acquisition / Theft, Business Advantage, Damage, Embarrassment, Technical Advantage
14 Consolidated Threat Actors Corrupt Government Official Government Cyber Warrior Government Spy Civil Activist Radical Activist Mobster Terrorist Competitor Internal Spy Nation State Hacktivist Organised Crime Terrorists Trusted Insider
15 Threat Actor Analysis Organised Crime Nation State Trusted Insider Hacktivist Group Terrorist
16 Threat Actor Analysis Organised Crime Hacktivist Group Nation State Trusted Insider Hacktivist Group Intent: Hostile Access: External Skill Level: Adept Resources: Organisation Limits: Extra-legal (major) Visibility: Overt Objective: Copy, Injure Outcome: Damage, Embarrassment Terrorist
17 Threat Actor Analysis Nation State Organised Crime Terrorist Trusted Insider Organised Crime Intent: Hostile Access: External Skill Level: Adept Resources: Organisation Limits: Extra-legal (major) Visibility: Covert Objective: Take Outcome: Acquisition / Theft Hacktivist Group
18 Threat Actor Analysis Terrorist Nation State Hacktivist Group Trusted Insider Nation State Intent: Hostile Access: External Skill Level: Adept Resources: Government Limits: Extra-legal (major) Visibility: Clandestine Objective: Copy Outcome: Technical Advantage Organised Crime
19 Threat Actor Analysis Hacktivist Group Terrorist Organised Crime Trusted Insider Terrorist Intent: Hostile Access: External Skill Level: Adept Resources: Organisation Limits: Extra-legal (major) Visibility: Covert Objective: Destroy Outcome: Damage Nation State
20 Impact Analysis For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Determine what your organisation really cares about protecting
21 Business Impact Matrix Financial Customer Service & Operations Reputation / Brand Legal / Regulatory Compliance People Customers Impact 5 >$500m Significant loss of customers due to extensive interruption to service capability Substantial damage to brands resulting from extensive negative national publicity Loss of license, loss of public listing or substantial penalties on Directors Death or severe injury to employees 4 $200m $500m..... Serious financial impact to all customers 3 $50m $200m 2 <$50m. 1 <$50m
22 Values at Risk Health and safety of employees Customer funds and stocks Customer data (private information) Customer data (intellectual property) Corporate data (sensitive information) Corporate data (intellectual property) Availability of banking channels (Internet facing) Availability of banking channels (back end)
23 Scenario Selection For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Select scenarios that could have a catastrophic impact on the organisation
24 Scenario Selection Threat Actor Analysis Impact Analysis Outcome Objective Value at Risk Potential Business Impact Acquisition / Theft Copy Customer Funds Customer Service / Operational Business Advantage Destroy Customer Data Financial Technical Advantage Injure Corporate Data Reputational / Brand Damage Take Employee health and safety Legal / Regulatory Compliance Embarrassment Availability of banking systems Customers People
25 Scenario Selection Threat Actor Analysis Impact Analysis Outcome Objective Value at Risk Potential Business Impact Acquisition / Theft Business Advantage Technical Advantage Damage Embarrassment Copy Organised Crime Destroy Intent: Hostile Access: External Skill Level: Adept Injure Resources: Organisation Limits: Extra-legal (major) Visibility: Covert Objective: Take Take Outcome: Acquisition / Theft Customer Funds Customer Data Corporate Data Employee health and safety Availability of banking systems Customer Service / Operational Financial Reputational / Brand Legal / Regulatory Compliance Customers Scenario: Organised crime gang steals customer funds causing significant financial loss. People
26 Scenario Selection Threat Actor Analysis Impact Analysis Outcome Objective Value at Risk Potential Business Impact Acquisition / Theft Business Advantage Technical Advantage Damage Embarrassment Copy Hacktivist Group Destroy Intent: Hostile Access: External Skill Level: Adept Resources: Organisation Injure Limits: Extra-legal (major) Visibility: Overt Objective: Copy, Injure Take Outcome: Damage, Embarrassment Customer Funds Customer Data Corporate Data Employee health and safety Availability of banking of banking systems systems Customer Service / Operational Financial Reputational / Brand Legal / Regulatory Compliance Customers Scenario: Socio-political group performs prolonged denial-ofservice attack causing sustained outages. People
27 Is it Extreme? Financial Customer Service & Operations Reputation / Brand Legal / Regulatory Compliance People Customers Impact 5 >$500m Significant loss of customers due to extensive interruption to service capability Substantial damage to brands resulting from extensive negative national publicity Loss of license, loss of public listing or substantial penalties on Directors Death or severe injury to employees 4 $200m $500m Serious financial impact to all customers 3 $50m $200m 2 <$50m. 1 <$50m
28 Scenarios on Risk Matrix 5 L M M H VH Likelihood L L M H VH I L M H VH I L M H VH I I L M H Impact
29 Scenario Selection Financial Gain Organised Crime 1 Large scale targeting of bank customers using malware to steal funds. 2 High value fraud conducted against backend payment system. Hacktivist Group Nation State Terrorist Theft / Exposure 4 Exfiltrate and disclose large sets of corporate data to embarrass or discredit the bank. 6 Exfiltrate corporate intellectual property for strategic, commercial or political gain. 5 Compromise bank IT systems and exfiltrate large sets of customer data. Sabotage / Operations Impact 3 Targeted, prolonged DDoS against multiple Internet facing systems. 7 Destructive cyber-attack against multiple bank data centres.
30 Attack Tree Development For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Develop detailed attack trees for each extreme scenario
31 Attack Tree Analysis Steal Car AND Unlock Door Start Engine Smash Window Pick lock Hot wire Screwdriver in ignition
32 Attack Tree Analysis How? Steal Car AND Unlock Door Start Engine Smash Window Pick lock Hot wire Screwdriver in ignition
33 Attack Tree Analysis Steal Car And then? AND Unlock Door Start Engine Smash Window Pick lock Hot wire Screwdriver in ignition
34 Attack Tree Demonstration Demonstration of attack trees (Prezi)
35 Controls Assessment For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Map controls to attack trees and assess effectiveness
36 Industry Standard Control Sets Provides a consistent set of controls for assessment and comparison May not be relevant to a particular scenario May not be pitched at the right level to be useful Options available: DSD Top 35 Mitigation Strategies NIST Special Publication SANS 20 Critical Controls for Effective Cyber Defense
37 Hybrid Control Set Application Whitelisting Data Encryption Physical Security Controls Third Party Governance Data Loss Prevention Penetration Testing Layer 7 DDoS Prevention Network Segmentation MiTB Detection
38 Controls Assessment Type of control: Predict Prevent Detect Respond Status of control: Control has not been implemented Control has known gaps Control operating effectively Potential to mitigate: 25% 50% 75% 100% Cost of control: $ Low cost $$ Moderate cost $$$ High cost
39 Control Mapping Steal Car Unlock Door AND Start Engine Smash Window Pick lock Hot wire Screwdriver in ignition Prevent Bullet proof glass $$$ 100% Prevent Sidewinder Lock $ 75% Engine Immobiliser Prevent $ 75% Car Alarm Detect $ 75%
40 Attack Tree Demonstration Demonstration of attack trees (Prezi)
41 Remediation For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Use controls assessment to plan remediation projects which address control gaps
42 Response Planning For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Create or enhance existing response plans to cater for extreme scenarios
43 Incident Response Framework IRP IRSOP Incident Response Plan Incident Response Standard Operating Procedure IRG Incident Response Guidelines
44 Incident Response Standard Operating Procedures Denial of Service Compromised Information Compromised Asset Unlawful Activity Probing Malware
45 IR Considerations Will your incident response plans hold up to extreme scenarios? What outside resources will you lean on for assistance in an extreme scenario? Have you documented and shared all your contacts into government, law enforcement, service providers? Have you discussed & planned your response with external stakeholders? Do you know what you will expect from each other if such a scenario occurs? Have you practiced your incident response?
46 Exercise For each scenario Threat Actor Analysis Controls Assessment Remediation Scenario Selection Attack Tree Development Impact Analysis Response Planning Exercise Aim: Test control strength, response plan and overall preparedness
47 Example: BYO Botnet HTTP large resource request HTTPS large resource request HTTPS slow POST attack HTTPS search query attack SSL Exhaustion DNS Query attack TCP SYN flood IP Fragmentation Attack ICMP flood
48 Cyber Risk Management Maturity Model The organisation s leadership takes ownership of cyber risk management they understand the organisation s vulnerabilities and controls. The organisation is highly connected to their peers and partners, sharing information and jointly mitigating cyber risk Source: World Economic Forum
49 extremecyber.net INSERT SCREENSHOT Traffic light protocol Methodology Control taxonomy Threat actor library Generic attack trees Full scenario analysis Join Extreme Cyber Scenario Planning on
50 extremecyber.net Information shared using the traffic light protocol: Private Restricted Commitment to contribute to knowledge base Full attack trees with control mapping and effectiveness Full attack trees without control effectiveness Vetted Verified members of IT security community Generic attack trees Control taxonomy Threat actor library Public Methodology only
51 Questions? Join LinkedIn Group Extreme Cyber Scenario
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
IT@Intel. Threat Agent Library Helps Identify Information Security Risks
White Paper Intel Information Technology Computer Manufacturing Enterprise Security Threat Agent Library Helps Identify Information Security Risks Intel IT developed a unique standardized threat agent
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
How do we Police Cyber Crime?
How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer
2012 Infrastructure Security Report 8th Annual Edition Kleber Carriello Consulting Engineer Key Findings in the Survey* Advanced Persistent Threats (APT) a top concern for service providers and enterprises
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
National Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012
2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Specific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS
: DDOS ATTACKS DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS 1 DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS NTT is one of the largest Internet providers in the world, with a significant share of the world s
Gregg Gerber. Strategic Engagement, Emerging Markets
Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Zak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
idata Improving Defences Against Targeted Attack
idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Arbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Coping with a major business disruption. Some practical advice
Coping with a major business disruption Some practical advice Coping with a major business disruption What is business continuity? Business continuity planning (BCP) is a management process that helps
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
How To Protect Yourself From A Dos/Ddos Attack
RELEVANT. INTELLIGENT. SECURITY White Paper In Denial?...Follow Seven Steps for Better DoS and DDoS Protection www.solutionary.com (866) 333-2133 In Denial?...Follow Seven Steps for Better DoS and DDoS
Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs
1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim [email protected] Gary E. Murphy [email protected] Michael J. Decker [email protected]
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons
This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons Attribution-ShareAlike 4.0 International license. As a provider
SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper
SHARE THIS WHITEPAPER On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper Table of Contents Overview... 3 Current Attacks Landscape: DDoS is Becoming Mainstream... 3 Attackers Launch
PREPARE YOUR INCIDENT RESPONSE TEAM
PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Chapter 3.3: IT and Cloud Computing
Chapter 3.3: IT and Cloud Computing Darren Brooks, Daniel Roberts, Depeche Eliot 1. Introduction Advances in workplace technology and more specifically information technology have driven significant change
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014
Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Cyber Security Risk Management
Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of
Cyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
BUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
The FBI and the Internet
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION
CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION In the ever-evolving technological landscape which we all inhabit, our lives are dominated by
A HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
Understanding and Defending Against the Modern DDoS Threat
Understanding and Defending Against the Modern DDoS Threat SESSION ID: CLE-T09 Stephen Gates Chief Security Evangelist Corero Network Security @StephenJGates Understand you re vulnerable! How well are
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance
ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information
12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey
Evolving Cybersecurity Risks Results on EY s Global Information Security Survey Agenda Market insights: What are we seeing? Factoring cybersecurity into your planning and risk appetite Marketplace response
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Cyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
Security Controls Implementation Plan
GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 Table of Contents Executive Summary 3 Introduction 3 Security Controls Implementation
