Cyber Security Trends & Awareness. Christian Van Heurck Coordinator CERT.be

Similar documents
Cybercrime in Belgium

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

Achieving Global Cyber Security Through Collaboration

CYBER SECURITY THREAT REPORT Q1

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Cyber-Security. FAS Annual Conference September 12, 2014

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Westcon Presentation on Security Innovation, Opportunity, and Compromise

One Minute in Cyber Security

Towards closer EU-ASEAN collaboration in cybersecurity

Security Intelligence

Cybersecurity in the Commonwealth: Setting the Stage

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Top Ten Cyber Threats

THE HUMAN COMPONENT OF CYBER SECURITY

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

Protect Yourself in the Cloud Age

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Is security awareness a waste of time?

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

Why a single source for assets should be. the backbone of all your digital activities

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

SPEAR-PHISHING ATTACKS

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

SDP Hackathon #4 Analysis & Report

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Cyber Security An Exercise in Predicting the Future

The Onslaught of Cyber Security Threats and What that Means to You

Cyber Security Risks for Banking Institutions.

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

Presented by Evan Sylvester, CISSP

Promoting a cyber security culture and demand compliance with minimum security standards;

Top Fraud Trends Facing Financial Institutions

PENETRATION TESTING GUIDE. 1

A COMPLETE APPROACH TO SECURITY


Pacific Islands Telecommunications Association

Office 365 Adoption & Risk Report

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Moving Beyond User Names & Passwords

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

White Paper. Five Steps to Firewall Planning and Design

Cyber security: Are consumer companies up to the challenge?

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

A NEW APPROACH TO CYBER SECURITY

Cyber Threat Intelligence: Has to Be a Better Way

The Importance of Patching Non-Microsoft Applications

IBM Security Strategy

Certified Cyber Security Analyst VS-1160

Ty Miller. Director, Threat Intelligence Pty Ltd

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Security and Privacy

Overview TECHIS Carry out security testing activities

Jim Bray, Cyber Security Adviser InfoSight, Inc.

Cybersecurity. Are you prepared?

The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats

Full year results. Corero Network Security plc, the AIM network security company, announces its audited results for the year ended 31 December 2014.

MECOMS Customer Care & Billing As A Service

Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell

Cloud Adoption Practices & Priorities Survey Report

A Primer on Cyber Threat Intelligence

User Documentation Web Traffic Security. University of Stavanger

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Transcription:

Cyber Security Trends & Awareness Christian Van Heurck Coordinator

Goal 2

Goal Numbers Threats & Trends Awareness 3

Bottom line 2 awareness 4

What is? 5

What is? a service of operated by 6

to help Belgian key resources, cri7cal informa7on providers and the Belgian public protect their IT- infrastructure by: providing informa/on on incidents, helping them to handle incidents, coordina/ng the response to major incidents, helping them develop their own CSIRT ac7vi7es, sharing data and knowledge. 7

Focus on helping! 8

Dealing with crime 9

What does do? 10

What does do? Brochure: hdps://www.cert.be/pro/files/brochure_fra.pdf hdps://www.cert.be/pro/files/brochure_ndl.pdf hdps://www.cert.be/pro/files/brochure_eng.pdf Flyer: hdps://www.cert.be/pro/files/onepager_fra.pdf hdps://www.cert.be/pro/files/onepager_ndl.pdf hdps://www.cert.be/pro/files/onepager_eng.pdf 11

Services Website: https://www.cert.be 12

Services Twitter en Delicious links: https://delicious.com/certbe https://twitter.com/cert.be 13

assets experts interna7onal network of trusted partners na7onal partners agility neutrality confiden7ality keyrole in.be cyberspace 14

Evolution of number of incidents 6000 4500 3000 1500 2009 2010 2011 2012 0 15

Evolution of number of incidents 16

Evolution of number of incidents 17

Evolution of number of incidents 18

Types of incidents in 2012 multiple 0,1% other 3,0% scans 26,1% system2incidents 24,1% vulnerability2reporting 0,7% worms2&2viruses 4,6% phishing 14,7% stolen2accounts 5,2% queries 4,3% SPAM2related 14,8% DoS2attacks 2,4% 19

Types of cyber threats cyber security cyber crime others 20

Bottom line 1 cyber security & cyber crime are a growing problem of our society 21

Bottom line 2 awareness 22

Aimed towards the Belgian popula/on also has the task to provide the Belgian popula7on with informa7on on computer security. This way everybody stays informed about threats and we provide 7ps to get online safely. 23

24

25

26

27

28

29

30

Trends lack of awareness 31

Trends cyber security cyber crime others 32

Trends cyber security & cyber crime are a growing problem of our society 33

Trends 34

Trends Sophistication increases Mobile usage increases Digital trust is important Tools are not enough The internet of things Snowden 35

Trends Cloud Always online & Big data Weakest link Insider All of the old stuff is still there Hacktivism DDoS 36

Trends Legal obligations Lack of skills / experience Not enough reporting Not enough sharing It all happens in Belgium too We need more exercices 37

Trends Accounts compromised Sony 77 million from PlayStation Network 25 million from Sony Online Entertainment Estimated cost: $1 billion in investigation Average estimated cost: $214 per lost record! CISCO estimates the pay-off for spear phishing attacks to 80 000$ 40 more time than mass attacks Source: Communication of the ACM November 2011 38

Anno 2013 39

Anno 2013 40

Anno 2013 41

Anno 2013 42

Anno 2013 43

Anno 2013 44

Anno 2013 45

Anno 2013 46

Trends 47

Anno 2013 Apple Microsoft Dropbox Belgacom 48

Trends 49

Trends 50

TLP 51

Trends 52

Trends 53

Trends 54

Trends 55

Conclusion It s ge=ng worse 56

Conclusion Over here in Belgium too 57

Conclusion smarter defence 58

Trends lack of awareness 59

Trends Report your incidents 60

Q&A report an incident: informa/on: press: website: rss feeds: newsleder: twider: awareness: cert@cert.be info@cert.be press@cert.be hdps://www.cert.be/pro hdps://www.cert.be/pro/syndica/on hdps://www.cert.be/pro/newsleder hdps://twider.com/certbe hdps://www.safeonweb.be KBC meeting 61