EY Cyber Security Hacktics Center of Excellence



Similar documents
12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cybersecurity and internal audit. August 15, 2014

Collateral Effects of Cyberwar

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Tackling the growing risk of cyber crime

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cyber Security Strategy

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Gaining the upper hand in today s cyber security battle

Adopting a Cybersecurity Framework for Governance and Risk Management

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

WRITTEN TESTIMONY OF

Dealer Member Cyber-security

Middle Class Economics: Cybersecurity Updated August 7, 2015

10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

10 Smart Ideas for. Keeping Data Safe. From Hackers

Getting real about cyber threats: where are you headed?

Cybersecurity and Privacy Hot Topics 2015

Who s Doing the Hacking?

Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Advanced & Persistent Threat Analysis - I

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Zak Khan Director, Advanced Cyber Defence

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

FINAL // FOR OFFICIAL USE ONLY. William Noonan

POLICIES TO MITIGATE CYBER RISK

Cyber Security for audit committees

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

How-To Guide: Cyber Security. Content Provided by

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Are you prepared to be next? Invensys Cyber Security

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

20+ At risk and unready in an interconnected world

Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Into the cybersecurity breach

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Cyber and Operational Solutions for a Connected Industrial Era

I ve been breached! Now what?

Corporate Spying An Overview

White Paper: Are there Payment Threats Lurking in Your Hospital?

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Vulnerability Assessment & Compliance

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

How do we Police Cyber Crime?

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Information Security Services

SMALL BUSINESS PRESENTATION

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Managing cyber risks with insurance

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

NEW ZEALAND S CYBER SECURITY STRATEGY

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Managed Security Services The Power To Protect

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Risk and responsibility in a hyperconnected world: Implications for enterprises

Security and Privacy

Cybersecurity. Are you prepared?

Cyber Security. John Leek Chief Strategist

OCIE Technology Controls Program

Transcription:

EY Cyber Security Hacktics Center of Excellence

The Cyber Crime Underground Page 2

The Darknet Page 3

What can we find there? Hit men Page 4

What can we find there? Drug dealers Page 5

What can we find there? Stolen credit cards Page 6

What can we find there? Hackers for hire Page 7

What can we find there? who will do anything for money Page 8

How do we get there? Tor Onion https://www.torproject.org/ Wikileaks: http://kpvz7ki2v5agwt35.onion Silkroad: http://silkroadvb5piz3r.onion/silkroad/home Random but good foum: http://clsvtzwzdgzkjda7.onion/index.php Facebook: https://facebookcorewwwi.onion/ Page 9

The Cyber Security Arena Page 10

Cybersecurity How have cybersecurity threats evolved? Unsophisticated attackers (script kiddies) You are attacked because you are on the internet and have a vulnerability. Sophisticated attackers (hackers) You are attacked because you are on the internet and have information of value. Corporate espionage (malicious insiders) Your current or former employee seeks financial gain from stealing and selling your intellectual property (IP). Organized crime (criminal gangs) You are attacked because you have money or something else of value that can be sold. State-sponsored attacks and advanced persistent threat 1 (APT) You are targeted because of who you are, what you do or the value of your IP. APT Criminal gangs Cash, credit cards, Identities, inside information State-sponsored espionage Market manipulation Competitive advantage Military/political objectives Risk Hackers Malicious insiders Money, embarrassment, political, social or environmental causes Revenge, personal gain, stock price manipulation Script kiddies Amusement, experimentation, nuisance, notoriety Attacker resources and sophistication 1 An advanced persistent threat (APT) is a set of sophisticated, stealthy and continuous computer attacks often targeting a specific entity with business or political motives. The processes used involve a high degree of covertness over a long period of time using sophisticated techniques to exploit vulnerabilities in systems. Page 11

Cybersecurity Is every company a target? Common misconception Reality I don t store credit card details, therefore, my company is not a target. I have nothing to hide. We do not hold personally identifiable information. Companies can be targeted for many reasons: Company is a vendor of the ultimate target. Gain access to IP or research and development information. Stock price manipulation. Gain access to sensitive merger and acquisition information. Disrupt operations. Page 12

Cybersecurity Everyone is vulnerable 552 million identities were exposed in 2013 the year of the mega breach 493% increase in victim volume Number of breaches in 2014 was 66% higher than in 2013 Social media scams and malware flourish on mobile devices Small businesses targeted to reach larger businesses Email campaigns in 2014 91% increase in email campaigns since 2013 29 billion spam emails per day are estimated in 2014 1 in 296 contain malware 25% of email traffic contains a malicious URL 39% 61% 2,500+ 1,501 to 2,500 employees 2013 Attacks by size of targeted company *Source: Symantec Corporation Internet Security Threat Report 2014: Volume 19. Page 13

Famous Hacks 2012-2014 Many hacked, many others don t know they were hacked Page 14

Understanding the cyber landscape: Strategic business risks Situation Well-funded, patient and highly-skilled threat actors (i.e., nation-states, organized crime, hacktivists) Engaged in elaborate, longterm campaigns and cyberenabled economic schemes designed to overcome economic, education and labor-force barriers to illicitly gain competitive advantage Focused on leap-frogging competitors through conversion of stolen intellectual property, theft of financial assets, corruption and the manipulation of markets $500 Billion Financial impact: The risk of cyber attacks could decelerate the pace of technology and business innovation with as much as $500 billion Strategic risks 200 Days Response time: It takes, on average, 200 days to discover that a cyber-attack has been perpetrated within your company Response Leading companies Take an outside-in approach to address the issue Examine and correlate financial, market and geopolitical data with criminal and cyberintelligence information Assess business risks from the perspective of potential threat actors Proactively predict, manage and monitor emerging cyber-economic threats to mitigate business risks and protect shareholder value Page 15

Development path of favored industries in Nation State 96% of cyber espionage originates from China or through China related threat actors. (Verizon, 2013) Mainland campaign International expansion campaign Four Primary CE Phases Joint-Venture Reliance Stage 1 Targeting Stage 2 Enticement Stage 3 Transformation Independence Emerging Markets Leader Market Cap Leader Stage 4 Control Stage 1 Targeting Stage 2 Enticement Stage 3 Transformation Stage 4 Control Transformers Hi speed rail Coal power Pharmaceuticals Wind Turbines Solar Logistics Civilian aerospace Medical Devices Heavy equipment Wireless telecommunications Robotics Domestic Entry Domestic Leader International Entry International leader Page 16

Guiding principles for the Board Directors need to understand and approach cybersecurity as an enterprisewide risk management issue, not just an IT issue. Directors should understand the legal implications of cyber risks as they relate to their company s specific circumstances. Boards should have adequate access to cybersecurity expertise, and discussions about cyber-risk management should be given regular and adequate time on the board meeting agenda. Directors should set the expectation that management will establish an enterprise-wide risk management framework with adequate staffing and budget. Board-management discussion of cyber risk should include identification of which risks to avoid, accept, mitigate, or transfer through insurance, as well as specific plans associated with each approach. The National Association of Corporate Directors (NACD), in conjunction with the American International Group (AIG) and the Internet Security Alliance (ISA) Page 17

Questions to ask Does the organization use a security framework? What are the top five risks the organization has related to cybersecurity? How are employees made aware of their role related to cybersecurity? Are external and internal threats considered when planning cybersecurity program activities? How is security governance managed within the organization? In the event of a serious breach, has management developed a robust response protocol? Page 18

Cyber Security Budget While IT budget is 4%, cyber security budget is 8% Small to Medium companies invest 0.9 3 million dollars Larger companies invest in average of 11 million dollars Small and medium companies transition to managed services Some of the budget is invested in cyber liability insurance 90% growth of sophisticated attacks causes in more cost of mitigation Page 19 Presentation title

What can be done? Create your Cyber Posture Baseline Identify your data assets Identify your cyber related risks, predict future ones Build your threat scenarios Perform an industry benchmark Build your protection plan strategy Be Proactive! Protect Detect Respond Page 20

Tal.Mozes@il.ey.com April Page 212015 4 Insights from EY s global clients