Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Similar documents
Cybercrime: risks, penalties and prevention

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Identifying Cyber Risks and How they Impact Your Business

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

September 20, 2013 Senior IT Examiner Gene Lilienthal

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cyber security Building confidence in your digital future

Insurance implications for Cyber Threats

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Ed Ferrara, MSIA, CISSP Fox School of Business

Cybercrime in Canadian Criminal Law

Cyber Security Metrics Dashboards & Analytics

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Who s Doing the Hacking?

How To Cover A Data Breach In The European Market

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Attacks by Modeling Threat Behaviors

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

OCIE Technology Controls Program

Gregg Gerber. Strategic Engagement, Emerging Markets

How To Protect Your Business From A Cyber Attack

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Cyber security Building confidence in your digital future

I ve been breached! Now what?

PREPARE YOUR INCIDENT RESPONSE TEAM

Cyber Insurance Presentation

Promoting a cyber security culture and demand compliance with minimum security standards;

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Certified Cyber Security Analyst VS-1160

Cybersecurity and Privacy Hot Topics 2015

WRITTEN TESTIMONY OF

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Resilience and Cyber Essentials

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber liability threats, trends and pointers for the future

Security and Privacy

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Detailed Description about course module wise:

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Advanced Persistent Threats

After the Attack. The Transformation of EMC Security Operations

NEW ZEALAND S CYBER SECURITY STRATEGY

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Statement of Qualifications Cybercrime & data breach

Seven Strategies to Defend ICSs

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

The Onslaught of Cyber Security Threats and What that Means to You

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

Practical Steps To Securing Process Control Networks

Cybercrime Security Risks and Challenges Facing Business

National Cyber Crime Unit

How To Create Situational Awareness

Can We Become Resilient to Cyber Attacks?

Course Content: Session 1. Ethics & Hacking

Perspectives on Cybersecurity in Healthcare June 2015

Don t Fall Victim to Cybercrime:

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

CYBERTRON NETWORK SOLUTIONS

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybersecurity Workshop

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

IBM Security Strategy

CYBER SECURITY Audit, Test & Compliance

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

FBI CHALLENGES IN A CYBER-BASED WORLD

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

Into the cybersecurity breach

Transcription:

Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014

Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988: First worm created at Cornell 1990: Arpanet becomes the Internet 1998: Google Founded 2003: DHS creates National Cyber Security Division 2003: Slammer worm 2004: Facebook launched 2007: Cyber attack on Estonian Government 2007: iphone 3 launched 2010: US Intelligence on Wikileaks 2010: Stuxnet 2010: US Cyber Command becomes operational 2010: ipad launched 1984 Drivers for Change: 1. Industrialised Cyber espionage 2. Militarisation of cyberspace 3. Rise of hacktivism 4. Organised cybercrime 5. Growing dependency on the Internet 6. The rise of the devices 7. Privacy and Data Protection IA The era of early connectedness A technology issue 2000: ILOVEYOU worm 2001: Budapest Convention on Cybercrime 2000 2014 2 2008: Marathon Oil, ExxonMobil and ConocoPhillips hacked for oil discovery data Cyber The era of mass interdependence A leadership issue 2009: The Aurora attacks, hit Google and 33 companies 2011: RSA and Lockheed attacked 2011: Sony Playstation network hacked, CGI Group costing Inc. $170m 2014 2013: Edward Snowden reveals stolen NSA data 2013: South Korean media and banks attacked 2012: Aramco loses 30,000 PCs to attack

Cybercrime The global cost of cybercrime is US$113 Billion annually, cost per cybercrime victim up 50% Norton Annual Cybercrime Report 2013 One thing is very clear: The cyber security programs of U.S. organizations do not rival the persistence, tactical skills, and technological prowess of their potential cyber adversaries PWC 2014 U.S. State of Cybercrime Survey. 3

Scale/Reward Small Large Cybercrime motivations Copyright Infringement - Pharma Copyright Infringement - Music Cyber Terrorism IP Theft Copyright Infringement - Video Insider Trading DDoS Money Laundering Ransomware Copyright Infringement - Software Card skimming Money Mules Card not Present Digital Blackmail Hacktivism Fake Antivirus Spam Advanced Fee Fraud Digital Mugging Cyber Stalking Cyber Bullying Hard Effort/Complexity Easy 4

Copying, Counterfeiting and IP Theft Impact Hundreds of billions dollars per year Millions of jobs A drag on US GDP growth Degraded capacity to innovate Issues Long supply chains Poor legal protection of IPR Protectionist industrial policies IP Theft is justified Business pace outstrips legal remedy Inadequate institutional capacity The greatest transfer of wealth in history General Keith Alexander, Director US Cyber Command 5

Cyber Attack in Corporate Finance Threats Individuals, nation states, hacktivists, employees & contractors, organised crime and competitors Targeting Transactions The very act of putting information together may trigger interest, it may also create an attractive target A complex mix of external advisors, short timescales and high stakes leads to vulnerabilities Issues How secure is each contributor and stakeholder in this transaction? Who needs to know? Can you monitor access to information? What is your strategy for breaches? Do you have a security partner? 6

Key Trends in Cybercrime Social Profiling 7

Methods of Attack Hack Attacks Stolen Credentials SQL injection Brute Force Privilege abuse Footprinting Malware Export data Memory attack Backdoor Rootkit Spyware Network scanning Adminware Downloader Controls disabler Password capture Stored Data Capture Command & Control Social Phishing Blackmail Physical Tampering Keylogger Data tap Infrastructure ARP spoofing IP & MAC spoofing DNS poisoning/pharming 8

Steps to protect your organisation Management Structure Organisational Commitment Security Context Business Architecture Capability Development Strategy Supplier and Partner Strategy Technology Strategy Business Resilience Compliance Asset Management Threat Assessment Vulnerability Assessment People Security Physical Security Technical Security Resilience Preparedness External Awareness Internal Monitoring Protective Monitoring Incidient Management Investigation Data Integrity Business as Usual Reassurance Legal Process bsi PAS 555 9

Impact and Mitigation More than two-thirds (67%) of those who detected a security incident were not able to estimate the financial costs. Among those that could, the average annual monetary loss was approximately $415,000 PWC 2014 U.S. State of Cybercrime Survey. 10

Quantifying the impact of cyber attack Costs incurred: Channel disruption Supply chains Internal communications Customer confidence Share price Regulatory fines Reputation damage Remedial actions Long-term fixes Loss of IP Loss of business advantage Staff confidence Damages claims Victim notification Impact Quantification Drives: Investment Security posture Priorities Board visibility Comparitors Insurance Business continuity Training Information strategy Security governance Informs: Risk Modelling 11

Example Share Price Impact 12

A Call to Action Capture your own organisation s impact costs of cyber incidents (you will have them): Preventative costs Post event assessment (up to a year following an attack) Create an agreed taxonomy of cyber impact categories and measurements Educate and raise awareness Enable companies to capture such data Dare to share Mechanisms for data aggregation and exchange Create / drive the insurance market: Cyber as a standalone policy or part of corporate risk/professional insurance Capture cyber-related claims Quantify underwriting risk Understand risk and claims assessment 13

Questions? Andrew Rogoyski Head of UK Cyber Security Services CGI UK, Springfield Drive, KT22 7LP Cyber Security Clients 35 years of experience working with government and commercial as a trusted advisor on security One of the only companies with three accredited security certification facilities, one in the US, one in the UK and one in Canada 9 Security Operations Centres globally Managed services support over 100 clients in 16 countries across all industries Defend against 43 million cyber attack incidents each day on military and intelligence networks and infrastructure Business-focused approach to security 14