Cyber-Intelligence and Cyber-Espionage



Similar documents
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Basic Techniques to prevent Identity Theft and Cybercrime

State of Security Survey GLOBAL FINDINGS

Introduction to Cybersecurity Overview. October 2014

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

A Detailed Strategy for Managing Corporation Cyber War Security

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber Security Strategy of Georgia

POLICIES TO MITIGATE CYBER RISK

The UK cyber security strategy: Landscape review. Cross-government

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Greater New York WorldQuest Study Guide. This year s categories focus on the Six Top National Security Issues for the President in 2014, voted

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

CYBER SECURITY TRAINING SAFE AND SECURE

Master of Science in Cyber Security and Management

A NEW APPROACH TO CYBER SECURITY

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Cyber Confrontation: Hackers Convincing Victory Over the Security Industry

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Promoting a cyber security culture and demand compliance with minimum security standards;

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Cyber Risk and Insurance What companies need to know

BT Assure Threat Intelligence

Cyber Risk Management with COBIT 5

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Il Ruolo delle Università nelle politiche di sicurezza cibernetica e di protezione delle infrastrutture critiche per il Paese

SPEAR PHISHING UNDERSTANDING THE THREAT

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

The Danish Cyber and Information Security Strategy

CYBERSECURITY: DIVISION OF RESPONSIBILITY IN THE U.S. GOVERNMENT

Symantec Cyber Security Services: A Recipe for Disaster

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

The Dow Chemical Company. statement for the record. David E. Kepler. before

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Cybercrime in the Automotive Industry How to improve your business cyber security

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Address C-level Cybersecurity issues to enable and secure Digital transformation

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

Cybercrime: risks, penalties and prevention

Cybersecurity Strategic Consulting

White Paper on Financial Industry Regulatory Climate

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

Corporate Security in 2016.

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

CONSULTING IMAGE PLACEHOLDER

Risk Analytics for Cyber Security

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Executive Cyber Security Training. One Day Training Course

Partnership for Cyber Resilience

Publications. Blueprint for U.S. Internet-Based egovernment and Homeland Security Operations November 8, 2001 Authors: Bill (F.

ESKISP Assist security testing, under supervision

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Research Topics in the National Cyber Security Research Agenda

Cybersecurity y Managing g the Risks

Certified Cyber Security Analyst VS-1160

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security in the Financial Industry

Cybercrime Security Risks and Challenges Facing Business

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project. Alessandra Tedeschi, Deep Blue S.r.

Deception scams drive increase in financial fraud

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

The main object of my research is :

China s Cyberwar Against the US: Truth or Fiction?

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Cyber Diplomacy A New Component of Foreign Policy 6

Securing the Nation: Creating cyber security, resilience and readiness

THE WORLD IS MOVING FAST, SECURITY FASTER.


Cybersecurity: Authoritative Reports and Resources

Recent cyber-security studies in the U.S. David D. Clark MIT CFP May, 2009

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Global Web Application Firewall Market

Of Citadels And Sentinels: State. Tim Legrand and Jeff Malone

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cybersecurity. Are you prepared?

Identifying Cyber Risks and How they Impact Your Business

INFORMATION SECURITY TESTING

Internet Safety and Security: Strategies for Building an Internet Safety Wall

WRITTEN TESTIMONY OF

Cybersecurity: Authoritative Reports and Resources

cyber Threat Intelligence - A Model for the 21st Century

PORTCULLIS. 2nd Annual Financial Services Cyber Security Summit. CBEST Workshop

A conversation with Allan Friedman about cybersecurity issues

HOW WILL FRANCHISORS IN EUROPE MEET THE CHALLENGES EU PROPOSED CYBERCRIME DIRECTIVE

Confrontation or Collaboration?

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

Global Corporate IT Security Risks: 2013

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cybersecurity: Authoritative Reports and Resources

Transcription:

London First Cyber-Intelligence and Cyber-Espionage Roundtable 23 October 2013 Sponsored and Hosted by Avanta

CONTENTS Executive Summary Introduction Cyber-Warfare: The Emerging Frontier I. CASCADING FAILURE Motivation Vulnerabilities Scale of Impact Duration DISCUSSION II. CYBER INTELLIGENCE: COMMERCIAL ANALYSIS AND PREDICTION The Big Picture The Threat Landscape III. CYBER WARFARE OR NON-VIOLENT CONFRONTATION Small Not Big Terminology Numbers Offensive Capabilities IV. CYBER ESPIONAGE: THREATS AND VULNERABILITIES The Impact of Espionage The Anatomy of an Attack Opportunities DISCUSSION 2

3

EXECUTIVE SUMMARY Today the biggest emerging threat to economic security and critical infrastructure comes directly from cyber-attacks and cyber-espionage. While state-sponsored cyber-strikes remain a deeply worrying prospect for governments, a larger proportion of cyber-offensives are committed against businesses, the detrimental potential of which should not be underestimated. The most serious and demanding scenario that can result from a cyber-attack occurs when one business is primarily targeted by a cyber-offensive but the effects of which are filtered through the supply chain via forward and backward spillages, producing what is known as cascading failure. Beyond the immediate logistical concerns of a cyber-attack, however, lies the larger issue of preserving public confidence. It is important that the public remain confident in the ability of business and industry to innovate, create wealth, and sufficiently protect and defend critical infrastructure. In order to achieve progress in a climate of mounting cyber-threats a change in approach is required. Conventional thinking, which has tackled cyber-warfare on a grand-scale, has proved to be sub-optimal. Applying strategies on a much smaller scale to terminology, numbers, and offensive capabilities holds considerably greater potential in the fight against cyber-crime. Terminology is not just an academic exercise. It shapes the way we think and assign importance as well as the way in which we assign responsibility within both companies and government. Cyber-crime is an incredibly wide-ranging problem and by using expressions such as cyber-war and cyber-security which encompass activities such as spear-phishing, espionage, and crime, the discussion is being held at a level of obstruction which avoids the finer details. This requires considerable attention if the problem of cyber-security is to be effectively tackled. Cyber-attacks are not created equal and should, therefore, not be considered as such. Any claims projecting 60,000 attacks per day should be distrusted given the variable nature of these incidents. These larger figures will almost certainly include system scans which are fundamentally different from a successful phishing attack. In order to use figures effectively, therefore, analysts need to alter their approach and look at the small number of incidents which have a high impact. When analysing high-impact attacks in terms of offensive capabilities in the most high-impact scenarios, we can operate within a working hypothesis: in order to maximise the impact of a sabotage tool on a specific target, the sabotage tool needs to be built as a bespoke piece of attack software. Therefore, as attackers increase the potential impact of their cyber-weapons, they, in effect, narrow the number of potential targets. 4

INTRODUCTION On 23 October 2013 a round-table event was held by London First on the topic of Cyber-Intelligence and Cyber-Espionage. The event was kindly sponsored and hosted by Avanta. The aim of the event was to understand the world of cyber which is moving at an ever increasing pace. The need to be able to sort rapidly through a mass of data to be able to forecast targeted dangers and attacks, and hence take pre-emptive action, is growing. Such cyber situational awareness depends on an ability to identify pertinent markers as well as to operate data-mining systems so that both the open and dark sides of the web are scanned. This roundtable examined the scale of what can be achieved in a commercial environment, and the practical, legal and regulatory issues that affect businesses. It also considered the threats posed by cyber-espionage from corporate competitors and foreign countries, and made recommendations on how best to minimise the potential losses. The event was programmed around a series of short presentations from: Sir David Omand GCB, Visiting Professor at Kings College London, former Security and Intelligence Co-ordinator and Permanent Secretary of the Home Office, and former Director of GCHQ. Len Hynds, Group CSO at MTG, former Head of UK s National High-Tech Crime Unit. Dr Thomas Rid, Reader, Department of War Studies, King s College London. Tim Hind, Director, EMEA Intelligence and Operations, isight Partners. The chairmen for the event, Robert Hall, Director of the Security & Resilience Network at London First, offered a welcome and introduction. The following text is a non-verbatim recording of the proceedings and no attribution is or should be given to the remarks. 5