Cyber-Security Risk in the Global Organization:



Similar documents
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

The Strategic Assessment of the St. Louis Region

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Internet threats: steps to security for your small business

OSHA Inspection Checklist

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Microsoft s cybersecurity commitment

RETHINKING CYBER SECURITY Changing the Business Conversation

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Cyber Security Strategies for the Small Business Market

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Identifying Cyber Risks and How they Impact Your Business

The SMB Cyber Security Survival Guide

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

The Impact of Cybercrime on Business

The Attacker s Target: The Small Business

SIZE DOESN T MATTER IN CYBERSECURITY

THE FEDERAL BUREAU OF INVESTIGATION FINANCIAL INSTITUTION FRAUD AND FAILURE REPORT

Cyber Security. John Leek Chief Strategist

Defending Against Data Beaches: Internal Controls for Cybersecurity

Perspectives on Cybersecurity in Healthcare June 2015

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

2012 Endpoint Security Best Practices Survey

CKAHU Symposium Cyber-Security

10 Quick Tips to Mobile Security

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

State of Security Survey GLOBAL FINDINGS

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

2015 NFL Annual Selection Meeting R P O CLUB PLAYER POS COLLEGE ROUND 2

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Fast Facts About The Cyber Security Job Market

SECURITY CONSIDERATIONS FOR LAW FIRMS

The Role of Security Monitoring & SIEM in Risk Management

CYBER EXPOSURES OF SMALL AND MIDSIZE BUSINESSES A DIGITAL PANDEMIC. October Sponsored by:

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

2014 State of Endpoint Risk. Sponsored by Lumension. Independently conducted by Ponemon Institute LLC Publication Date: December 2013

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Five Trends to Track in E-Commerce Fraud

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Secure Your Mobile Workplace

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Defensible Strategy To. Cyber Incident Response

Building a Business Case:

A Case for Managed Security

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

The Hillstone and Trend Micro Joint Solution

Cybersecurity Best Practices

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Cybersecurity. Are you prepared?

Managing Web Security in an Increasingly Challenging Threat Landscape

Cyber Security Solutions:

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

NATIONAL CYBER SECURITY AWARENESS MONTH

2011 NATIONAL SMALL BUSINESS STUDY

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM Security Strategy

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

IT Security Community

Reducing the cost and complexity of endpoint management

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Security Intelligence Services. Cybersecurity training.

CCNA Cisco Associate- Level Certifications

Transcription:

Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three Things We Know About Cyber Security 1 2 3 1

Helps to be a little paranoid There is no Data Security 2

There is no patch for stupid Fast Cyber Security Facts: 234,000 computers worldwide infected CryptoLocker. 500 % growth in Ransomware threats. Malware 15 million new samples created during Q1 2014 160,000 new samples daily August 2014 Possibly 1.2 Billion user names & passwords stolen by Russian crooks. BIGGEST BREACH ON RECORD 3

Fast Cyber Security Facts 35% of the incidents 76% of the identities exposed HACKERS 4.7 million the average number of identities exposed per data breach for hacking incidents was approximately Theft or loss of a device.accounted for 27% of data breach incidents CYBER-TERRORIST WEBSITES 1998 Today 12 9,800 Data Breach Costs The average time it took to detect breaches declined slightly from 2012 to 2013, from 243 to 229 days. However, the number of firms that detected their own breaches actually dropped, from 37% to 33%. The total number of breaches in 2013 was 62% greater than in 2012. Eight of the breaches in 2013 exposed more than 10 million identities each. In 2012 only one breach exposed over 10 million identities. = $201 per record lost* (28% increase from 2013) *US Average 2014 Cost of Data Breach Study: United States Benchmark research sponsored by IBM, Independently conducted by Ponemon Institute LLC. May 2014 4

Prevention Pays Prevention Plan Type Pre-Prepared Data Breach Response Strong Security Posture CISO/CPO Savings Per Record $42 $34 $13 XP Vulnerabilities Released in 2001 Most used business software PROBLEM: April 8, 2014 - Microsoft stopped supporting XP McAfee and other virus protection programs don t work any longer And if you think the patch fixes this problem, think again - MS warns not to install the Windows XP security workaround It tricks Windows update into thinking that the XP version is an embedded point-of-sale OS that Redmond supports through 2019. 5

Top Inhibitors to Cyber-Threat Defense Inadequate cyber-security awareness among employees & lack of management support or awareness Lack of budget & inability to justify investment Lack of skilled personnel with too much data to analyze Inadequate or poorly integrated security solutions & limited number of effective solutions on the market Emerging Cyber-Threats 6

Emerging Cyber-Threat Trends The Internet of Things (IoT) IoT devices become the access points for targeted attackers and become bots for cybercriminals. TARGETS: Baby Monitors, Security Cameras & Routers April of 2014: a man hacked an Ohio family s baby monitor and began screaming, WAKE UP BABY into the monitor at midnight. March of 2014: hackers took control of 300,000 home routers in Europe. UP NEXT: Smart Televisions, Automobiles & Medical Equipment Red-button attack on smart TVs anticipate they can be hacked using a $250 transmitter. The burden PREDOMINANT RISK ROUTERS falls on YOU Worms like Linux.Darlloz are making a comeback. Emerging Cyber-Threat Trends Cloud & Mobile Risks MOBILE THREATS: more sophisticated and pervasive. In 2013, there were 58 variants per mobile malware family Android is still the most widespread, and most targeted. 1.4 million malicious and high-risk Android apps are in existence Apple is improving vulnerabilities - Down 68% (Apple s ios7) WI-FI INTENSIFIES SECURITY RISKS: When your employees are working in a public place, who is listening? And what information are they potentially exposing? What policies do you have in place to mitigate your risk? 7

Emerging Cyber-Threat Trends Ransomware Attacks grew by 500 percent in 2013. CryptoLocker was predominant threat; NOW it is CTB-Locker. CTB-Locker is a second-generation threat and much more powerful. Cybercriminals are adopting criminal business models developed for the PC, applying them to new areas and fine-tuning their methods. 3 % of infected users historically paid the ransom Do you have a policy in place for opening emails? Just Paid Cryptolocker - We got infected, found our backups did not work and we had to pay. Cryptolocker SUCKS - This really is the nastiest thing on the web at the moment. Ouch. This stinks - Our Controller opened the attachment, and her PC got infected. The phishing email passed through hosted email filtering. Actual comments from www.knowbe4.com Where Help is Available U.S. Secret Service Electronic Crimes Task Forces Atlanta Baltimore Birmingham Boston Oklahoma Buffalo Charlotte Chicago Cleveland Dallas Houston Las Vegas Los Angeles Louisville Miami Minneapolis New York/New Jersey Orlando Philadelphia Phoenix Pittsburgh San Francisco Seattle South Carolina Washington DC 8

Best Practices IT Guidelines for Businesses 1.Employ defense-in-depth strategies. 2.Monitor for network incursion attempts, vulnerabilities, and brand use. 3.Antivirus on endpoints is not enough. 4.Secure your websites against MITM attacks and malware infection. 5.Protect your private keys. 6.Use encryption to protect sensitive data. 7.Ensure all devices allowed on networks have adequate protections. 8.Implement a removable media policy. 9.Be aggressive in your updating and patching. 10.Enforce an effective password policy. 11.Ensure regular backups are available. 12.Restrict email attachments. 13.Ensure you have infection and incident response procedures in place. 14.Educate users on basic security protocols. Best Practice Guidelines for Businesses, Recommendations + Best Practice Guidelines, Internet Security Threat Report 2014: Volume 19, Symantec Corporation, pg 87, 2014 TOP SIX 1. Educate users on basic security protocols. 2. Employ defense-in-depth strategies. 3. Use encryption to protect sensitive data. 4. Be aggressive in your updating and patching. 5. Enforce an effective password policy. 6. Ensure you have infection and incident response procedures in place. Hottest Cyber-Risk Solutions NGFW (NEXT GENERATION FIREWALL) Application aware, uses deep packet inspection techniques to examine traffic for anomalies and known malware. NAC (NETWORK ACCESS CONTROL) A computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. WORKFORCE AWARENESS TRAINING Creating the Human Firewall 9

Data Breach is Not Just an IT Issue Train employees about the data risks in your organization. Physical Psychological Monitor risks and keep training and awareness up to date. Think like the bad guys. Build from Teachable Moments. Creating the Human Firewall Recognize this is a cultural shift. Think harassment or workplace safety. Expect and promote secondary benefits for employees. Start the change process with people who have disproportionate influence in the organization. Look for ways to get people to experience the harsh realities that make change necessary. Look for ways to redistribute resources toward hot spots activities that require few resources but result in large change. 10

Questions? todd.carroll@ic.fbi.gov david.childers@compli.com 11