Cybercrime Security Risks and Challenges Facing Business



Similar documents
Choosing Between Managed Security Services or In-house SIEM? Consider the Benefits of both!

Best Practices for a BYOD World

ORGANIZADOR: APOIANTE PRINCIPAL:

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Protecting the Infrastructure: Symantec Web Gateway

Cyber and Mobile Landscape, Challenges, & Best Practices

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Symantec Managed Security Services The Power To Protect

RETHINKING CYBER SECURITY Changing the Business Conversation

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Symantec Cyber Security Services: DeepSight Intelligence

How To Create An Insight Analysis For Cyber Security

SentinelOne Labs. Advanced Threat Intelligence Report Predictions


MANAGED SECURITY SERVICES (MSS)

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Breakout Session B: Cyber Security and Cybercrime Trends in Africa

Executive Director Centre for Cyber Victim Counselling /

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

September 20, 2013 Senior IT Examiner Gene Lilienthal

Internet Safety and Security: Strategies for Building an Internet Safety Wall

How To Get A Cloud Service For A Small Business

Symantec Endpoint Protection 12.1 Symantec Protection Center 2.0

The Symantec Approach to Defeating Advanced Threats

Integrating MSS, SEP and NGFW to catch targeted APTs

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

A NEW APPROACH TO CYBER SECURITY

Defending Against Data Beaches: Internal Controls for Cybersecurity

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Better Together: Microsoft Office 365 & Symantec Office 365

CYBER SECURITY, A GROWING CIO PRIORITY

Cyber Security Metrics Dashboards & Analytics

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Insurance implications for Cyber Threats

Cyber Risks and Insurance Solutions Malaysia, November 2013

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

End to End Security do Endpoint ao Datacenter

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

N-Dimension Solutions Cyber Security for Utilities

Cybersecurity. Are you prepared?

BIG SHIFT TO CLOUD-BASED SECURITY

Cybersecurity Awareness. Part 1

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Securing the endpoint and your data

Under the Hood of the IBM Threat Protection System

MarketsandMarkets. Publisher Sample

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Securing OS Legacy Systems Alexander Rau

Countering Insider Threats Jeremy Ho

Solution Path: Threats and Vulnerabilities

Security Intelligence

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

CONSULTING IMAGE PLACEHOLDER

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Streamlining Web and Security

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

How-To Guide: Cyber Security. Content Provided by

Advanced Threat Protection with Dell SecureWorks Security Services

What legal aspects are needed to address specific ICT related issues?

Sytorus Information Security Assessment Overview

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Attachment A. Identification of Risks/Cybersecurity Governance

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Microsoft s cybersecurity commitment

Getting real about cyber threats: where are you headed?

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Defensible Strategy To. Cyber Incident Response

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Transcription:

Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1

Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact to Business 4 Managing the Risk 5 Path to Cyber Resilience East Africa Security Conference August 2013 2

Before jumping in what is Cybercrime exactly? The simple answer is Its complicated! Council of Europe - Cybercrime Treaty defines it as: data used for criminal purposes, all the way to copyright infringement While United Nations include Fraud, Forgery and unauthorized access as Cybercrimes. Symantec Any crime using a computer, hardware device or network where the computer is an agent, facilitator or target of the crime. East Africa Security Conference August 2013 3

Cyber Threat Landscape some statistics 250,000 web attacks blocked daily by Symantec in 2012 1 in 532 websites were infected 1.6 million new malware variants discovered daily East Africa Security Conference August 2013 4

Symantec Global Intelligence Network Identifies more threats, takes action faster & prevents impact Calgary, Alberta Dublin, Ireland San Francisco, CA Mountain View, CA Culver City, CA Austin, TX Pune, India Chengdu, China Chennai, India Taipei, Taiwan Tokyo, Japan Worldwide Coverage Global Scope and Scale Rapid Detection 24x7 Event Logging Attack Activity 240,000 sensors 200+ countries Malware Intelligence 133M client, server, gateways monitored Global coverage Vulnerabilities 40,000+ vulnerabilities 14,000 vendors 105,000 technologies Spam/Phishing 5M decoy accounts 8B+ email messages/day 1B+ web requests/day Preemptive Security Alerts Information Protection Threat Triggered Actions East Africa Security Conference August 2013 5

Agenda 1 2 What is Cyber Crime? Cyber Crime Trends 3 Impact to Business 4 Managing the Risk 5 Path to Cyber Resilience East Africa Security Conference August 2013 6

Symantec Internet Security Threat Report Findings 2012 Targeted Attacks up 42% in 2012 Social Media Tailored & Specific Mobile Malware 58% increase State Sponsored Attacks Increased Dramatically East Africa Security Conference August 2013 7

Targeted Attacks by Industry, 2012 Manufacturing Finance, Insurance & Real Estate Services Non-Traditional Government Energy/Utilities Services Professional Wholesale Retail Aerospace Transportation, Communications, Transportation, Communications, Electric, Gas Electric, Gas Manufacturing moved to top position in 2012 But all industries are targeted 2% 2% 2% 1% 8% 10% 12% 17% 19% 24% 0% 10% 20% 30% East Africa Security Conference August 2013 8

Targeted Attacks by Company Size 50% 2,501+ 50% 1 to 2,500 50% 9% 2% 3% 5% 1,501 to 2,500 Employees 1,001 to 2,501+ 1,500 501 to 1,000 251 to 500 18% in 2011 31% 1 to 250 Greatest growth in 2012 is at companies with <250 employees East Africa Security Conference August 2013 9

Africa specific data Taken from Symantec Internet Security Threat Report 18 East Africa Security Conference August 2013 10

Africa specific data Taken from Symantec Internet Security Threat Report 18 East Africa Security Conference August 2013 11

What Drives the Modern Day Attacks? Hacktivism DDoS Defacement Money Banking Trojan Extortion Targeted Attacks Scam Sabotage Espionage East Africa Security Conference August 2013 12

Agenda 1 What is Cyber Crime? 2 3 Cyber Crime Trends Impact to Business 4 Managing the Risk 5 Path to Cyber Resilience East Africa Security Conference August 2013 13

What this means to business Technology and business are indelibly linked. But it is a double edged sword New customers are online, mobile and connected. There is no silver bullet eliminating risk is impossible and it impedes agility. Organizations need to define their risk appetite Goal is to become Cyber Resilient East Africa Security Conference August 2013 14

So what is Cyber Resilience? Some existing definitions : 1. Resilience is defined as the ability of an ecosystem to return to its original state after being disturbed. (Wikipedia) 2. Cyber-resilience is the organization's capability to withstand negative impacts due to known, predictable, unknown, unpredictable, uncertain and unexpected threats from activities in cyberspace. (Information Security Forum) 3. Cyber-resilience is defined as the ability of systems and organizations to withstand cyber events, measured by the combination of mean time to failure and mean time to recovery. (Word Economic Forum) Defined Process Cyber Security CIA Cyber Resilience Governance Framework Multiple stakeholders East Africa Security Conference August 2013 15

Cyber-Resilience Framework HUMAN TECHNOLOGY PROCESS KNOW Research Study Publish Find/Capture Categorize/store Aggregate/Correlate Collect Analyse Map PREVENT Recruit Educate Train Define Build Maintain Evaluate vital assests Analyse risks Define policies DETECT Search Identify Notify Monitor Analyse Alert Guide Inform Decide RESPOND Apply Render Justify Block Remediate Restore Communicate Follow-up Evaluate impacts CONTROL Evaluations Audits Compliance East Africa Security Conference August 2013 16

Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 4 Impact to Business Managing the Risk 5 Path to Cyber Resilience East Africa Security Conference August 2013 17

A Taxonomy of Risk Enterprise Risk Reputational Risk Strategic Risk Market Risk Credit Risk Operational Risk Financial Risk Other Operational Risks IT Risk Security Risk Compliance Risk Availability Risk Performance Risk East Africa Security Conference August 2013 18

Likely Impact Define Risk Appetite Very High High Un-acceptable Risk Medium Low Acceptable Risk Very Low Low Medium High Likelihood of event Very High East Africa Security Conference August 2013 19

Likely Impact Quantifying Risk Appetite Very High High Medium X - Risk 1 (Flood) X - Risk 3 (Malware Outbreak) X - Risk 5 (Data Breach) X - Risk 2 (Server Failure) X - Risk 4 (DoS Attack) Low Very Low Low Medium High Likelihood of event Very High East Africa Security Conference August 2013 20

Additional Considerations Business and IT need to identify risks together Working in isolation creates disconnect Do all parties agree on what is critical? Clearly define who is responsible for specific risk Network Team Security Engineers IT Operations Consistently measure and feedback on changing risk posture East Africa Security Conference August 2013 21

Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact to Business 4 5 Managing the Risk Path to Cyber Resilience East Africa Security Conference August 2013 22

Path to Cyber Resilience 1) Don t think too small Not many organizations can afford dedicated security team Bad guys are organized and smart Security Basics revisited do we need MORE tools? Collaboration Across EAC Organizations and security teams need to work together Share knowledge / Pool resources East Africa Security Conference August 2013 23

Path to Cyber Resilience 2) Fighting yesterday s battle Multiple attack vectors subtle, distributed and personalized Single Wall of Steel will fail Defense in Depth approach is required. Crucial to have relevant and timely data about your ICT infrastructure. So what do the new attacks look like? East Africa Security Conference August 2013 24

Social Media & Phishing Examples East Africa Security Conference August 2013 25

The Hackers View Organized & Professional East Africa Security Conference August 2013 26

The Hackers View Organized & Professional East Africa Security Conference August 2013 27

Path to Cyber Resilience 3) Include all employee s Employee s are companies greatest asset and also biggest security risk Security is everyone s responsibility not only IT. Is your supply chain secure? Security Awareness Campaigns Help employee s understand impact of Shadow IT, and BYOD. East Africa Security Conference August 2013 28

Path to Cyber Resilience 4) Understand your organization profile Now that the risk appetite is identified measure continuously and seek IMPROVEMENT Base-lining and auditing Standards and regulatory compliance Incident Response East Africa Security Conference August 2013 29

Path to Cyber Resilience 5) Make Cyber resilience your competitive advantage! 60% of companies that lost their data shut down in 6 months % of companies that lost DC services for 10 days were bankrupt in one year Recent survey shows 54% of SMB s don t do daily backups! East Africa Security Conference August 2013 30

Call to Action! 1. Establish your risk profile and know your exposure 2. Make people part of Cyber Resilience Educate the employee s Educate the supply chain & all stakeholders 3. Use Cyber Resilience as long term strategic competitive advantage. 4. Reference existing frameworks / Engage Security vendors East Africa Security Conference August 2013 31

Thank you! Sven Hansen Sven_Hansen@symantec.com @Sven_Hansen_Sym Copyright 2013 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. East Africa Security Conference August 2013 32