RETHINKING CYBER SECURITY Changing the Business Conversation



Similar documents
Cyber Security. John Leek Chief Strategist

10 Smart Ideas for. Keeping Data Safe. From Hackers

MANAGED SECURITY SERVICES (MSS)

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Chapter 1 The Principles of Auditing 1

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity: What CFO s Need to Know

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Cybercrime Security Risks and Challenges Facing Business

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

The webinar will begin shortly

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

MANAGED SECURITY SERVICES (MSS)

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

A HELPING HAND TO PROTECT YOUR REPUTATION

Information Technology Risk Management

Comprehensive real-time protection against Advanced Threats and data theft

OVERVIEW. Enterprise Security Solutions

Data Center security trends

On and off premises technologies Which is best for you?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

ITAR Compliance Best Practices Guide

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Cybercrime: risks, penalties and prevention

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński

Cutting the Cost of Application Security

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

AB 1149 Compliance: Data Security Best Practices

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

October 24, Mitigating Legal and Business Risks of Cyber Breaches

I ve been breached! Now what?

How To Create An Insight Analysis For Cyber Security

The Impact of Cybercrime on Business

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

RETHINKING CYBER SECURITY

Cyber Security on the Offense: A Study of IT Security Experts

Professional Services Overview

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

The Cloud App Visibility Blindspot

Rogers Insurance Client Presentation

Managing IT Security with Penetration Testing

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Fostering Incident Response and Digital Forensics Research

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

2015 Global Study on IT Security Spending & Investments

How To Protect Your Data From Being Hacked

State of Security Survey GLOBAL FINDINGS

SIZE DOESN T MATTER IN CYBERSECURITY

Jort Kollerie SonicWALL

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

Managing Cyber Risk through Insurance

Cyber Insurance: How to Investigate the Right Coverage for Your Company

What legal aspects are needed to address specific ICT related issues?

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

Cyber-Security Risk in the Global Organization:

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Reputation Impact of a Data Breach Executive Summary

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Advanced Threats: The New World Order

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Into the cybersecurity breach

Personal Security Practices of the CAO

Defending Against Data Beaches: Internal Controls for Cybersecurity

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Network Performance + Security Monitoring

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Breach Found. Did It Hurt?

Continuous Network Monitoring

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Achieving SOX Compliance with Masergy Security Professional Services

Transcription:

RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1

1. Historical Review Agenda 2. General 2015 Overview and Update 3. The Role of the Board and Executives 4. Borderless Technology The Cloud 5. Redefining and Clarifying the Problem Statement 6. Summary & Key Takeaways 3 History can be a great teacher 4 2

What do all of them have in common? They have been hacked. 5 In the News 6 May 2014 6 3

Top Ten Historical Cyber Crimes 7 Cybercrime and Hacktivism Definitions Cybercrime = A crime in which a computer is the object of the crime (hacking, phishing, spamming, viruses, denial of service attacks) or is used as a tool to commit an offence (cyberstalking, fraud, identity theft, child pornography, hate crimes). Source Hacktivism [hacking + activism] = The use of legal and/or illegal digital tools in pursuit of political ends (web site defacements, denial-of-service attacks, information theft, web site parodies etc.). Source 8 4

CYBERCRIME AND HACKTIVISM EXAMPLES ( Which of the following represent the greatest Cyber Crime threats for your organization? International Cyber Security Protection Alliance, 2013) 9 Cybercrime and Hacktivism Impact Loss of proprietary and sensitive information Loss of revenues Potentially long-term service interruptions Loss of clientele Diminished brand/ reputation Inefficiency and decline in productivity 10 5

Cybercrime and Hacktivism Facts and Statistics Cybercrime has no borders. (Interpol, 2013) No business, government, nongovernmental, or other organization of whatever size is invulnerable to cyber attacks. On average, cybercrime costs $8.9 million per incident and takes 24 days to resolve. (Ponemon Institute, 2012) Somebody s identity is stolen every 3 seconds as a result of cybercrime. 69% of organizations are hit by cybercrime (and many don t even know it). (International Cyber Crime Protection Alliance, 2013) One minute of downtime can cost organizations $22,000. Bottom line: Cyber security is a hot topic that is not going away. 11 Global Security Challenges Customer Records Lost* 145,00 76,000 70,000 0,000 56,000,000 45,000,000 38,000,000 20,000,000 GLOBAL IMPACT 2,400,,000 USD$3 TRILLION 1,160,,000 600,00 000 000 76,0000 2.5 BILLION 117,339 43% Number of Records Exposed As A Result of a Data Breach in the Past 5 Years Average Number of Cyber Attacks per Day Increase in Number of Cyber Attacks in 2014 from 2013 * Select losses greater than 30,000 records. 12 6

Security Executives Top Concerns Unauthorized systems access Audit ability/compliance concerns Customer data breaches Sabotage (internal and external) Theft of intellectual property Lack for Security Specialized Expertise Cost of administration 13 Top Five Cyber Crimes on the Rise in 2015 14 7

2014 2015 Cyber Crimes 1. State sponsored attacks 2. Targeted attacks and smart spam 3. Selective targeting of banks and healthcare companies 4. Ransomware 5. Mobile payment systems 90% of successful cyber attacks are coming from KNOWN malware/attack methods 15 One Example Hackers Remotely Kill a Jeep 16 8

Are Hillary's Emails in The Hands of a Hacker? Sloppy Users and Shadow IT A hacker, claiming to be in possession of former US Secretary of State Hillary Clinton's secret emails, plans to auction them off, hoping to make at least $500,000 from the sale. The unnamed computer specialist told USbased entertainment publication RadarOnline that 32,000 emails from Clinton's private server are on offer to the highest bidder. However, the whole claim is weakly substantiated. The hacker shared a sample of subject lines of emails of "what appear to be legitimate messages" with RadarOnline, according to reports. 17 Ashley Madison CEO Steps Down 18 9

19 Unprecedented Use Case Harvesting records for more than a year Terabytes of data leaked into the public domain: PII, financial, HR and healthcare Business models Revenue generating assets To be released movies leaked 20 10

JP MORGAN Single Entry Point 83 million August 2014 21 The state of security today is not for a lack of security controls. UTM Firewalls WAF IDS/IPS SIEM 22 11

Existing controls produce a lot of items to investigate, but rarely are these actual threats. 23 Cyber Crime Costs Are Increasing Cost in Millions Difference of $2.7 Million = 30% Increase 2012 2013 * According to Ponemon Institute s 2013 Cost of Cyber Crime Study 24 12

Loss Severity is also increasing. Corporate Board Member magazine, May Issue 25 outranked only by high taxation and loss of customers. Cybersecuritybusiness.com 26 13

Cybersecurity risk is increasing in every measurable dimension. Observed attack traffic in the United States increased from 11% in the third quarter of 2012 to 19% in fourth quarter 2013. According to Akamai Technologies 27 The Role of The Board 28 14

Challenges for your Board s oversight of IT risk? 29 Other Internal Risk Factors 30 15

Risks to consider Compliance with Regulatory Requirements Reputational Damage Information Leakage Loss of Intellectual Property Malware Attacks Copyright Infringement Privacy Breaches SANS 2012 Report 31 The Cloud Borderless Technology Environment Cloud based apps Mobile Workforce Web Apps VoIP 32 16

Gartner Report Cloud Adoption Growing In 2016 Cloud will increase to become the bulk of new IT spend A defining year for cloud o Private cloud begins to give way to hybrid cloud o Nearly half of large enterprises will have hybrid cloud deployments by the end of 2017 33 The IT Landscape Has Dramatically Shifted Everyone is on the road and connected everywhere Your data is moving to Cloud Applications Mobile Devices / BYOD are always on and rarely controlled The Internet of Things Is becoming real 34 Security should be moved to the edge of the Internet 34 17

It is too complex, expensive and slow to stack appliances at every Internet gateway 28 PAC File 1 Web Filter Sandbox SSL Aggregation firewall 2 27 SSL Client - side SSL tunnel Load balancers 26 10 3 15, 16 SSL Server side SSL tunnel Flow management 11 Content Inspection Edge firewall Log files Source: Global 1000 network security diagram, August 2014 Expensive to purchase and to operate, complexity introduces security gaps 35 The Hybrid Cloud Challenge Standards are still in flux Building now and adding security later is NOT a plan On prem deployments and cloud deployments require distinctly different security strategies Identity is the new perimeter 36 18

10/15/2015 Information Week s Cloud Security and Risk Survey states 75% of those using public cloud services have engaged SaaS providers, up from 66% in our June 2012 survey. 35% using or considering cloud runs or will run at least one mission critical application with a public provider, and 24% allow or will allow some sensitive data to reside in the cloud. 53% of those using or considering cloud services classify their organizations as very or somewhat risk averse. 37 Secure in the Cloud? Clients are STILL responsible for the privacy of their data regardless of where it is held. Clearly understand the security the Cloud providers have deployed and request documentation. 38 19

The Staffing Challenge October 15 39 Redefining the Problem Current Cyber Security Technologies AETs are increasing Enemies are well funded Internal staffing challenge Borderless Technology Environment Board of Directors Must Engage 40 20

10/15/2015 Clarifying the Problem Statement CHALLENGES: 1. Developing methodologies to better understand your client s attack surface. 2. Shifting from reactive to proactive planning. 3. Impact of cyber security on the entirety of business. Theory Practice 41 Summary & Key Takeaways 42 21

Finding a Unified Solution Inside your own organization jointly identify common security gaps: During Before After 43 The Full Cycle: Where are the gaps? POLICY FORENSICS BASED PROTECTION RISK ASSESSMENT HOST & SERVER BASED AGENTS PERIMETER SECURITY NETWORK SECURITY 44 22

SUGGESTED OBJECTIVES TO ADOPT IN PRACTICE 1. Identify blind spots of your client s current security posture and the security solutions in the marketplace. 2. Pinpoint areas of breach s impact on the business. 3. Articulate security life cycles and their impact to business owners. 45 Where Do We Go From Here? Some Practical Thoughts 1. Enterprise Security Architecture Review 2. Technical Vulnerability Assessment 3. Understanding Your Cloud Infrastructure 4. Develop Prioritized Remediation Plan 5. Continuous Monitoring 24x7 6. Update and Adjust Security Policy Regularly 7. Incident Response Plan 8. User Awareness Training 46 23

Thank You 47 24