Cyber Horizon Whats Next. E.J. Hilbert Managing Director Decmeber 2014

Similar documents
$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

How to Justify Your Security Assessment Budget

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

How do we Police Cyber Crime?

Cyber Security : preventing and mitigating incidents. Alexander Brown Robert Allen

Managing Cyber Risk through Insurance

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

AN INFORMATION GOVERNANCE BEST

Cyber Security Strategy

HOW WILL FRANCHISORS IN EUROPE MEET THE CHALLENGES EU PROPOSED CYBERCRIME DIRECTIVE

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

Presented By: Corporate Security Information Security Treasury Management

CYBER SECURITY STRATEGY AN OVERVIEW

Working with the Federal Government on Cybersecurity

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cybersecurity y Managing g the Risks

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Brainloop Cloud Security

ACE European Risk Briefing 2012

Unit 3 Cyber security

I ve been breached! Now what?

Small businesses: What you need to know about cyber security

National Cyber Crime Unit

Cybersecurity Workshop

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

How To Understand And Understand The European Priorities In Information Security

FBI CHALLENGES IN A CYBER-BASED WORLD

Managed Security in the Enterprise (U.S. Enterprise)

Who s next after TalkTalk?

Creating a Culture of Cyber Security at Work

Testing Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours

The FBI and the Internet

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

NATIONAL CYBER SECURITY AWARENESS MONTH

The Evolution of Data Breaches

Cyber Security Awareness. Internet Safety Intro.

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Institute of Internal Auditors Cyber Security. Birmingham Event 15 th May 2014 Jason Alexander

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Reducing Cyber Risk in Your Organization

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Cyber Risks and Insurance Solutions Malaysia, November 2013

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cybercrime: risks, penalties and prevention

Achieving Information Security

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

CYSPA launch event - Turkey

Risk Management in Global Operating Industry

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

What Data? I m A Trucking Company!

Presentation to ACC Charlotte. Data Security & Privacy. November 2, Presented by: William J. Cook C. Andrew Konia Mark J.

Business Compromise Scam

A practical guide to IT security

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Investigating Computer Crime. Professor Carsten Maple University of Bedfordshire 8th February 2013

AND RESPONSE. Continuity Insights Conference Chicago June 18-19, Unclassified

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security for audit committees

Cyber Security Related Excerpts from the Global Risk Forum Berlin September 25-26, 2013 Draft 10/24/13

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

PCL2\ \1 CYBER RISKS: RISK MANAGEMENT STRATEGIES

How To Protect Yourself From Cyber Crime

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Introduction to Computer Security

Developing a robust cyber security governance framework 16 April 2015

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Cyber security trends & strategy for business (digital?)

Practical guide for secure Christmas shopping. Navid

Securing Critical Information Assets: A Business Case for Managed Security Services

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Assessing the strength of your security operating model

Cyber Risks Connect With Directors and Officers

Surviving the Ever Changing Threat Landscape

How To Protect Your Data From Hackers

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

Bellevue University Cybersecurity Programs & Courses

Information Security Addressing Your Advanced Threats

WRITTEN TESTIMONY OF

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

National Cybersecurity Awareness Campaign

Litigating Privacy, Data Breach and Cybersecurity Issues in 2014: The SEC View on Disclosure Obligations

Retaliatory Hacking: Risky Business or Legitimate Corporate Security?

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Supplier Vigilance: A Critical Layer of Defense

Mitigating and managing cyber risk: ten issues to consider

stéphane koch internet & information strategy advisor online reputation management

Data Centres North Data Centre Security is the tail wagging the dog? May

Cyber Security: Compliance and Protection 2012 A Complimentary LexisNexis Webinar December 11, 2012

How Companies Can Improve Website & Web Application Security. Even with a Tight IT Budget

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

THIRD PARTY. T i m L i e t z R e g i o n a l P r a c t i c e L e a d e r R i s k A d v i s o r y S e r v i c e s

Transcription:

Cyber Horizon Whats Next E.J. Hilbert Managing Director Decmeber 2014

About the Speaker Managing Director Kroll Advisory Solutions- Head of Cyber Investigations for EMEA President of Online Intelligence- A cyber security and investigative firm specializing in social media and online advertising schemes, scams and crimes. Director of Security Enforcement for MySpace Responsible for addressing all security concerns related to MySpace, its systems and its users. FBI Special Agent- Specialized in White Collar Crime, Cyber Crime and Counter- Terrorism. Notable cases are Treason charges against Adam Gadahn aka Azzam Al Amriki, FBI.gov email intrusion, Carderplanet takedown/cardkeeper, and Invita/Flyhook: the Alexey Ivanov case. High school Teacher and Coach- History, Science, Baseball, Basketball and Cross Country Got my first computer at 12yrs old, a Commodore 64, upgraded later to an Apple IIe Consultant on TV shows, movies and books, various media coverage including MSNBC, BBC, ITV, CNN, Financial Times, Rolling Stone, WSJ, Wired, Gizmodo and others

What is Cyber? Cyber is defined as: - relating to or characteristic of the culture of computers, information technology, and virtual reality - relating to electronic communications networks and virtual reality REALLY?!? Truth is, cyber is marketing term. The issue is protecting the information you have. Cyber is anything involving a computer, data, mobile device or Internet Cyber is Data and its Processing» Data is power and all data is valuable to someone» Stopping the flow equals stopping business Cyber is the people and equipment for data processing» These are the real world components Cyber is Life» There is no part of life that does not have a cyber component.

What are Cyber/Digital Risks? Cyber risks can be broken into four sub categories: Cyber Crime- Computer-enabled attacks for profit or gain Cyber Espionage- Long term data spying for various reasons Cyber Warfare- Destruction of Critical Infrastructure Activism Attacks to embarrass or discredit

Which Of Those Affect You? Crime What data do you have and what is it worth on the market? Internal vs External fraud What about your supply chain/contractors Can your systems be used against others Espionage Who wants what you know Disruption Indication of a slow bleed? Do you have contracts others might want to exploit? Warfare What is the effect of taking you offline What is your BC/DR plan Resiliency technical, commercial and reputation Activism Who are you haters Why Do you have data that can be used against others What is your company s social profile

Initial Thoughts EMEA is 3-5 yrs. behind the US in threat awareness and 5-7 yrs. behind the bad guys 93% of UK companies were attacked in 2013 Most hacks are compromises of user accounts not hacking into the system 85% of people use the same password on all accounts- Passwords are a keyring Top victim is professional services firm Top scam is the Fake CEO/Fake Invoice from a compromised email account User data privacy is the biggest consumer concern and they want transparency of uses

What does the future hold? Legislation Mandates with little business understanding Managed Services Companies offering to do it all Attacks Less Tech more Social

Legislation 2015 EU Data Protection Act» Requires disclosure» Penalty up to 2% worldwide turnover Spain requires cyber security policy for all companies» Italy and Germany to follow suit German law wants to break up Google» Fear of data collection and use US new cyber security standard UK CERT and BofE cyber rules Who is advising? Practitioners, Business Users or Policy Writers

Business Approach Cyber Security is the largest growth industry All companies are looking for the magic pill their woes» Hardware» Software» People» In House or Outsource Product and Services Line» Creating a one-stop shop

Attacks Harden systems equal weaker people Personal Attacks on Corporate clients Recent Examples-» CNBC, Forbes, NHL, etc» Ebay» Apple icloud Data is the commodity

How to prepare Proactive Assessments» What do you have» Where is it» Who has access» Is it monitored Education» Crime methodology» Crime Avoidance» Then Company Policy

Questions you need to be able to answer Who specifically is responsible for information security within your company and your supply chain? What company data is the most valuable, who has access to it and why? Who decides who has access to what information within your company? Can you see what is coming into AND out of your system? Do you have a cyber incident response, management, remediation and resiliency plan? Does your company have a threat awareness program for employees, management and day-to-day operations? Who is responsible for monitoring social media and the internet for threats and attack information? When was the last cyber security audit conducted, by whom and where is the report? Do you do Information Security Due Diligence on your suppliers?

Questions? E.J. Hilbert Managing Director Head of Cyber Security and Investigations in EMEA Kroll ehilbert@kroll.com www.twitter.com/ejhilbert www.linkedin.com/in/ejhilbert