CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

Similar documents
Energy Assurance Plans

Why you should adopt the NIST Cybersecurity Framework

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Top 10 Global Threat Rank by Source

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Critical Infrastructure Sectors and DHS ICS CERT Overview

Critical Infrastructure

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Building a Threat Intelligence Program

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

About Issues in Building the National Strategy for Cybersecurity in Vietnam

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Critical Infrastructure Resilience

IC B01: Internet Security Threat Report: How to Stay Protected

CRITICAL INFRASTRUCTURE AND KEY RESOURCES

The Office of Infrastructure Protection

ABB Ability Cyber Security Services Protection against cyber threats takes ability

The Value of Bipartisanship

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

California Cybersecurity Integration Center (Cal-CSIC)

CYBER SOLUTIONS & THREAT INTELLIGENCE

Template for data breach notifications I

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Digital Health Cyber Security Centre

Gujarat Forensic Sciences University

National Policy and Guiding Principles

2005 E-Crime Watch Survey Survey Results Conducted by CSO magazine in cooperation with the U.S. Secret Service and CERT Coordination Center

The Role of ISACs in Protecting Critical Infrastructure. Denise Anderson Chair National Council of ISACs. Agenda

National Cyber Incident Response - Architectural Concepts

Combating Cyber Risk in the Supply Chain

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

ISACA West Florida Chapter - Cybersecurity Event

Cybersecurity and Hospitals: A Board Perspective

13th Florence Rail Forum: Cyber Security in Railways Systems. Immacolata Lamberti Andrea Pepato

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

The Cyber War on Small Business

The Office of Infrastructure Protection

ACHIEVING FIFTH GENERATION CYBER SECURITY

Cybersecurity Strategy of the Republic of Cyprus

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

Potential business impact of cybercrime on small and medium enterprises (SMEs) in 2016 Survey report USA. October, 2016

MELANI: Information exchange a story of success

Office of Infrastructure Protection Overview

2017 RIMS CYBER SURVEY

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By:

THE EVOLUTION OF SIEM

Cybersecurity Update State and Local Governments and Related Entities

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Securing Industrial Control Systems

ENISA Cooperation in the EU / NIS Directive

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Caribbean Cyber Security: Not Only Government s Responsibility

Business continuity management and cyber resiliency

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Cyber Security Updates and Trends Affecting the Real Estate Industry

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team

Security and networks

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

The New Era of Cognitive Security

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2

Protecting information across government

Critical Infrastructure Assessment

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Technical Brochure F-SECURE THREAT SHIELD

Promoting Global Cybersecurity

Altitude Software. Data Protection Heading 2018

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Your One Source for Critical Infrastructure Protection Solutions

Protecting your next investment: The importance of cybersecurity due diligence

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

Robert Potter Vice President Americas Symantec. Copyright 2016, Symantec Corporation

CONE 2019 Project Proposal on Cybersecurity

China Cybersecurity Law Interpretation. Aug 2017

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Understanding the Changing Cybersecurity Problem

Control Systems Cyber Security Awareness

Electronic payments in the Netherlands

In the wrong hands it s an open invitation

REGIONAL AND INTERNATIONAL TRENDS IN INFORMATION SOCIETY ISSUES CYBERCRIME CHALLENGE

Systemic Analyser in Network Threats

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

World Energy Perspectives 2016

Cybersecurity Auditing in an Unsecure World

New threats to critical infrastructure

The Confluence of Physical and Cyber Security Management

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Internet of Things Toolkit for Small and Medium Businesses

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

CYBER RESILIENCE & INCIDENT RESPONSE

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

1.What are critical infrastructures in Switzerland? CIP concept in Switzerland

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

Transcription:

CRITICAL INFRASTRUCTURE SAFER CITIES. THRIVING COMMUNITIES.

Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation s security and stability.

16 CRITICAL INFRASTRUCTURE SECTORS DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT RISK TO CYBER ATTACKS 1. CHEMICAL 2. COMMERCIAL FACILITIES 3. COMMUNICATIONS SECTOR 4. CRITICAL MANUFACTURING 5. DAMS 6. DEFENSE INDUSTRIAL BASE 7. EMERGENCY SERVICES 8. ENERGY 9. FINANCIAL SERVICES 10. FOOD AND AGRICULTURE 11. GOVERNMENT FACILITIES 12. HEALTHCARE AND PUBLIC HEALTH 13. INFORMATION TECHNOLOGY 14. NUCLEAR REACTORS, MATERIALS, AND WASTE 15. TRANSPORTATION SYSTEMS 16. WATER AND WASTEWATER Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors

INTERCONNECTED SYSTEMS The continued increase of interconnected systems and devices provide cyber criminals limitless attack vectors. 25 billion networked devices are projected by 2020. Source: ITU s Trends in Telecommunication Reform 2015, http://www.itu.int/en/publications/documents/trends2015-short-version_pass-e374681.pdf

MALWARE OUTBREAK 1 million new malware instances released every day Ransomware attacks soared 113% in prior year Increasing number of zero day attacks Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/dbir/2015/ 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp

UNAUTHORIZED CONNECTIONS CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST INDUSTRY RISK RATIO* INDUSTRY RISK RATIO Mining 1 in 2.3 44% Transportation, Communications, Electric, Gas & Sanitary Services 1 in 3.4 29% Wholesale 1 in 2.9 34% Public Administration (Government) 1 in 3.4 21% Manufacturing 1 in 3.0 33% Finance, Insurance & Real Estate 1 in 4.8 21% *Risk Ratio of Spear-Phishing Attacks by Industry Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf

BRING YOUR OWN DEVICE (BYOD) 45% of organizations have had a mobile device containing enterprise data reported missing 11% have experienced a data breach requiring public disclosure SOURCE:, InformationWeek's 2013 enterprise security survey, http:/reports.informationweek.com/abstract/21/10696/security/research:-2013-strategic- Security-Survey.html

FIXED CAMERA More than 210 million CCTV cameras worldwide 73,011 locations with unsecured cameras in 256 countries SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoftsubnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-camerasinstalled-globally-in-2014

INSIDER THREAT 55% of threats come from insider abuse or misuse 32% of organizations report insider crimes are more costly or damaging than incidents caused by outsiders SOURCE: PWC The Global State of Information Security Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf

Motorola Solutions has in depth experience, expertise and robust capability to assist with today's cyber risk challenges. We take a comprehensive approach to help customers Evaluate Environment Assess Threats Manage Risk Unique to each customer's operational setting. Learn more at motorolasolutions.com/cybersecurity

THANK YOU!