CYBER SECURITY: ALTITUDE DOES NOT MAKE YOU SAFE

Similar documents
CYBERSECURITY MADE SIMPLE

Troubleshooting and Cyber Protection Josh Wheeler

Cyber Security and Business Aviation

PREPARE & PREVENT. The SD Comprehensive Cybersecurity Portfolio for Business Aviation

ALTITUDE DOESN T MAKE YOU SAFE. Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Teradata and Protegrity High-Value Protection for High-Value Data

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Introduction to Information Security Dr. Rick Jerz

The Cyber War on Small Business

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

with Advanced Protection

Sage Data Security Services Directory

Whitepaper on AuthShield Two Factor Authentication with SAP

Train employees to avoid inadvertent cyber security breaches

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Employee Security Awareness Training

Best Practices in Securing a Multicloud World

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

From Russia With Love

Managed IT Services Eliminating technology pains for SMBs

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

Keep the Door Open for Users and Closed to Hackers

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

IT & DATA SECURITY BREACH PREVENTION

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

How Cyber-Criminals Steal and Profit from your Data

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Machine Learning and Advanced Analytics to Address Today s Security Challenges

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Who We Are! Natalie Timpone

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Security. The DynaSis Education Series for C-Level Executives

Combating Cyber Risk in the Supply Chain

PCI Compliance. What is it? Who uses it? Why is it important?

A quick-reference guide to secure your organization s data and reduce cybersecurity attacks

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

Dissecting Data Breaches. What Keeps Going Wrong?

Cyber and data security How prepared is your charity?

Online Threats. This include human using them!

Cyber Security Updates and Trends Affecting the Real Estate Industry

SECURITY TESTING. Towards a safer web world

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Cyber Insurance: What is your bank doing to manage risk? presented by

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

ISACA West Florida Chapter - Cybersecurity Event

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

Cybersecurity: Incident Response Short

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

mhealth SECURITY: STATS AND SOLUTIONS

Cyber security tips and self-assessment for business

Effective Cyber Incident Response in Insurance Companies

10 FOCUS AREAS FOR BREACH PREVENTION

Healthcare HIPAA and Cybersecurity Update

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

Employee Privacy in the Electronic Workplace

Cyber Attack: Is Your Business at Risk?

Endpoint Protection : Last line of defense?

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Service Provider View of Cyber Security. July 2017

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The 10 Disaster Planning Essentials For A Small Business Network

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Cyber Risks in the Boardroom Conference

Friday, 1/17/14 10:30 a.m. 11:45 a.m. PRESENTED BY: William Figures David Ross Charlie LeBlanc

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Stakeholders Analysis

ANATOMY OF AN ATTACK!

The Value of Automated Penetration Testing White Paper

Protecting your next investment: The importance of cybersecurity due diligence

THE ACCENTURE CYBER DEFENSE SOLUTION

Cybersecurity and Nonprofit

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017

Background FAST FACTS

What to do if your business is the victim of a data or security breach?

Protecting Your Business From Hackers

Defensible and Beyond

Modern two-factor authentication: Easy. Affordable. Secure.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Machine-Powered Learning for People-Centered Security

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

U.S. State of Cybercrime

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Transcription:

CYBER SECURITY: ALTITUDE DOES NOT MAKE YOU SAFE JULY 2018

It s not a matter of IF a breach will occur but WHEN

JUST THE FACTS 2.3 BILLION 51 INDEPENDENT Credentials spilled in 2017 Credential Spill Incidents HelpNetSecurity 7.9.2018 HelpNetSecurity 7.9.2018

CYBER SECURITY FACTS & FIGURES $6 TRILLION Cyber Crime Damage Costs will hit annually by 2021 $1 TRILLION Cybersecurity spending to exceed from 2017 to 2021 3.5 MILLION Cyber crime will more than triple the number of unfilled cybersecurity jobs 54% Companies experienced one or more successful attacks Barkly 77% attacks utilized exploits or fileless techniques Barkly 80% of businesses have been hacked Duke University/CFO Magazine 14 Million businesses hacked in last 12 months CNBC 04/05/17 Average Cost per record hacked is $141 Ponemon Institute and IBM 2017 1 Billion Yahoo accounts stolen Every account 198 Million Voter Records Exposed Wired Magazine 2017 Over 711 Million records were hacked in the last 30 days - Time Warner, CeX and a European email provider

WHAT WE WILL COVER Taking you from overwhelmed to confident The Lay of the Land Foundational Concepts Common Threats How the Hackers Do It Cyber Security Program Elements What You Can Do to Protect Yourself How to Get Started Additional Resources

THE BIRTH OF AN INDUSTRY Cyber attacks are an unintended consequence of an all-digital world In just a few short years, attacks have spawned an entirely new industry

SPENDING ON CYBER SECURITY PROTECTION IS SET TO REACH $1 TRILLION Spending increased 35X between 2004-2017

UNFILLED JOBS IN CYBER SECURITY ARE PROJECTED TO REACH 3.5 MILLION BY 2021 UP FROM ONLY 1M OPEN JOBS IN 2016

CYBER SECURITY INSURANCE PREMIUMS ARE EXPECTED TO REACH $7.5 BILLION IN 2020, A 300% INCREASE FROM

I GOT 99 PROBLEMS - and a BREACH ain t one ELEMENTS OF A COMPREHENSIVE CYBER SECURITY PLAN ONE PERSON IN CHARGE CYBER SECURITY FLIGHT DEPT MAN + MACHINE Back-end systems & technology The human factor CYBER SECURITY TRAINING FOR EMPLOYEES SECURING EVERY DEVICE For crew & guests while minimizing inconvenience PASSWORD MGMT PROGRAM For devices on aircraft routers, etc BEST PRACTICES Ensuring all vendors utilize best practices in cyber security

CONCEPT: MAN VS MACHINE 87% of company security experts say that controls fail to protect business

CONCEPT: MAN VS MACHINE EVERYONE KNOWS THE RISK OF CLICKING ON A FAKE EMAIL, yet 78% Click it anyway

CONCEPT: MAN VS MACHINE 70% of security experts see employees as biggest risk

CONCEPT: MAN VS MACHINE Even with the most high-tech security system in place, your entire network remains vulnerable on two fronts TECHNOLOGY Staying ahead of the hackers with threat detection and prevention, monitoring and blocking software HUMAN ERROR Education, best practices, policies & procedures To properly protect your company, you need the latest technology AND the right procedures

NETWORK SECURITY RISKS PHYSICAL SECURITY ATTACKS SOFTWARE BASED ATTACKS SOCIAL ENGINEERING ATTACKS WEB APPLICATION ATTACKS NETWORK BASED ATTACKS Data theft is a critical issue costing money, downtime, customer confidence and public embarrassment Attack strategies include social engineering, theft of passwords and credentials, spam, malware and more. Vulnerabilities are present almost everywhere Improperly-configured or installed hardware or software Bugs in software or operating systems Poor network architecture Poor physical security Insecure passwords

COMMON ATTACK SCHEMES PHISHING SPY WHO STOLE THE SECRETS BAD THUMB DRIVES QUESTIONABLE AIRSPACE

SCENE 1: PHISHING The attempt to obtain sensitive information by disguising as a trustworthy entity in an email The principal receives an email in flight, from what appears to be a known associate The message asks for sensitive information The principal clicks the link and enters the requested data

SCENE 1: PHISHING The attempt to obtain sensitive information by disguising as a trustworthy entity in an email WHAT YOU CAN DO Messages that ask for sensitive information or that need information urgently should always raise a red flag. Before clicking, hover your curser over a link to reveal the underlying URL. If it s an unfamiliar website, don t click just delete it. Always confirm that an email is legitimate before opening an attachment. This could be as simple as calling or emailing the sender to let them know you received an unexpected document and want to confirm it was from them before opening.

SCENE 2: THE SPY WHO STOLE SECRETS Awesome Company and Better Company are negotiating a merger Hector the Hacker, who works for a competitor, gets wind of the deal Hector hacks the charter company s operating system to steal flight manifests The competitor makes a well-timed competing bid and disrupts the deal WHAT YOU CAN DO By creating procedures that limit access, eliminate out-of-date email addresses and establish a protocol for transmitting sensitive information, many of the doors used by hackers can be wholly or at least partially closed.

SCENE 3: BAD THUMB DRIVE A well-known hacking strategy, a thumb drive is a seemingly harmless portable peripheral device When an infected thumb drive is connected to a computer, it can trigger a massive cyberattack

SCENE 3: BAD THUMB DRIVE WHAT YOU CAN DO It s common for hackers to scatter infected USB drives in company parking lots, around a trade show, or wherever they are likely to be picked up by an unsuspecting victim. To protect yourself, implement protocols that prohibit the use of unauthorized USB drives.

SCENE 4: QUESTIONABLE AIRSPACE Flying over certain countries can increase the risk of hacking. When in some countries airspace, airborne internet traffic is automatically routed to an incountry satellite earth station allowing third parties to intercept the data..

SCENE 4: QUESTIONABLE AIRSPACE WHAT YOU CAN DO Use predictive flight mapping technology that sends an automatic alert to pilots when entering questionable airspace to remember to terminate the internet connection.

PHYSICAL SECURITY Who has access to the Aircraft? Who caters the aircraft? Who is working on or in the aircraft? The sounds of wildlife Who, Who, Who SETTLEMENT DIRECTIVES 2013 TARGET DATA BREACH As part of the settlement announced on Tuesday, Target is required to adopt advanced measures to secure customer information such as employing an executive to oversee a comprehensive information security program as well as advise its chief executive and board. The company is also required to hire a independent, qualified third party to conduct a comprehensive security assessment and encrypt or otherwise protect card information to make it useless if stolen.

BEGIN WITH THE END IN MIND WHEN SOMETHING HAPPENS, WILL YOU BE READY?

THANK YOU QUESTIONS?

EASY WAYS TO GET STARTED TALK TO YOUR AIRTIME PROVIDER Find out what they re doing, what tools & programs are available, and how they can help you. TAKE A COURSE Cybersecurity Risk Management for Flight Departments offered in NBAA s Professional Development Program (PDP). TAKE A DIFFERENT COURSE The certified CyberSAFE course is available via SD s Learning Management System online. COMPLETE A SELF- ASSESSMENT Establish where you are today. Answer 12 questions and get a 30-minute phone consultation no cost or obligation.

ADDITIONAL RESOURCES SD Cyber Smart Kit Available free of charge at www.sdcybersmart.com See the video Read the white paper Get literature Download the free Network Discovery self-assessment Sign up for ongoing alerts & updates Articles Cybersecurity in the Flight Department How Secure Is Your Aircraft?, by David Esler, Aviation Week, August 2017 http://aviationweek.com/connected-aerospace/cybersecurityflight-department-how-secure-your-aircraft Cyber Security: Top Flight Department Threats, NBAA Insider, July 2016 https://www.nbaa.org/ops/security/20160704-cyber-security-topflight-department-threats.php

THANK YOU Rob Hill Global Data Solutions RHill@SatcomDirect.com +1.321.544.7177