Cyber Crime Update. Mark Brett Programme Director February 2016

Similar documents
West Midlands Regional Cyber Crime Unit

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

The Regional Cyber Crime Unit response to Cyber Crime

The Cyber War on Small Business

ISACA West Florida Chapter - Cybersecurity Event

IS Today: Managing in a Digital World 9/17/12

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Personal Cybersecurity

FOREWORD DR PHILIP SMITH MBE CHAIRMAN MILTON KEYNES BUSINESS LEADERS PARTNERSHIP

Small Business Is Big Business in Cybercrime A TrendLabs Primer

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

ITU Regional Cybersecurity Forum for Asia-Pacific

Electronic payments in the Netherlands

ISO in the world today

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

We Make IT Simple. IT Support and Security Specialists.

Combating Cyber Risk in the Supply Chain

The Scenes of Cyber Crime

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

Cyber Security Strategy

You ve Been Hacked Now What? Incident Response Tabletop Exercise

IC B01: Internet Security Threat Report: How to Stay Protected

New Zealand National Cyber Security Centre Incident Summary

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Understanding the Changing Cybersecurity Problem

CYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Certified Cyber Security Analyst VS-1160

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

Botnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins

Caribbean Cyber Security: Not Only Government s Responsibility

Supporting the NHS to Improve Cyber Security. Presented by Chris Flynn Security Operations Lead NHS Digital s Data Security Centre

Cyber risk no business too big or too small

Cyber Attack: Is Your Business at Risk?

A practical guide to IT security

Project 2020: Preparing Your Organization for Future Threats Today

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

2017 retail crime survey. summary

Challenges in Developing National Cyber Security Policy Frameworks

Action Fraud & the NFIB. DS Martina MCGRILLEN

FINNISH CYBER DEFENSE MODEL GUIDED TOUR

A Forensic Accountant in Cyber Security

Legal Foundation and Enforcement: Promoting Cybersecurity

Your security on click Jobs

Chapter 6 Network and Internet Security and Privacy

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

U.S. State of Cybercrime

The UK s National Cyber Security Strategy

Legal Aspects of Cybersecurity

Kaspersky Security. The Power to Protect Your Organization

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

HIPAA 2017 Compliancy Group, LLC

Maintaining Trust: Visa Inc. Payment Security Strategy

Advanced IT Risk, Security management and Cybercrime Prevention

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Thematic Paper on Organised Crime Cybercrime - New Investigation Strategies and New Technologies

Convegno Sezione Automazione ANIMP

Unit 3 Cyber security

Experian Fraud Prevention Solutions

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Evolution of Spear Phishing. White Paper

Securing Information Systems

Building a Threat Intelligence Program

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

Policing our Roads Together

Securing Cost Savings for Scottish Police

Panda Security 2010 Page 1

CHIME and AEHIS Cybersecurity Survey. October 2016

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

Cyber and data security How prepared is your charity?

Security Standardization and Regulation An Industry Perspective

Train employees to avoid inadvertent cyber security breaches

Defending Our Digital Density.

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Kaspersky Small Office Security 5. Product presentation

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

6 Vulnerabilities of the Retail Payment Ecosystem

Cybersecurity and Hospitals: A Board Perspective

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Service Provider View of Cyber Security. July 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

STEVE GOODING JUNE 15, 2018

(U) Cyber Threats to the Homeland

Information Security Is a Business

Welcome! Copyright 2017 MAC. All Rights Reserved.

Cybersecurity and Nonprofit

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Stealing digital information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Emerging Issues: Cybersecurity. Directors College 2015

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Serious Organised Crime Agency Collaborative Partnership s Work! Howard Lamb SOCA e-crime

Thailand Initiatives and Challenges in Cyber Terrorism

Payment Security: Attacks & Defences

Transcription:

Cyber Crime Update Mark Brett Programme Director February 2016

What is Cyber Crime? What are the current threats? What is the capability of local and regional Cyber Crime Investigations? What support is out there to assist?

The adopted definition of Cyber Crime is: Cyber Dependent Crimes, where a digital system is the target as well as the means of attack. These include attacks on computer systems to disrupt IT infrastructure, and stealing data over a network using malware (the purpose of the data theft is usually to commit further crime). Cyber Enabled Crimes. Existing crimes that have been transformed in scale or form by their use of the Internet. The growth of the Internet has allowed these crimes to be carried out on an industrial scale. The use of the Internet to facilitate drug dealing, people smuggling and many other 'traditional' crime types.

The Attraction? Traditional Crime Cyber Crime Presence at crime scene Remote from crime scene One offence at a time Multiple offences at once High risk/low reward Low risk/high reward Local enquiries International enquiries Victim reports to police Victim reputation

Source: http://img2.wikia.nocookie.net/ cb20101009053841/itlaw/images/8/8e/figure1.jpg

criminals Today Mirror Legitimate Business Processes yed erators o unce g the ough nology uch bove, or t iate How Zeus botnet operators utilize money mules http://www.fortinet.com/sites/default/files/whitepapers/cybercrime_report.pdf, Ransomware, which actually encrypts data on an model and infected user s machine, is a new trend that seems

Organised crime is well organised! Source: http://sophosnews.files.wordpress.com/2012/01/kb-actors.jpg

Think Digital What are the lines of enquiry?

Think Digital What are the lines of enquiry?

Which of these is a cyber threat? Common house hold smart goods are now being hacked and used in Spam and DDOS activity

We now live our lives online 3bn people will be using the internet worldwide by 2016 and by the end of the year, networked devices will outnumber people by six to one On average each household has 3 internet enabled devices and 2/5 adults have smart phones 8% of GDP generated through the internet economy 121bn in 2010 with Household annual retail sales worth 2.6bn with 30% year on year growth

Some stats... 81% of large organisations and 60% of small organisations reported a security breach (reduced slightly), although Severity and impact has increased the worst breaches averaging at 65k - 115k for small organisations and between 600k - 1.15m for large. 2014 saw more than 1,500 significant data breaches global companies losing hundreds of millions of user details, sometimes including credit card and bank account details Credit card details with CVV being sold for as little as $1 on black market exchanges Crime rate in England and Wales more than doubled to 11.6 million offences primarily because of the inclusion of 5.1m incidents of online fraud and 2.5m incidents of cybercrime More than 70% of fraud is now committed online 2013 McAfee estimated Economic Cost of Cyber crime globally as $500bn Cyber Security identified as a Tier 1 threat to the UK, alongside Terrorism, War and Natural Disaster GCHQ report - 80% cyber crime preventable

The National, Regional & Local Picture

The National, Regional & Local Picture National/ International NCA Cross Border Regional Organised Crime Units First Responders & Local Investigations Local Forces

What Organisations need to ask themselves Do you know the value of your data? Reputational Damage//Trust what if these were affected? Do you know where your critical data is stored? Who has access to your data? Do you have backups? When did you last test them? Do you really know your employees? Do you have business continuity in place? What would you do if you lost your critical data tonight? How would you respond to a Cyber Incident?

Get Safe Online

What is the Cyber-security Information Sharing Partnership (CiSP)? CiSP is a joint industry and government scheme based in CERT-UK. CiSP is an online social networking tool and enables its members to exchange information on threats and vulnerabilities as they occur in real time.

Questions?