Cybercrime in Belgium



Similar documents
Cyber Security Trends & Awareness. Christian Van Heurck Coordinator CERT.be

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Integra ng English language learning outcomes in higher educa on curricula Think Tank

Top Fraud Trends Facing Financial Institutions

Computer Forensics and Incident Response in the Cloud. Stephen Coty AlertLogic, AlertLogic_ACID

DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

The Onslaught of Cyber Security Threats and What that Means to You

Westcon Presentation on Security Innovation, Opportunity, and Compromise

A NEW APPROACH TO CYBER SECURITY

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Houston Department of Health and Human Services

Security and Privacy

The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

BT Assure Rethink the Risk

CYBER SECURITY THREAT REPORT Q1

Non-Geeks Guide to. Network Threat Prevention

NEW MEXICO STATE CHAPTER P.E.O. SISTERHOOD

IMPROVING NUTRITION SECURITY IN AFRICA

AMATEUR ATHLETIC UNION. Level 3 Club. Information Brochure

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber Security Risks for Banking Institutions.

How To Create An Insight Analysis For Cyber Security

Promoting a cyber security culture and demand compliance with minimum security standards;

Cybersecurity in the Commonwealth: Setting the Stage

Marble & MobileIron Mobile App Risk Mitigation

Protecting against cyber threats and security breaches

OCIE Technology Controls Program

Security Intelligence

A HELPING HAND TO PROTECT YOUR REPUTATION

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

CYBERSECURITY HOT TOPICS

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Internet Safety and Security: Strategies for Building an Internet Safety Wall

RETHINKING CYBER SECURITY Changing the Business Conversation

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cyber Security. John Leek Chief Strategist

Microsoft s cybersecurity commitment

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Cyber Risk to Help Shape Industry Trends in 2014

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

Group-IB. Stages of Sustainable Solid Development. Acquisition by Leta Group. Creation of CERT-GIB. International Expansion. Group-IB is founded

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Defending the Database Techniques and best practices

IBM Security Strategy

Workforce Development

Cyber Security for Railway Signalling

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Cyber intelligence exchange in business environment : a battle for trust and data

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

A strategic approach to fraud

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Don t Disappear! Pilots Bill of Rights 2. Civil Aviation Safety in Poland by Sylwia Książek. U.S. Customs Overseas Preclearance

Cyber-Security. FAS Annual Conference September 12, 2014

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

How can Cloud help your Security. Christophe Van Mollekot Solution Advisor Microsoft

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Security Intelligence Services. Cybersecurity training.

ERP Implementation Planning In Full Swing

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Protect Yourself in the Cloud Age

How To Ensure Cyber Security In The Czech Republic

See the goal. Chart the path. Lead the way. Execu ve Coaching

2012 CyberSecurity Watch Survey

Cyber Security Metrics Dashboards & Analytics

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Certified Cyber Security Analyst VS-1160

A COMPLETE APPROACH TO SECURITY

Selecting the right cybercrime-prevention solution

Internet threats: steps to security for your small business

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Transcription:

Cybercrime in Belgium anno 2013 Christian Van Heurck Coordinator Goal 2 1

Goal what is? what can we do? why report to? present threats anno 2013 raise awareness 3 Bottom line cyber security & cybercrime are a growing problem of our society 4 2

Bottom line we are LOSING the ba le 5 Bottom line awareness 6 3

What is? 7 What is? a service of operated by 8 4

What started it all? 9 What started? 10 5

Why Belnet? 11 Types of cyber threats cyber security cyber crime others 12 6

Focus on helping! 13 Dealing with crime 14 7

to help Belgian key resources, cri cal informa on providers and the Belgian public protect their IT- infrastructure by: providing informa on on incidents, helping them to handle incidents, coordina ng the response to major incidents, helping them develop their own CSIRT ac vi es, sharing data and knowledge. 15 What does do? Reactive (short term): Incident response & coordination Proactive (medium term): Raising awareness & inform Security Quality Management (long term): elevate the level of IT-security 16 8

What does do? 17 What does do? Brochure: h ps://www.cert.be/pro/files/brochure_fra.pdf h ps://www.cert.be/pro/files/brochure_ndl.pdf h ps://www.cert.be/pro/files/brochure_eng.pdf Flyer: h ps://www.cert.be/pro/files/onepager_fra.pdf h ps://www.cert.be/pro/files/onepager_ndl.pdf h ps://www.cert.be/pro/files/onepager_eng.pdf 18 9

Services Website: https://www.cert.be 19 Services Twitter en Delicious links: https://delicious.com/certbe https://twitter.com/cert.be 20 10

assets experts interna onal network of trusted partners na onal partners agility neutrality confiden ality keyrole in.be cyberspace 21 threats lack of funding s ll evolving dangerous expecta ons no appropriate legal status yet legal issues regarding sharing of PII lack of awareness 22 11

Team core team = 10 FTE: 5 Security Analysts 1 Communication Expert 1 Coordinator Belnet: Logistics Belnet Experts Legal Administrative 23 Evolution of number of incidents 6000 4500 3000 1500 2009 2010 2011 2012 0 24 12

Evolution of number of incidents 25 Evolution of number of incidents 26 13

Evolution of number of incidents 27 Types of incidents in 2012 multiple 0,1% other 3,0% scans 26,1% system2incidents 24,1% vulnerability2reporting 0,7% worms2&2viruses 4,6% phishing 14,7% stolen2accounts 5,2% queries 4,3% SPAM2related 14,8% DoS2attacks 2,4% 28 14

Bottom line 1 cyber security & cyber crime are a growing problem of our society 29 Bottom line 2 awareness 30 15

Aimed towards the Belgian popula on also has the task to provide the Belgian popula on with informa on on computer security. This way everybody stays informed about threats and we provide ps to get online safely. 31 32 16

33 34 17

35 36 18

37 38 19

Trends cyber security cyber crime others 39 Trends lack of awareness 40 20

Trends cyber security & cyber crime are a growing problem of our society 41 Trends 42 21

Trends Sophistication increases Mobile usage increases Digital trust is important Tools are not enough The internet of things Snowden 43 Trends Cloud Always online & Big data Weakest link Insider All of the old stuff is still there Hacktivism DDoS 44 22

Trends Legal obligations Lack of skills / experience Not enough reporting Not enough sharing It all happens in Belgium too We need more exercises 45 Trends Accounts compromised Sony 77 million from PlayStation Network 25 million from Sony Online Entertainment Estimated cost: $1 billion in investigation Average estimated cost: $214 per lost record! CISCO estimates the pay-off for spear phishing attacks to 80 000$ 40 more time than mass attacks Source: Communication of the ACM November 2011 46 23

Anno 2013 47 Anno 2013 48 24

Anno 2013 49 Anno 2013 50 25

Anno 2013 51 Anno 2013 52 26

Anno 2013 53 Anno 2013 54 27

Trends 55 Anno 2013 Apple Microsoft Dropbox Belgacom 56 28

Trends 57 Trends 58 29

TLP 59 Trends 60 30

Trends 61 Trends 62 31

Trends 63 Conclusion It s ge ng worse 64 32

Conclusion Over here in Belgium too 65 Conclusion smarter defence 66 33

Trends lack of awareness 67 Trends Report your incidents 68 34

Q&A report an incident: informa on: communica on: website pro: website ci zen: rss feeds: newsle er: twi er: Flipboard: cert@cert.be info@cert.be press@cert.be h ps://www.cert.be/pro h ps://www.safeonweb.be h ps://www.cert.be/pro/syndica on h ps://www.cert.be/pro/newsle er h ps://twi er.com/certbe h p://flip.it/hd0yv 69 35