Project 2020: Preparing Your Organization for Future Cyber Threats Today

Similar documents
Promoting a cyber security culture and demand compliance with minimum security standards;

Microsoft s cybersecurity commitment

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Automated Protection on UCS with Trend Micro Deep Security

EY Cyber Security Hacktics Center of Excellence

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

How To Protect Yourself From Cyber Crime

Cloud Security VS Cybercrime Economy: The Kaspersky Vision. Eugene Kaspersky Co-founder & CEO, Kaspersky Lab

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

TUSKEGEE CYBER SECURITY PATH FORWARD

How To Protect Your Online Banking From Fraud

OCIE Technology Controls Program

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Don t Fall Victim to Cybercrime:

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Cybersecurity Awareness. Part 1

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Who s Doing the Hacking?

Cybercrime: risks, penalties and prevention

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Advanced Threat Protection with Dell SecureWorks Security Services

NEW ZEALAND S CYBER SECURITY STRATEGY

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Customer Value Enhancement, Endpoint Security Products Global, 2011

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Certified Cyber Security Analyst VS-1160

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Five Trends to Track in E-Commerce Fraud

The SMB Cyber Security Survival Guide

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

IBM. RiskIQ. Symantec. Bastille. Sponsor Level. Vendor and Sponsor Descriptions (Listed by Level by Alpha) Platinum. Platinum. Platinum.

Australian Government Cyber Security Review

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Fostering Incident Response and Digital Forensics Research

The Information Security Problem

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

A Cyber Security Integrator s perspective and approach

Cyber Security. John Leek Chief Strategist

Cyber Security - What Would a Breach Really Mean for your Business?

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Managing Web Security in an Increasingly Challenging Threat Landscape

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Protecting your business from fraud

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Gregg Gerber. Strategic Engagement, Emerging Markets

2012 NCSA / Symantec. National Small Business Study

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

Federal Bureau of Investigation

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

Is your business secure in a hosted world?

SIZE DOESN T MATTER IN CYBERSECURITY

Into the cybersecurity breach

The Impact of Cybercrime on Business

Certified Cyber Security Analyst VS-1160

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

Enterprise Apps: Bypassing the Gatekeeper

Cyber liability threats, trends and pointers for the future

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

What Directors need to know about Cybersecurity?

Adopting a Cybersecurity Framework for Governance and Risk Management

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Cybersecurity The role of Internal Audit

Cyber Threats: Exposures and Breach Costs

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

CYBERCRIME AND THE INTERNET OF THREATS.

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Transcription:

Project 2020: Preparing Your Organization for Future Cyber Threats Today SESSION ID: CLE-T08 Ken Low CISSP GSLC Director of Cybersecurity Programs, Asia Pacific TREND MICRO

2

PROJECT 2020 An initiative of the International Cyber Security Protection Alliance (ICSPA). AIM To anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. ACTIVITIES SCENARIOS Not predictions of a single future. Rather, they are descriptions of a possible future which focus on the impact of cybercrime from the perspectives of an - Ordinary Internet user, - A manufacturer, - A communications service provider and a government. - They take their inspiration from analysis of the current threat landscape, the expert opinion of ICSPA members and extensive horizon scanning, particularly of emerging technologies. Including common threat reporting, strategic foresight exercises, policy guidance and capacity building. 3

VIEW FROM 2014 Mobile New ways to hide Cloud/ Virtualisation SSL/TLS Attacks Consumerisation/BYOD Social Networking/Media Rogue Certificates Online Financial Service Attacks Data-Stealing Trojans Web Exploits APT SCADA Cyber Weapons Malware outside the OS Crime as a Service High Profile Data Loss Legislation working against security New threat actors Spam goes Legit Hacktivism Embedded Hardware Social Engineering 4

THE SCENARIOS These focus deliberately on the criminal and economic aspects of cyber security in 2020 Drawing out the dependencies between different technologies and different sectors of society Identifying barriers to progress and effective security 5

Kinuko 23 years old 2 nd generation digital native 6

7

Xinesys Enterprises & Lakoocha 8

9

South Sylvania 10

11

2020 IN A TRULY CONVERGED 2020, THE FOLLOWING CYBER-RELATED ACTIVITIES MAY BECOME MORE APPARENT: A market for scramblers of mood recognition, remote presence and near field communication technologies Highly distributed denial of service attacks using Cloud processing A move from device-based to Cloud-based botnets, hijacking distributed processing power A mature illicit market for virtual items, both stolen and counterfeit Distributed bulletproof and criminal processing Physical attacks against data centres and Internet exchanges Electronic attacks on critical infrastructure, including power supply, transport and data services Micro-criminality, including theft and fraudulent generation of micro payments Bio-hacks for multi-factor authentication components 12

2020 IN A TRULY CONVERGED 2020, THE FOLLOWING CYBER-RELATED ACTIVITIES MAY BECOME MORE APPARENT: Cyber-enabled violence against individuals, and malware for humans Cyber gang wars Advanced criminal intelligence gathering, including exploitation of big and intelligent data High impact, targeted identity theft and avatar hijack Sophisticated reputation manipulation Misuse of augmented reality for attacks and frauds based on social engineering Interference with unmanned vehicles and robotic devices Hacks against connected devices with direct physical impact (car-to-car communications, heads-up display and other wearable technology, etc. 13

Cybercriminal Threats 14

2020.trendmicro.com 15

Preparing for 2020 KEY CONSIDERATIONS FOR STAKEHOLDERS: Who owns the data in networked systems, and for how long? Who will distinguish between data misuse and legitimate use, and will we achieve consistency? What data will the authorities be able to access and use for the purposes of preventing and disrupting criminal activity? Who covers (and recovers) the losses, both financial and in terms of data recovery? Who secures the joints between services, applications and networks? And how can objects which use different technologies operate safely in the same environment? Do we want local governance and security solutions, or global ones? Will we be able to transit to new forms of governance and business models without causing global shocks, schisms and significant financial damage? 16

Beyond 2020 Remote presence and virtual reality technologies (early adoption by mainstream) Truly immersive technologies with human cognitive processes will bring new harms (especially psychological) as well as benefits Mainstream adoption of augmented reality, virtual reality and sensor technology Singularity of man and machine (Ray Kurzweil) Quantum computing? 17

A world safe for exchanging digital information CEO Founded Headquarters Employees Offices 2013 Sales Eva Chen 1988, United States Tokyo, Japan 5,217 36 $1.1B USD New malware every ½ second Global Threat Intelligence - 1,200+ experts worldwide 96% of the top 50 global corporations. 100% of the top 10 automotive companies. 100% of the top 10 telecom companies. 80% of the top 10 banks. 90% of the top 10 oil companies. 18

19

20

21

Project 2020: Preparing Your Organization for Future Cyber Threats Today SESSION ID: CLE-T08 Ken Low CISSP GSLC Director of Cybersecurity Programs, Asia Pacific TREND MICRO