Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only



Similar documents
Cybersecurity as a Risk Factor in doing business

Anti-exploit tools: The next wave of enterprise security

Protecting Your Organisation from Targeted Cyber Intrusion

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Critical Security Controls

Additional Security Considerations and Controls for Virtual Private Networks

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

I ve been breached! Now what?

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Breaking the Cyber Attack Lifecycle

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Did you know your security solution can help with PCI compliance too?

Seven Strategies to Defend ICSs

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Essentials Questionnaire

Cybersecurity Health Check At A Glance

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

September 20, 2013 Senior IT Examiner Gene Lilienthal

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Software that provides secure access to technology, everywhere.

Host/Platform Security. Module 11

Data Center security trends

Cisco & Big Data Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Industrial Security for Process Automation

The Education Fellowship Finance Centralisation IT Security Strategy

Cyber Essentials Scheme

Internet threats: steps to security for your small business

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Managing Web Security in an Increasingly Challenging Threat Landscape

SPEAR PHISHING UNDERSTANDING THE THREAT

Who s Doing the Hacking?

Networking for Caribbean Development

Specific recommendations

A Case for Managed Security

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Automate your IT Security Services

Locking down a Hitachi ID Suite server

Agenda , Palo Alto Networks. Confidential and Proprietary.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Cyber and Mobile Landscape, Challenges, & Best Practices

Protecting the un-protectable Addressing Virtualisation Security Challenges

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Practical Steps To Securing Process Control Networks

IBM Security Strategy

Defending Against Data Beaches: Internal Controls for Cybersecurity

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cyber Security. John Leek Chief Strategist

I N T E L L I G E N C E A S S E S S M E N T

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

24/7 Visibility into Advanced Malware on Networks and Endpoints

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Microsoft s cybersecurity commitment

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

INFORMATION PROTECTED

End to End Security do Endpoint ao Datacenter

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

RETHINKING CYBER SECURITY Changing the Business Conversation

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Reducing the Cyber Risk in 10 Critical Areas

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

External Supplier Control Requirements

2015 TRUSTWAVE GLOBAL SECURITY REPORT

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Secure Your Mobile Workplace

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Section 12 MUST BE COMPLETED BY: 4/22

Data Management Policies. Sage ERP Online

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Cyber Essentials KAMI VANIEA 2

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Building A Secure Microsoft Exchange Continuity Appliance

NetDefend Firewall UTM Services

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Fighting Advanced Threats

Transcription:

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors Microsoft Confidential for internal use only

Wall Street Journal, JP Morgan, Lockheed, Bushehr nuclear reacto RSA, Microsoft, struggling Google Apple, Facebook, Sony, Target, Nordstrom's, ICANN Home Depot

Cyber Security is like a virus outbreak. It must be treated with same answers and focus Everyone is a target Impacts are financial, operational and reputational Basic hygiene and preparedness are essential Rapid identification and containment It begins by acknowledging the risk in everything you do, and build a resilient infrastructure

WHAT do CYBERCRIME HACKTIVISM TERRORISM Have in common? NO RULES 5

HOW do the CYBERCRIMALS HACKTIVISTS TERRORISTS See US? 6

200+ 76% $500B $3.5M The median # of days that attackers reside within a victim s network before detection of all network intrusions are due to compromised user credentials The total potential cost of cybercrime to the global economy The average cost of a data breach to a company Security is a CEO level issue

2013 headlines from around the world Data of 20 million Chinese hotel guests leaked Blackhole Exploit Kit takes advantage of financial crisis in Cyprus Belgian telecom compromised in alleged cyber espionage campaign 105 million South Korean accounts exposed in credit card security breach DDoS attacks hit Reddit and European banks Symantec Internet Security Threat Report

Statistics from the front lines 25 zero-day vulnerabilities found in SCADA software from 20 suppliers 1 Cybercrime accounts for 95% of losses incurred by Brazilian banks 2 52% increase in EU critical infrastructure attacks from 2011-2012 4 300 attacks against oil & energy companies in Norway in 2014 Wired New York Times 3 Fox News European Union Agency for Network and Information Security (ENISA) Threat Landscape Report

Encountered Malware by Region 4Q14 source: Security Intelligence Report (www.microsoft.com/sir)

Ransomware by country or region 2H14

Malware encounters and infections Singapore 30% Encounter rate Infection rate 15 20% 10 10% 5 0% 0 3Q13 4Q13 1Q14 2Q14 3Q13 4Q13 1Q14 2Q14 Singapore Worldwide

IS

Someone must be ultimately responsible If you protect your paper clips and diamond with equal vigor, you will soon have more paper clips and fewer diamonds Dean Rusk (USA Secretary of States 1961 1969) Start with simple data classification Know your risks. What are they, where are they? Behind every security problem is a human being Do have anti virus on every machine Systems must be Resilient And Managed

Australia s Top 35 Non-persistent virtualised operating system Centralise host logging Network Segmentation & Segregation Centralise network logging Restrict NetBIOS Monitor System Infrastructure Patch & update to current applications Patch & update to current operating systems Use application whitelisting Protect the Endpoint Host based intrusion detection & prevention Host inspection of Microsoft Office Files Patch & update to current operating systems Inbound Host-based Firewall Randomise Local Administrator Passphrases Use gateway and desktop antivirus Lock down operating environments Monitor Traffic with Network IDPS Capture All Network Traffic Monitor the Network Educate Users Social engineering education Enforce strong passphrases Filter email content by whitelist Force domain IP lookup Implement TLS between email servers Filterweb content Whitelist web domains Whitelist HTTP/SSL connections Protect Email Enforced border gateway Firewall Force domain IP lookup Blacklist domains at the border gateway Defend the Web Harden Web & Server Apps Strong Authentications Restrict administrative privileges Use multi-factor authentication Implement data execution prevention Harden server applications Disable LanMan

Australia s Top 4 Patching applications and using the latest version of an application Patching operating systems Keeping admin right under strict control (and forbidding the use of administrative accounts for email and browsing) Whitelisting applications