Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor



Similar documents
Cybercrime Security Risks and Challenges Facing Business

Uncover security risks on your enterprise network

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Practical Steps To Securing Process Control Networks

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber Security Strategy

Content Security: Protect Your Network with Five Must-Haves

National Cyber Security Policy -2013

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Lessons from Defending Cyberspace

Security Threats on National Defense ICT based on IoT

TUSKEGEE CYBER SECURITY PATH FORWARD

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Defending Against Data Beaches: Internal Controls for Cybersecurity

What legal aspects are needed to address specific ICT related issues?

How-To Guide: Cyber Security. Content Provided by

Transformational Smart Cities: cyber security and resilience

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Cloud Services Prevent Zero-day and Targeted Attacks

Cybersecurity and internal audit. August 15, 2014

Breaking the Cyber Attack Lifecycle

Qatar Computer Emergency Team

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

DOBUS And SBL Cloud Services Brochure

Getting real about cyber threats: where are you headed?

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Fostering Incident Response and Digital Forensics Research

Unknown threats in Sweden. Study publication August 27, 2014

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Microsoft s cybersecurity commitment

Promoting a cyber security culture and demand compliance with minimum security standards;

Data Driven Assessment of Cyber Risk:

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

A HELPING HAND TO PROTECT YOUR REPUTATION

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

2012 Endpoint Security Best Practices Survey

KEY STEPS FOLLOWING A DATA BREACH

Defending Against Cyber Attacks with SessionLevel Network Security

Cisco IPS Tuning Overview

Perspectives on Cybersecurity in Healthcare June 2015

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Zak Khan Director, Advanced Cyber Defence

IBM Security Strategy

the challenge our mission our advisors

Advanced Threat Protection with Dell SecureWorks Security Services

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

NATIONAL CYBER SECURITY AWARENESS MONTH

Nokia Networks. security you can rely on

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

10 Smart Ideas for. Keeping Data Safe. From Hackers

External Supplier Control Requirements

Threat Landscape. Threat Landscape. Israel 2013

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Research Topics in the National Cyber Security Research Agenda

Gaining the upper hand in today s cyber security battle

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

The Symantec Approach to Defeating Advanced Threats

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Cyber security Building confidence in your digital future

Cyber security trends & strategy for business (digital?)

Protecting the Infrastructure: Symantec Web Gateway

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Cisco Advanced Malware Protection

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Transcription:

Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates Theft of Information, IP* Insiders Sabotage, Cyber warfare/collateral Competition *IP: Intellectual Property

Reconnaissance Announce the campaign, schedule Identify targets and vulnerabilities Weaponize Select the tools and create malicious packages Launch of the attack Advertise on social media, online forums Deliver Disrupt the services by DDoS Deliver malicious email, infected USBstick, picture, video, pdf file, link Exploit/Install Provide tools Hire attackers Intrusion via vulnerable services Exploit backdoors, the environment Command and control Remote control vulnerable systems Spread infections to other systems, network, hide malware, erase tracks, download modules, upload files

Cyber resilience: The organization's capability to withstand: negative impacts due to known, predictable, unknown, unpredictable, uncertain and unexpected threats from activities in cyberspace (Information Security Forum) cyber events, measured by the combination of mean time to failure and mean time to recovery (World Economic Forum)

Governance Risk Management Smart grid and critical infrastructure security Intelligent transportation security Protecting e-healthcare Maintaining public safety and security Securing communications infra. and hotspots Centralized Cyber protection of the smart city

Information Security is serious, organizations need visibility on protection mechanisms and RISKS Organizations are subject to cyber risks, and threat actors are after sensitive information Organizations need to: understand the risk posture wherever information is, including when located at third parties evidence based trust relationship care about the status of information even when outsourced to a third party

Early knowledge of threats and impacts Mapping of risks to controls is a preliminary task prior to assessments Thr1 Thr2 Thr3 etc Ri(1 n) Ri(1 n) Ri(1 n) Ctrl(1 n)(exp Ri(1 n) ) Ctrl(1 n)(exp Ri(1 n) ) Ctrl(1 n)(exp Ri(1 n) )

Threat Intelligence Risk Management Aggregated Risks Categories Risks Indicators Adverse Events Indicators Threat Attempt Events Event Log/Journals Records Sources Organizations Threat Activity Sources

Outsourcing services Outsourcing sensitive information processing Binding contractual agreement Security and Data Protection clauses enough? How to protect against non-materialistic damages? Minimize damage control costs? How to protect reputation? Criteria Localization of data Size of the outsourcing vendor Maturity level of the vendor Any engagement with another sub-processor Extend Specific Risk Indicators in Contractual Security Schedule

If Medium or High Risks Go to RA+BIA Then select Security Schedule If Low Risks Go to Standard Security Schedule Low Medium High Start Preassessment Integrate the Sourcing Process

Technology and security trends

Human/Data Use/Analytics Sensors Embedded Security/ Privacy Protection Big Data Cloud Infrastructure Security

Adoption levels Data Exposure Risks Many to One One to One One to Many (ecomm ) Many to Many: P2P P2O O2O M2M (ucomm..) Neuro Machines? Cyborgs? Body embedded ICT Data Privacy Before Now Tomorrow

Key elements for security inclusion Interoperability framework Security by design Upgradeable security Interfaces for Wearable security: electronic interfacing designs Updateable Risk Information Using hyperconnectvity for R/T risk indicators updates

Now Telecom E-Commerce Cybercrime Coming CIIP IPP

«Even Achilles was only as strong as his heel» Malike Bouaoud Cyber Security Advisor Office of H.E. The Minister of ICT Ministry of Information Communication Technology, ictqatar E-mail: mbouaoud@ict.gov.qa