Cyber Security: Protecting your business from attack

Similar documents
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Online Banking. Internet of Things

GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS

IT Support n n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

One Goal. 18-Months. Unlimited Opportunities.

leasing Solutions We make your Business our Business

ELearning courses Competition / Antitrust

WILLIS FORTUNE 1000 CYBER DISCLOSURE REPORT

Agency Relationship Optimizer

Trustwave Leverages OEM Partnerships to Deepen SIEM Market Penetration

M.A. INTERNATIONAL RELATIONS AND DEVELOPMENT POLICY

Professional Networking

PKI Forum Endorsements

Domain 1 - Describe Cisco VoIP Implementations

Harnessing Natural and Human Capital

A Guide to Better Postal Services Procurement. A GUIDE TO better POSTAL SERVICES PROCUREMENT

Making training work for your business

CCH Accountants Starter Pack

Patentability of Computer Software and Business Methods

Faculty of Engineering Technology

Art & Private Client insurance policy SUMMARY OF COVER

Information about Bankruptcy

France caters to innovative companies and offers the best research tax credit in Europe

Skytron Asset Manager

client communication

Corporate Corporate Profile

Advancement FORUM. CULTIVATING LEADERS IN CASE MANAGEMENT

PRICE BAILEY CHARITIES & NOT FOR PROFIT THE RIGHT ADVICE FOR LIFE

Journal Advertisements Examples

FPO. A global telecom s strategy. for Canada

Practice Problems for Test 3

optimise your investment in Microsoft technology. Microsoft Consulting Services from CIBER

HEALTH AND SAFETY TRAINING Protecting people, reducing costs

IT Management Options. Security Redefined. Flexible Offerings. Peace of Mind

summary of cover CONTRACT WORKS INSURANCE

The personal and the political in social psychology.

FortiGuard Fortinet s Global Security Research and Protection

Anti-Money Laundering

Andrew M. Mintzer, CPA

FOCUS 2015 PATHWAYS EXTRAORDINARY EXPERIENCES COMMUNITY CONNECTIONS OPERATIONAL EXCELLENCE STRATEGIC PLAN. INSPIRE n TRANSFORM n CONNECT

The Big Picture: An Introduction to Data Warehousing

Diploma in Secretarial Administration

Mark Doherty, DMD, MPH, CCHP Executive Director of DentaQuest Institute s Safety Net Solutions Program

CCH Accounts Production

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

I apply to subscribe for a Stocks & Shares ISA for the tax year 20 /20 and each subsequent year until further notice.

Smart Connected Products & The Internet of Things

Balancing Privacy, Public Safety and Network Security Concerns Under the USA PATRIOT Act of 2001 By Mark A. Rush and Lucas G.

Baan Service Master Data Management

CCH Document Management

National training survey 2014

Commercial Real Estate Women Network

For customers Key features of the Guaranteed Pension Annuity

Inland American s Exit

Bristol Business School. The Bristol MBA. Full-time and Executive programmes

Catalysing the Venture Capital Market in Italy

Credit Suisse Healthcare Conference

How to use what you OWN to reduce what you OWE

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

My first gold holdings. My first bank. Simple. Transparent. Individual. Our investment solutions for clients abroad.

Configuring Additional Active Directory Server Roles

One-sample test of proportions

TONEX Global Training Courses & Seminars. Customization is Our Secret. Wireless Communication n. Business Management n

CCH Practice Management

Willamette Law. Opportunity Excellence. Success. Degree Programs. Partnership Programs

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Benefits of CRM Going Social

1 Computing the Standard Deviation of Sample Means

How do we Police Cyber Crime?

Tackling Cyber Crime in the UK. Andy Archibald Deputy Director National Cyber Crime Unit

Re-/Insurance impact due to power blackout Physical and non-physical BI / CBI events

In partnership with. temporary shelters and weather protection systems

How to Build More Successful Strategic Supplier Relationships

e-trader user guide Introduction

Description of Family Satisfaction toward Information Technology Based Family Nursing

Ideate, Inc. Training Solutions to Give you the Leading Edge

FM4 CREDIT AND BORROWING

INVESTING IN SOCIAL CHANGE TOOLS FOR SOCIAL INNOVATION

ni.com/sdr Software Defined Radio

Total Program Management for High-Tech

The Canadian Council of Professional Engineers

How to read A Mutual Fund shareholder report

Is there employment discrimination against the disabled? Melanie K Jones i. University of Wales, Swansea

Voluntary Life and AD&D Insurance

Putting Cloud security in perspective

Engineering Data Management

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS

Five Effective Testing Practices to Assure Meaningful Use of Electronic Health Records

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Get advice now. Are you worried about your mortgage? New edition

Supply Chain Management

What is IT Governance?

I apply to subscribe for a Stocks & Shares NISA for the tax year 2015/2016 and each subsequent year until further notice.

Improving corporate functions using shared services

loud Some of the most significant changes in information Choose Power Computing and the By Rob Bristow, Ted Dodds, Richard Northam, and Leo Plugge


Best of security and convenience

SOCIAL MEDIA. Keep the conversations going

Software Engineering Guest Lecture, University of Toronto

Transcription:

Cyber Security: Protectig your busiess from attack Breakfast Busiess Semiars, Autum 2015 Wedesday 14 October 2015

Build your busiess with our Autum semiars Wedesday 14 October: Cyber Security Wedesday 11 November: Social Media crafieldtechologypark.co.uk

Phil Cobley Regioal Cyber Protect Coordiator ERSOU (East Regio Special Operatios Uit) Cyber Security

Cyber Security ad Cyber Crimiality: The Facts Sergeat Phil Cobley Regioal Cyber Crime Uit

What we shall discuss What is Cyber Crime? What are the curret threats? What is the capability of local ad regioal Cyber Crime Ivestigatios? What support is out there to assist? Cyber Essetials Scheme Iovatio Voucher Scheme CiSP ad How you ca cotribute

Firstly who is this guy?! 10 years experiece i the Police Was previously the Digital Foresics Maager ad Cyber Crime Ivestigatios Maager at Bedfordshire Police Now the Regioal Cyber Protect Coordiator Qualified Digital Foresics Practitioer ad Network Ivestigator Curretly studyig BSc Software Developmet Force Practitioer Lead o Cybercrime Guest Lecturer at Uiversity of Bedfordshire o Cyber Crime Sit o the Natioal ISO 17025 Stadards Expert Network Published i the law Joural Cyber Security Law & Practice Co-authored the recetly released ebook produced by the NCCR A Practical Guide to Copig with Cyberstalkig

What is Cyber Crime?

Cyber crime IS crime The adopted defiitio of Cyber Crime is: Cyber Depedet Crimes, where a digital system is the target as well as the meas of attack. These iclude attacks o computer systems to disrupt IT ifrastructure, ad stealig data over a etwork usig malware (the purpose of the data theft is usually to commit further crime). Cyber Eabled Crimes. Existig crimes that have bee trasformed i scale or form by their use of the Iteret. The growth of the Iteret has allowed these crimes to be carried out o a idustrial scale. The use of the Iteret to facilitate drug dealig, people smugglig ad may other 'traditioal' crime types.

Thik Digital

Thik Digital

Which of these is a cyber threat? Commo house hold smart goods are ow beig hacked ad used i Spam ad DDOS activity

Is it really such a big deal?

We live our lives olie 3b people will be usig the iteret worldwide by 2016 ad by the ed of the year, etworked devices will outumber people by six to oe O average each household has 3 iteret eabled devices ad 2/5 adults have smart phoes 8% of GDP geerated through the iteret ecoomy 121b i 2010 with Household aual retail sales worth 2.6b with 30% year o year growth

Estimated cost of Cyber Crime 27billio 2% GDP (Detica 2011) 21 billio to busiess 2.2 billio to govermet 3.1 billio to Jo Public 44m cyber attacks i 2011 i UK Natioal Security Strategy Tier 1 threat

Crime Survey for Eglad & Wales 2012 Oe i three adults suffered olie crime i the previous 12 moths Oe i five suffered offlie crime Federatio of Small Busiess (21/05/12) 41% of members suffered cyber crime I the last 12 moths cost of 800m 20% had take o steps to protect themselves

Regioal & Local Capabilities withi Law Eforcemet

Natioal Regioal Orgaised Crime Uits (ROCUs) (NEROCU) (TITAN) (ODYSSEY) (EMSOU) (ERSOU) (TARIAN) (WMROCU) (Lodo ROCU) (SEROCU) (ZEPHYR)

Natioal Structure Natioal/ Iteratioal NCA Cross Border Regioal Orgaised Crime Uits (ERSOU) First Respoders & Local Ivestigatios Local Forces (Beds, Herts, Cambs, Norfolk, Suffolk & Essex)

Some Examples Local Ivestigatio: SME Isider Threat Data deletio / Website Defaced / Malicious Trasactios Regioal Ivestigatio: Large Corporatio 14m worth of data extracted over several moths Multiple offeders across several regios workig as a gag Numerous attack vectors

Ask yourself Do you kow the value of your data? Reputatioal Damage/IP/Trust what if these were effected? Do you kow where you data is stored? Who has access to your data? Do you have backups? Do you really kow your employees? Do you have suitable busiess cotiuity ad disaster recovery i place? What would you do if you lost all your data toight? Do you kow what your resposibilities are if you have a data breach?

What support is out there?

Resources Get Safe Olie

Resources Cyber Streetwise

Resources CESG 10 Steps

Resources Cyber Essetials

Iovatio Vouchers https://iteract.iovateuk.org/competitio-display-page/-/asset_publisher/rqet2akmebhi/cotet/cyber-securityiovatio-vouchers-roud-13#

CiSP Cyber Iformatio Sharig Partership

CiSP Cyber Iformatio Sharig Partership What is the Cyber-security Iformatio Sharig Partership (CiSP)? CiSP is a joit idustry ad govermet scheme based i CERT-UK. CiSP is a olie social etworkig tool ad eables its members to exchage iformatio o threats ad vulerabilities as they occur i real time.

Basic steps to stay i cotrol

What we discussed What is Cyber Crime? What are the curret threats? What is the capability of local ad regioal Cyber Crime Ivestigatios? What support is out there to assist? Cyber Essetials Scheme Iovatio Voucher Scheme CiSP ad How you ca cotribute

Questios? Thak you for comig! Sergeat Phil Cobley Regioal Cyber Protect Coordiator Easter Regio Cyber Crime Uit ERSOU phil.cobley@ersou.p.police.uk

Autum Semiars 2015 crafieldtechologypark.co.uk ifo@crafieldtechologypark.co.uk