Risk Management in Global Operating Industry



Similar documents
Cybersecurity: Is Your Company Prepared?

Innovative Approaches to Enhance Digital Security

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst


Into the cybersecurity breach

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Perspectives on Cybersecurity in Healthcare June 2015

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Getting real about cyber threats: where are you headed?

Breaking the Cyber Attack Lifecycle

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

OCIE Technology Controls Program

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

SPEAR PHISHING UNDERSTANDING THE THREAT

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

10 Smart Ideas for. Keeping Data Safe. From Hackers

Managing Cyber Risk through Insurance

Small businesses: What you need to know about cyber security

Defending Against Cyber Attacks with SessionLevel Network Security

Cybersecurity The role of Internal Audit

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

WRITTEN TESTIMONY OF

Presented By: Corporate Security Information Security Treasury Management

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

idata Improving Defences Against Targeted Attack

Advanced Threat Protection with Dell SecureWorks Security Services

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cybercrime: risks, penalties and prevention

Fighting Advanced Threats

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

LIGC-ACC Presentation November 9, 2015

Cybersecurity and internal audit. August 15, 2014

Who s Doing the Hacking?

IBM Security re-defines enterprise endpoint protection against advanced malware

NATIONAL CYBER SECURITY AWARENESS MONTH

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

A NEW APPROACH TO CYBER SECURITY

Cyber security Building confidence in your digital future

Practical Steps To Securing Process Control Networks

Cyber Risks in Italian market

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cybersecurity Awareness. Part 1

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Gaining the upper hand in today s cyber security battle

Incident Response. Proactive Incident Management. Sean Curran Director

Cyber Security for audit committees

Teradata and Protegrity High-Value Protection for High-Value Data

Microsoft s cybersecurity commitment

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Data Breach Lessons Learned. June 11, 2015

How do we Police Cyber Crime?

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Security and Privacy

The Cancer Running Through IT Cybercrime and Information Security

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Anti-exploit tools: The next wave of enterprise security

Cyber Security Metrics Dashboards & Analytics

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Flipping the Script: Law Firms Hunted by Cybercriminals

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

A Cyber Security Integrator s perspective and approach

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Internet threats: steps to security for your small business

Managing cyber risks with insurance

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

How-To Guide: Cyber Security. Content Provided by

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Cyber Insurance Presentation

Assuring Application Security: Deploying Code that Keeps Data Safe

The Cyber Threat Profiler

FACT SHEET: Ransomware and HIPAA

Brainloop Cloud Security

Small businesses: What you need to know about cyber security

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

AANVAL INDUSTRY FOCUS SOLUTIONS BRIEF. Aanval for Financial Services

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Transcription:

Risk Management in Global Operating Industry World Financial Symposium 2015

Here is the News Saleema Brohi Aviation Legal Expert Session Sponsor World Financial Symposium 2015

Cyber Attack! - Beyond Firewalls Moderator: Saleema Brohi, Aviation Legal Expert Panelists: James Hatch, Director, Cyber Services, BAE Systems Applied Intelligence Elizabeth Petrie, Director Strategic Intelligence Analysis, Citi - Information Protection Directorate Philipp Amann, Senior Strategic Analyst, Cyber-crime Unit, Europol Kristian Gjerding, CEO, CellPoint Mobile Jeffrey Sirr, Head of CIP North America, Munich Reinsurance Session Sponsor World Financial Symposium 2015

Cyber Attack! Beyond Firewalls James Hatch Director, Cyber Services BAE Systems Applied Intelligence Session Sponsor World Financial Symposium 2015

Applied Intelligence BAE SYSTEMS BUSINESSES Defence platforms and services Cyber and intelligence Electronic systems Copyright 2015 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems Plc 5

Internet Applied Intelligence RISKS TO REVENUE AND DATA SYSTEMS Back office Suppliers Travel providers Public Ticketing Reservation Ground Systems Airplanes Attackers: Make money Promote a cause Disrupt a country Business interruption Financial fraud Loss of data Operational impacts Lost revenue Liability costs Reputation Remediation Copyright 2015 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems Plc 6

Applied Intelligence CHALLENGES TO ACHIEVING CYBER SECURITY Labour intensive Scarce resources BEING EFFICIENT Swamped in data Automation and integration Asymmetric threat Situational awareness EFFECTIVE AGAINST REAL THREATS Changing threat Compliance is not security Trap of risk acceptance Achieving coverage IMPLEMENTING CONTROLS Funding and prioritisation Project execution Suppliers and processors Legacy systems and data KNOWING YOUR ESTATE Shadow IT and BYOD Weak architecture and change Copyright 2015 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems Plc 7

Applied Intelligence ORGANISATIONS NEED TO SHOW THAT THEY Are clear who is responsible Understand their cyber risk Make active decisions on risk Business interruption Financial fraud Loss of data Operational impacts How big is our risk? What type is it? Do we care? Plan for resilience Support strategic priorities Avoid Reduce Share inc insurance Retain Copyright 2015 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems Plc 8

Cyber Attack! Beyond Firewalls Elizabeth Petrie Director Strategic Intelligence Analysis Citi - Information Protection Directorate Session Sponsor World Financial Symposium 2015

16 September 2015 CYBER THREAT LANDSCAPE: A FINANCIAL INSTITUTION S PERSPECTIVE 2015 IATA World Financial Symposium

The Changing Information Security Threat Landscape The cyber threat landscape continues to evolve as better organized and more sophisticated attackers have emerged. Increasing Sophistication Individual players Opportunistic and casual Driven by desire to prove they can Organized collectives, criminal enterprises, and nation states Typically coordinated and well funded Driven by the opportunity for geopolitical and financial gain Typically still individual players Adversaries increasingly focused on disruption and Premeditated and planned actions destruction Driven by desire for financial gain Evolving Threats An Illustration of the Information Security Challenge Speed of Attack Target of Attack Value of Information Complexity of Business Model Sophistication of Techniques Availability of Tools Past Non real-time theft of passwords and confidential information Typically targets of opportunity Very variable -hard to monetize without exposing the malicious actor Workforce primarily based in same geography as business and on payroll Moderately sophisticated adversaries seeking to exploit well known vulnerabilities Custom tools created by knowledgeable individuals to perform a specific attack Present Real time compromises of computers, servers, mobile devices and their associated communication channels Highly-targeted victims for their access to the most sensitive information Readily monetized in a sophisticated, secure, and anonymous underground economy Complex underground marketplace with sophisticated specialists; overlap of actors and infrastructure Highly sophisticated supply chain to create or detect vulnerabilities and exploit tools Malicious tools are commodity items readily available on the black market; overlap of tool usage among actors

Cyber Attacks Common Tactics and Impacts on Business Cyber Attack is an attempt by online criminals to access or damage a computer network/system often stealing data or money, and using both technical and non-technical methods. Common Attack Methods Impact on Business Human Effect Social Engineering Relying on human interaction to trick people into breaking security procedures and sharing useful information for exploit efforts Technology Malware Software tools that enable an unauthorized user to gain control of a computer system and gather sensitive information US $116BN $445 Billion Estimated global cost of cybercrime as of February 2015 1 $242 Billion Combined cost to top four global economies 2 China $71BN Japan $0.93BN Germany $54BN Cyber Masquerading Taking over executive account to conduct cyber espionage or complete financial transaction Human + Technology Phishing Emails or online posts that masquerade as a trustworthy party in an attempt to trick the target into divulging information or downloading malware United States Germany Russia All others $203BN Average annualized cost of cybercrime to companies in 2014 3 $1.8 M $6.8 M $12.7 M 1. Computer Weekly; Cyber crime is a threat to global economy, says researcher ; February 2015. 2. McAfee; Net Losses: Estimating the Global Cost of Cybercrime ; June 2014. 3. Ponemon Institute; 2014 Global Report on the Cost of Cyber crime ; October 2014. 13

Cyber Threat Trends Against Treasury Functions and Assets Cyber attackers are increasingly targeting financial functions to steal money and sensitive data. The biggest threat is the combined type of attacks using various tactics. Trends in Cyber Crime Multi-vector attacks Targeted victims Sophisticated tools Common Manifestation against Financial Centers Attacks against treasurers are delivered in multiple phases, Using Email, Social Media, unsecure Mobile/Personal devices to log into corporate assets. Caller pretends to be bank s fraud team or Microsoft Help. Victim reveals sensitive information or even allows screen sharing on their machine leading to exploitation and fraud. New malware programmers are using sophisticated methods that evade Anti- Virus solutions. Banking malware now features file stealing capabilities. Indirect attacks Attacker targets third-party vendors in order to access sensitive financial center data/systems and steal data/money. New players: Organized Crime Blackmail and Extortion schemes, Data stealing, and even Drug and Human Smuggling is being aided by cyber crime services. Persistence and long-term outlook Advanced tools are added to infected machines to steal valuable intellectual property.

Why is Cybersecurity Important to Financial Treasury Functions? is at the nexus of a company s financial flows. Key Risk Areas Suppliers Information Security and Technology Internal Interactions Banks Financial Centers and Flows Vendor performing Financial Outsource Function Other Parts of the Corporation Human Factors Insider Fraud Access to sensitive data Changing bank details Technology/Process Factors Data privacy and sensitive data restrictions Connectivity interacting with banking system Exploitation of security weaknesses in other areas

Understanding the Anatomy of a Cyber Attack Attackers use a wide variety of tactics, techniques, and procedures to accomplish successful cyber attacks. Targeting and Compromi se Lateral Movement s Persistenc e Exploratio n Exfiltration Cover Tracks Examples Hacker targets Treasurer based on the LinkedIn update and then compromises the LinkedIn account via password guessing Hacker conducts reconnaissance and makes connections with all associates holding a Treasurer title linked to that account By using malware to compromise email accounts, the Hacker ensures that they have a foothold into the victim, even if the LinkedIn compromise is discovered Attacker conducts lengthy research of the victim network, including decryption of data throughout the compromised networks Attacker removes data from the victim network (e.g. using of encryption) to make it difficult for stolen data to be identified Attacker destroys artifacts and evidence of their intrusion All cyber actors do not fully complete the entire Anatomy of a Cyber Attack, as their objective may be achieved early in the attack process.

A Multi-Layered and Comprehensive Approach to Security Treasurers may further enhance cybersecurity programs by leveraging bank best practices for internal and external interactions. Risk Mitigation Suppliers 1 2 7 Banks 1 2 7 1 Financial Centers and Flows 2 Vendor performing Treasury Outsource Function 5 1. Data Protection: Sensitive information must always be protected 2. Third-Party Information Security Assessment: Ensure third-party vendors have the appropriate security controls in place when handling sensitive data 3. Privileged User Managed Access: Implement controls around access to production environments, networks and other environments with sensitive data 4. Security Incident Management: Know what to do in the event of an actual or potential compromise 6 3 3 4 Information Security and Technology 5 4 Other Parts of the Corporation 5 6 5. Vulnerability Assessment: Perform tests on applications and infrastructure assets to proactively identify and remediate potential weaknesses 6. Global ID Administration: Manage identification administration (e.g. ID creation, modification, and deletion, password resets) to help mitigate access management risks Internal Interactions 7. Big Data: Leverage data trends to monitor transactions

Role and Importance of Intelligence Intelligence must be an integral part of the decision making process. Intelligence is having the right information, at the right time, and in the hands of the right people. Intelligence Cycle Dissemination Requirements Analysis and Production Active Collaboration Planning and Direction Processing and Exploitation Collection Output/Deliverables Inform operational planning and strategic decision-making Inventory of intelligence resources Identification of resource gaps, recommendations for remediation Centralized mechanism for ad hoc intelligence data Regular, frequent updates to senior management and key business stakeholders (e.g. dashboard-type, high-level briefing report) Intelligence is embedded in the day-to-day work, from the establishment of a customer relationship to the execution of any service. Capturing and understanding the knowledge of employees is the foundation of a successful Intelligence Program Intelligence-sharing and knowledge-sharing (lessons learned, etc.)

Intelligence Involves Forward-Looking Insights To defeat the adversary we must network as strong as the adversary. Client Customer Trends Technology Evolution Threat Landscape Intelligence Government Regulatory Industry Trends Third-party Risk Intelligence is built from a mosaic cutting across various views to help identify emerging trends, make informed decisions and predict the next event. Intelligence has a short half-life. Security Activity + Intelligence Context = Defense Situational Awareness

IRS Circular 230 Disclosure: Citigroup Inc. and its affiliates do not provide tax or legal advise. Any discussion of tax matters in these materials (i) is not intended or written to be used, and cannot be used or relied upon, by you for the purpose of avoiding any tax penalties and (ii) may have been written in connection with the promotion or marketing of any transaction contemplated hereby ( Transaction ). Accordingly, you should seek advice based on your particular circumstances from an independent tax advisor. Any terms set forth herein are intended for discussion purposes only and are subject to the final terms as set forth in separate definitive written agreements. This presentation is not a commitment or firm offer and does not obligate us to enter into such a commitment, nor are we acting as a fiduciary to you. By accepting this presentation, subject to applicable law or regulation, you agree to keep confidential the information contained herein and the existence of and proposed terms for any Transaction. We are required to obtain, verify and record certain information that identifies each entity that enters into a formal business relationship with us. We will ask for your complete name, street address, and taxpayer ID number. We may also request corporate formation documents, or other forms of identification, to verify information provided. 2015 Citibank, N.A. All rights reserved. Citi and Citi and Arc Design are trademarks and service marks of Citigroup Inc. or its affiliates and are used and registered throughout the world.

Cyber Attack! - Beyond Firewalls Moderator: Saleema Brohi, Aviation Legal Expert Panelists: James Hatch, Director, Cyber Services, BAE Systems Applied Intelligence Elizabeth Petrie, Director Strategic Intelligence Analysis, Citi - Information Protection Directorate Philipp Amann, Senior Strategic Analyst, Cyber-crime Unit, Europol Kristian Gjerding, CEO, CellPoint Mobile Jeffrey Sirr, Head of CIP North America, Munich Reinsurance Session Sponsor World Financial Symposium 2015

Do you think Aviation is a risky business? IATA s Risk Management helps you control the risks and lets you sleep at night! > Visit the IATA Booth to learn more World Financial Symposium 2015

Networking Break World Financial Symposium 2015