Understanding the Changing Cybersecurity Problem

Similar documents
What We Can Learn from Other s Cybersecurity Failures. Keith Price BBus, MSc, CGEIT, CISM, CISSP

Assurance through the ISO27002 Standard and the US NIST Cybersecurity Framework. Keith Price Principal Consultant

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

DIGITAL TRUST Making digital work by making digital secure

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

External Supplier Control Obligations. Cyber Security

How Cyber-Criminals Steal and Profit from your Data

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Cyber Security: Threat and Prevention

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Cyber-Threats and Countermeasures in Financial Sector

Automated Context and Incident Response

The Cyber War on Small Business

Cybersecurity in Government

Cyber Security Incident Response Fighting Fire with Fire

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

MODERN MALWARE, MODERN DEFENSES AND PROTECTION

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Building Resilience in a Digital Enterprise

IT Security Update on Practical Risk Mitigation Strategies

Governance Ideas Exchange

Gujarat Forensic Sciences University

IT Security Update on Practical Risk Mitigation Strategies

Cybersecurity The Evolving Landscape

10 FOCUS AREAS FOR BREACH PREVENTION

Security Breaches: How to Prepare and Respond

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Cybersecurity and Hospitals: A Board Perspective

Securing Digital Transformation

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Ingram Micro Cyber Security Portfolio

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Cyber Security: It s all about TRUST

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Cyber Security Risk Management and Identity Theft

Cybersecurity, Trade, and Economic Development

Protect Your Organization from Cyber Attacks

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

June 2 nd, 2016 Security Awareness

CYBER RESILIENCE & INCIDENT RESPONSE

Cybersecurity Today Avoid Becoming a News Headline

New Zealand National Cyber Security Centre Incident Summary

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Sage Data Security Services Directory

Penetration Testing! The Nitty Gritty. Jeremy Conway Partner/CTO

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

CYBER SECURITY WORKSHOP NOVEMBER 2, Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

RSA NetWitness Suite Respond in Minutes, Not Months

Practical Guide to the FDA s Postmarket Cybersecurity Guidance

Cybersecurity Survey Results

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Cybersecurity and Nonprofit

HOSTED SECURITY SERVICES

ISACA West Florida Chapter - Cybersecurity Event

Security Awareness Training Courses

BRING SPEAR PHISHING PROTECTION TO THE MASSES

Caribbean Cyber Security: Not Only Government s Responsibility

Dr. Stephanie Carter CISM, CISSP, CISA

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Are Your Systems Vulnerable to Hacker Attacks? Achieving Success through Shared Experience

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

IoT & SCADA Cyber Security Services

falanx Cyber Falanx Phishing: Measure your resilience

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

GUIDE. Navigating the General Data Protection Regulation Mini Guide

falanx Cyber Falanx Cyber Awareness Training: Educating your staff

2017 Annual Meeting of Members and Board of Directors Meeting

Service Provider View of Cyber Security. July 2017

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Security Takes Center Stage

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Cyber Crime Update. Mark Brett Programme Director February 2016

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cyber Insurance: What is your bank doing to manage risk? presented by

CYBER SECURITY AND MITIGATING RISKS

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

How Advanced Persistent Threats Successfully Breach Large Organizations AND, What To Do About It

Cybersecurity Threat Modeling ISACA Atlanta Chapter Geek Week Conference

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

Lookout's cybersecurity predictions

Transcription:

Understanding the Changing Cybersecurity Problem Keith Price BBus, MSc, CGEIT, CISM, CISSP Founder & Principal Consultant 1

About About me - Specialise in information security strategy, architecture, and assessment - 30-year career in networking and telecommunications, the emergence of the Internet, Internet banking, and IT security - Work experience in AU, US, UK, Europe - BBus, MSc, CISSP, CISM, CGEIT About Black Swan Group - Professional services company in Sydney - Clients include financial services, education, not-for-profits, state & federal government, property management, and others. 2

All images not created by the author are used under the fair use for education provision. 3

Agenda A (very) brief modern history of cyber Scale of the cyber problem Clarifying cyber risk through attackers, vulnerabilities, & consequences Thoughts about cybersecurity Cybersecurity assessment 4

What do we mean by cybersecurity Cyber is derived from cybernetics, the 1948 study of communication and control systems in living beings and machines. Cyber can be added to (almost) any word to create an Internet reference (cybersecurity, cyberspace, cybercrime, cyberwar). Cybersecurity has emerged as a single catchall word meaning trying to stop criminals attacking your IT systems to steal information or plant ransomware. Images: Google Images Copyright 2018 Black Swan Consulting Group Pty Ltd 5

The cyber risk problem Senior management thinks it s an IT problem (it s not). Every company is under constant attack, certainly by chance, other times a direct target. We are predictable because attackers know human weaknesses and the technologies we use. Their offence is easier and less expensive than our defence. Their offence just has to get lucky once. Our defence must be lucky always. Leadership is the single most important factor in cybersecurity protection Image: Google Images 6

Cyber risk to not-for-profits 7

Cyber risk is a board risk Cyberattack 100,000 customers left and a financial loss of 60M 8

Scale of the problem 9

Your biggest cybersecurity risks Source: Aon Global Risk Management Survey 2017 10

Think your company is safe? Positive Technologies: our testers had a 100% success rate at gaining full control over the entire infrastructure in 2016 (as compared to 82% in 2015). Source: Positive Technologies Security Trends & Vulnerabilities Review, Corporate Information Systems 2017 Your employees passwords: Source: https://staysmartonlinegreen-site.govcms.gov.au Source: Verizon Data Breach Investigations Report 2017 Source: https://www.teamsid.com/worst-passwords-2016/? nabe=4561770576609280:1,5716650381017088:0,5767892520140800:2 11

Cyber risk - Cybercriminals - Their malware - Customer records - Finance system - Your login credentials Cyber Risk - People, process or technology weakness Image: Google Images 12

Cyberattackers & their malware Actor Cybercriminals Hacktivists Nation states Insiders Motivation Money Customer Records Social, Political, and Environmental Geopolitical Viruses Ransomware Keyloggers Root kits Trojans Backdoors Bots Malicious and Accidental Image: Google Images 13

Where we re vulnerable 14

Assets under cyberattack Source: Forrester s Global Business Technographics Security Survey, 2016 15

Phishing Just like sports fishing where the cyberattacker uses bait to get you to do what s/he wants you to do: o Click on a malware infected email attachment o Click on a link in an email to a malware infected website Phishing was the number one Image: Google Images attack vector for 2017 & 2016 16

17

18

Root causes of data breaches Source: The Forrester Wave : Endpoint Security Suites, Q4 2016 19

Insider threat Privileged users were the top insider threat in all regions save Japan. Source: Thales Data Threat Report Global Edition 2017 Cause of insider breaches Breach discovery timeline of insider breaches Verizon Data Breach Investigations Report 2017 Verizon Data Breach Investigations Report 2017 20

Framework for Improving Critical Infrastructure Cybersecurity The Framework enables organisations regardless of size, degree of cybersecurity risk, or cybersecurity sophistication to apply the principles and best practices of risk management to improving the security and resilience of critical infrastructure. 21

Cybersecurity protection lifecycle Five functions: 1. Identifying data, systems, services, and risk strategy 2. Protecting information and systems to ensure delivery of mission critical services. 3. Detecting a cybersecurity event 4. Responding to a cybersecurity event 5. Maintaining resilience and recovering quickly to restore the services Source: US NIST Cybersecurity Framework, www.nist.gov 22

Source: US NIST 23

Advice Accept that your organisation is a target. Because every organisation is a target. Accept that there are no trivial systems in your network. Attackers will exploit any opening to break in, then move laterally compromising other systems & applications. Accept that it s not possible to protect everything. Identify & protect your most critical information and systems. Accept that cyberattackers & malware are going to get in. Advise your management to focus resources on detecting and responding to attacks as early as possible to minimise the damage. 24

Advice Use a cybersecurity assessment to inform which controls are needed to provide the greatest cyber risk reduction. Protect the rest of your network from compromised desktops, laptops, and Internet-facing web services by segmenting the network. Offense informs defence: Use knowledge of actual attacks to continually improve your cyber defences. Key takeaway: cybersecurity is not an IT problem. 25