CRITICAL INFRASTRUCTURE SAFER CITIES. THRIVING COMMUNITIES.
Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation s security and stability.
16 CRITICAL INFRASTRUCTURE SECTORS DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT RISK TO CYBER ATTACKS 1. CHEMICAL 2. COMMERCIAL FACILITIES 3. COMMUNICATIONS SECTOR 4. CRITICAL MANUFACTURING 5. DAMS 6. DEFENSE INDUSTRIAL BASE 7. EMERGENCY SERVICES 8. ENERGY 9. FINANCIAL SERVICES 10. FOOD AND AGRICULTURE 11. GOVERNMENT FACILITIES 12. HEALTHCARE AND PUBLIC HEALTH 13. INFORMATION TECHNOLOGY 14. NUCLEAR REACTORS, MATERIALS, AND WASTE 15. TRANSPORTATION SYSTEMS 16. WATER AND WASTEWATER Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
INTERCONNECTED SYSTEMS The continued increase of interconnected systems and devices provide cyber criminals limitless attack vectors. 25 billion networked devices are projected by 2020. Source: ITU s Trends in Telecommunication Reform 2015, http://www.itu.int/en/publications/documents/trends2015-short-version_pass-e374681.pdf
MALWARE OUTBREAK 1 million new malware instances released every day Ransomware attacks soared 113% in prior year Increasing number of zero day attacks Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/dbir/2015/ 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
UNAUTHORIZED CONNECTIONS CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST INDUSTRY RISK RATIO* INDUSTRY RISK RATIO Mining 1 in 2.3 44% Transportation, Communications, Electric, Gas & Sanitary Services 1 in 3.4 29% Wholesale 1 in 2.9 34% Public Administration (Government) 1 in 3.4 21% Manufacturing 1 in 3.0 33% Finance, Insurance & Real Estate 1 in 4.8 21% *Risk Ratio of Spear-Phishing Attacks by Industry Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf
BRING YOUR OWN DEVICE (BYOD) 45% of organizations have had a mobile device containing enterprise data reported missing 11% have experienced a data breach requiring public disclosure SOURCE:, InformationWeek's 2013 enterprise security survey, http:/reports.informationweek.com/abstract/21/10696/security/research:-2013-strategic- Security-Survey.html
FIXED CAMERA More than 210 million CCTV cameras worldwide 73,011 locations with unsecured cameras in 256 countries SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoftsubnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-camerasinstalled-globally-in-2014
INSIDER THREAT 55% of threats come from insider abuse or misuse 32% of organizations report insider crimes are more costly or damaging than incidents caused by outsiders SOURCE: PWC The Global State of Information Security Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf
Motorola Solutions has in depth experience, expertise and robust capability to assist with today's cyber risk challenges. We take a comprehensive approach to help customers Evaluate Environment Assess Threats Manage Risk Unique to each customer's operational setting. Learn more at motorolasolutions.com/cybersecurity
THANK YOU!