The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe

Similar documents
Service Provider View of Cyber Security. July 2017

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Security Standardization and Regulation An Industry Perspective

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Business continuity management and cyber resiliency

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Take Risks in Life, Not with Your Security

MODERN DESKTOP SECURITY

June 2 nd, 2016 Security Awareness

with Advanced Protection

The Cyber War on Small Business

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Cybersecurity and Hospitals: A Board Perspective

Defending Our Digital Density.

Personal Cybersecurity

Cybersecurity The Evolving Landscape

CISO as Change Agent: Getting to Yes

Testimony. of the. American Hospital Association. before the. Subcommittee on Intergovernmental Affairs. of the

ANATOMY OF AN ATTACK!

Cyber Crime Update. Mark Brett Programme Director February 2016

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

Cybersecurity and Nonprofit

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Endpoint Protection : Last line of defense?

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Cyber Risk in the Marine Transportation System

Cyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

CYBER SECURITY AND MITIGATING RISKS

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

ISACA West Florida Chapter - Cybersecurity Event

HIPAA 2017 Compliancy Group, LLC

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

NIST Cybersecurity Framework Protect / Maintenance and Protective Technology

Intelligent and Secure Network

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

INFINITY: THE CYBERSECURITY ARCHITECTURE OF THE FUTURE - IN A DIGITAL WORLD

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

Securing the SMB Cloud Generation

HOSTED SECURITY SERVICES

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

Panda Security 2010 Page 1

Cyber Insurance: What is your bank doing to manage risk? presented by

Cyber Attack: Is Your Business at Risk?

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

THE ACCENTURE CYBER DEFENSE SOLUTION

Protecting your next investment: The importance of cybersecurity due diligence

Cyber-Threats and Countermeasures in Financial Sector

Dissecting Data Breaches. What Keeps Going Wrong?

Maximum Security with Minimum Impact : Going Beyond Next Gen

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Sage Data Security Services Directory

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

CYBER SECURITY FOR MEDICAL COLLEGES

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale

Cyber Security Incident Response Fighting Fire with Fire

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Combating Cyber Risk in the Supply Chain

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Understanding the Changing Cybersecurity Problem

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Défense In-Depth Security. Samson Oduor - Internet Solutions Kenya Watson Kamanga - Seacom

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Are Your Systems Vulnerable to Hacker Attacks? Achieving Success through Shared Experience

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

STEVE GOODING JUNE 15, 2018

May the (IBM) X-Force Be With You

A Simple Guide to Understanding EDR

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Security industry overview December 2016

Cyber Security: It s all about TRUST

DeMystifying Data Breaches and Information Security Compliance

Project 2020: Preparing Your Organization for Future Threats Today

The NextGen cyber crime battlefield. Why organizations will always lose this battle

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Transcription:

The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe Copyright 2017 Protocol 46, Inc. All Rights Reserved

Copyright 2017 Protocol 46, Inc. All Rights Reserved

AGENDA BRIEF Update on Cyber Threat Landscape HR Involvement Solutions Q&A TM

Do we treat cybersecurity as: an IT duty? an Operations duty? or HR duty? TM

ecellar Systems, LLC

R.I.P. 201?

TM

If you have integrity,.nothing else matters. If you do NOT have integrity,.nothing else matters. TM

BUSINESS IMPACT EVOLUTION OF THE CYBER THREAT Impact of attacks growing as technology becomes more inter-connected Hig h Low Unsophisticated Attacks Exploration and Experimentation (Damage normally caused by accident) Hacks conducted for Notoriety 1987 Christmas Tree Exec Worm 1980s Network attacks Hackers Insecure codes Attacks with a Purpose Hackers identifying how to exploit weaknesses. Damage and Disruption done on purpose Distinction between Script Kiddies and Hackers develops Emergence of commercial internet (Web 1.0) 1992 1260 Virus (1 st Polymorphic Virus 1996- Cryptoviralogy is born 1990s Data breach Cyber crime Malware Critical infrastructure attacks Identity theft Age of Email Hackers utilize email as the delivery system for worms and viruses Criminal organizations start building infrastructure to exploit cyber crime. Most activity is web defacement/network breakins with limited data theft. 2002 Web 2.0 Advent of BOT Attacks 2000s Cyber warfare RISE OF THE ELITE HACKER Cyber Crime becomes monetized. (Data sales and Ransomware) Widespread state sponsored attacks Hackers start utilizing tertiary networks to breach the target. Cyber Activism become commonplace 2010 Operation Aurora revealed June 2010 Stuxnet released 2010-2016 Foreign state sponsored cyber espionage Cyber terrorism Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment Networked telematics Internet of things DDoS Mirai Botnet FUTUR E

Cybersecurity 2017 Trends 'Malware as a precision tool to breach an organization s defenses Ransomware Phishing

250 Volume of Spam 2015-2017 In Excess of 205 Billion email per DAY 200 150 100 50 0 Q1 2015 Q2 2015 Q3 2015 Q4 2015 Q1 2016 Q2 2016 Q3 2016 Q4 2016 Q1 2017

Volume of Malware 2007-2016 1 Million New Incidents Per DAY 1,000,000 900,000 800,000 700,000 600,000 500,000 400,000 300,000 200,000 100,000 0 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016

Cyber Crime Is Big Business for Hackers Easy and Profitable to Sell Data

Copyright Protocol 46 2017. All Rights Reserved.

Hacker Activity Past to Current Monetized their activity More sophistication Smaller organizations targeted

Cost to any organization of a cyber-attack can literally destroy a business.

Per-Record Data Breach Costs by Industry $450 $400 $ Healthcare $350 $300 $250 $200 $150 $123 Transportation $137 Energy $149 Industrial $154 Retail $200 Education $245 Financial $100 $ 50 $71 Public $0-2016 Ponemon Institute Cost of Data Breach Study

Cost / Profit from Crime Norton / Symantec Corp: July 2016 Global black market in marijuana, cocaine and heroin COMBINED: $288 billion Cost of global cybercrime: $388 billion and growing

Information from: 2016: 1,093 data breaches in U.S. (TRACKED) - almost half of World breaches 900,000,000 Records Stolen

Information from: Average consolidated cost of a data breach in 2016 was $17.36 million. Average small size company breach cost was $454,000

Information from: Minimum Cost of Breach: Small Company was $300,000 Medium size company was $6.7 million Large size company was $73.75 million

Economic cost and Reputational Costs are Significant.

Only 6% of Companies will Survive Longer than 2 Years after a Data Breach. Gartner Research

A FIREWALL AND ANTI- MALWARE SOFTWARE ARE NOT ADEQUATE PROTECTION!

You MIGHT be THINKING......But we have our IT guys protecting us

CRITICAL TO UNDERSTAND DIFFERENCES IT Department Break / Fix Install Software Keep machines working Re-active Cyber Security Works to: Detect Analyze Defend Proactive Your HR and IT Department s Best Friend

CRITICAL TO UNDERSTAND DIFFERENCES IT Department Cyber Security Break / Fix Install Software Keep machines working Re-active Prevents Bad Guys from: Gaining access to Company records Holding Company Hostage Your HR and IT Department s Best Friend

Nationally, the time elapsed from the initial breach to when the breach is detected exceeds 200 days - Accenture

Time from the detection of a new vulnerability by to client notification is under 24 Hours

The SOLUTION Military Grade Cyber Security Prevention and Protection The Alliance Network January 2016

Best Defense is often Prevention 85% of All Cyber Security Attacks Can be Stopped by Implementing 5 Cyber Security Tools

OUR SUITE of PRODUCTS Titanium Castle Nimble Feather Stonewall Aegis Razor Wire Picket Fence We assess and rank a company s vulnerabilities to hacking. This gives the Company s IT department the ability to fix these weaknesses. Remember the IT department can't fix what it doesn t know about. Your HR and IT Department s Best Friend

Cyber Security Protection

Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats

Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats Copyright 1997, 2009 Protocol 46, Inc.

Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats Copyright 1997, 2009 Protocol 46, Inc.

Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats Copyright 1997, 2009 Protocol 46, Inc.

Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats Copyright 1997, 2009 Protocol 46, Inc.

Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats Copyright 1997, 2009 Protocol 46, Inc.

Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats Copyright 1997, 2009 Protocol 46, Inc.

True Cyber Security Protection Defense in Depth

True Cyber Security Protection Protocol 46 Bitdefender Razor Wire Picket Fence PROTOCOL TRUE CYBER SECURITY 46 PROTECTION PROTECTION Nimble Feather Stonewall Aegis

COMPETITION OUR COMPANY ADVANTAGE AFFORDABILITY Ease of Use Plug and Play Reports Pull All Information Together

COMPETITION OUR COMPANY ADVANTAGE Military and 3 Letter Agency Cyber Security Expertise and Experience Fighting an A-Typical War

COMPETITION OUR COMPANY ADVANTAGE Our Solutions are PRO-ACTIVE rather than REMEDIAL

COMPETITION OUR COMPANY ADVANTAGE We get AHEAD of the Breach Not Clean up the Mess After

COMPETITION OUR COMPANY ADVANTAGE PRO-ACTIVE Multi device/sensor concept make us different / better than the competition All Protocol 46 tools work in concert to provide continuous scanning and multiple layers of proactive protection.

COMPETITION OUR COMPANY ADVANTAGE PRO-ACTIVE Our solutions are monitored and updated in response to the cyber threat-scape. Competitors or other products do not update, do not upgrade or have the ability to change like we do.

Do we treat cybersecurity as: an IT duty? An Operations duty? or HR duty? TM

Q and A

THANK YOU! Scott Schue scott@protocol46.com (763) 276-3493 Chuck Standfuss Chuck.Standfuss@protocol46.com (612) 747-5860

Can you answer CYBER SECURITY CHECKLIST What is our plan to respond to a data breach? Are we adequately insured? How do we monitor our systems and prevent breaches? How often do we verify the effectiveness of our security? Is our security clear and consistent? Are third parties really securing our most valuable information? Cybersecurity checklist Can you answer these questions about your business? Do our security goals align with business priorities? How much is the issue of security integrated into your business? Do we have the basic rights for security measures? Have we identified and protected our most valuable processes and information? Do we treat cybersecurity as an IT, an Operations, or a HR duty?

Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation The one we don t do is: Controlled Use of Administrative Privileges

True Cyber Security Protection Effective Security Strategies to Fortify and Thwart Threats Bitdefender Razor Wire Nimble Feather Picket Fence Stonewall Aegis

Proud to be Veteran owned Over 150 years of Military Intelligence and Cyber Security Experience.