Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist



Similar documents
Five keys to a more secure data environment

10 Smart Ideas for. Keeping Data Safe. From Hackers

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Defending Against Data Beaches: Internal Controls for Cybersecurity

External Supplier Control Requirements

Cybercrime: risks, penalties and prevention

Computer Security: Principles and Practice

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Cyber Security. John Leek Chief Strategist

OCR LEVEL 3 CAMBRIDGE TECHNICAL

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Cyber Security Strategy

SMALL BUSINESS PRESENTATION

I N T E L L I G E N C E A S S E S S M E N T

Information Security for the Rest of Us

State of Security Survey GLOBAL FINDINGS

Cybersecurity and internal audit. August 15, 2014

Cybersecurity Awareness. Part 1

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

F G F O A A N N U A L C O N F E R E N C E

RETHINKING CYBER SECURITY Changing the Business Conversation

Managing IT Security with Penetration Testing

The Business Case for Security Information Management

2012 Data Breach Investigations Report

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Introduction to Cyber Security / Information Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Defensible Strategy To. Cyber Incident Response

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

AUTOMATED PENETRATION TESTING PRODUCTS

INFORMATION SECURITY FOR YOUR AGENCY

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Information Security Policy

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

A practical guide to IT security

Better secure IT equipment and systems

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

Altius IT Policy Collection Compliance and Standards Matrix

Can We Become Resilient to Cyber Attacks?

Network Security and the Small Business

Information Technology Security Review April 16, 2012

SECURITY CONSIDERATIONS FOR LAW FIRMS

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

VENDOR MANAGEMENT. General Overview

Obtaining Enterprise Cybersituational

Practical Steps To Securing Process Control Networks

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Cybersecurity. Are you prepared?

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Four Top Emagined Security Services

New York State Department of Financial Services. Report on Cyber Security in the Banking Sector

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Are you prepared to be next? Invensys Cyber Security

Promoting Network Security (A Service Provider Perspective)

Cybersecurity: What CFO s Need to Know

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Cisco Security Optimization Service

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Nine Steps to Smart Security for Small Businesses

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

A Cyber Security Integrator s perspective and approach

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Guide to Vulnerability Management for Small Companies

Data Breaches and Cyber Risks

Board Portal Security: How to keep one step ahead in an ever-evolving game

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

September 20, 2013 Senior IT Examiner Gene Lilienthal

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Into the cybersecurity breach

Address C-level Cybersecurity issues to enable and secure Digital transformation

Transcription:

Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist

What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. Any Organization has the mandate to ensure the Availability, Confidentiality and the Integrity of all the systems that support their business processes. 2

Cyber crime What is it? Using the Internet/Computer device to commit a crime. Identity Theft, Hacking, Online Stalking, Stealing information and the list goes on. 3

The Current Landscape Focus on Kenya in the last one year SIM Swap Fraud (Telcos) The NIC Incident The NYS Saga.and many more that are not bold enough to open up 4

The Motivations What are hackers after Adventure/Ego/Challenge Business Disruptions Hacktivism (political reasons) Economic Reasons 5

Possible Avenues How most cyber crime is propagated Malware Denial-of-service (DoS) Phishing and Spam Social Engineering Identity Theft Drive-By-Downloads Potentially Unwanted Programs etc 6

What the future Holds Cybercrime can only get worse Internet growth Mobile adoption A surge in E-commerce Internet of Everything Corporate Espionage & Cyber Terrorism 7

The Net Effect Possible outcomes of cyber crime Reputation loss Intellectual property loss Legislative Breaches leading to legal actions Loss of customer confidence Business interruption costs Financial loss 8

Financial Implications Costs to the Organizations Costs in anticipation of cyber crime. Costs as a consequence of cyber crime:. Costs in response to cyber crime Indirect costs associated with cyber crime e.g. reputational loss 9

The Hurdles Challenges in Curbing Cyber Crime Wrong prioritization as a low risk in Business. Difficult to trace and un-earth (Anonymity of the internet). Shortage of Cyber-Security skillset Inadequate laws governing Cyber crime Jurisdictional issues 10

Way Forward Tangible steps in Curbing Cyber Crime Begin with a Risk Assessment in order to. Establish a Roadmap for the cyber security journey. Create a Baseline for compliance. Provide Due Diligence to all actors Finds the Weak Areas that need to be addressed 11

How to Identify the risks Holistic Approach Comprehensive reviews (infrastructure, server, application, etc.) Consider people and processes, as well as technology Documentation Create awareness to staff: with clear standards, policies and specific recommendations. Threat Modeling Identifying assets and Corresponding threats Perform qualitative (or quantitative) assessments of risk 12

Common Risk/Exposure Areas Policies & Procedures Access Control Patch Management Auditing and Logging Mis-Configured Systems & Applications Incident Handling Processes Disaster Recovery & Business Continuity 13

Security Policies & Awareness Policies communicate the Organizations Commitment to Security Provide a Baseline and Roadmap for Security Controls Define the Auditing and Logging Standards Policies are only as effective as they are communicated and enforced in an organization! Available Frameworks that can set us off in the creation of policies include.. ISO 27001 & SSAE 16 14

Access Control Defines who, how and what happens when users access systems. Helps deal with risks such as weak passwords, accounts sharing, inactive/idle accounts etc. Drives the use of more stricter controls and secure technologies Authorization, Authentication and Accounting Mechanisms (AAA), Two-Factor Authentication, complex passwords etc. 15

Patch Management There is a tendency that most software stays un updated. New software exploits and vulnerabilities are being released daily. A Properly defined patch management program needs to include: Strong and enforceable Patch Management procedures Automated Intrusion Prevention Mechanisms 16

Mis-Configured Systems Most Systems will be deployed with inherent loopholes/ default settings Possible best practices.. Avail only the needed or updated Services Protect/Hide your Wireless Networks Remove Default Settings and software configurations Tight Access controls at Firewall (allow only what is required)..and many more 17

Incident Handling Processes Even as the organizations strives to prevent cyber threats, they must be incident ready. Well defined incident procedures must outline. Intrusion Prevention/Detection Anti-malware Mechanisms Logging/Auditing (incident analysis) Strong Policies and Documentation 18

Disaster Recovery & Business Continuity Defines how to sustain operations in case of system failure. A matured Disaster Recovery & Business Continuity plan must have; Formal Plan Prioritized Systems Standard Backup procedures Tested Recovery mechanisms Redundant Systems 19

dwanjohi@safaricom.co.ke 20