Cyber-Threats and Countermeasures in Financial Sector

Similar documents
Cyber Security Updates and Trends Affecting the Real Estate Industry

Cyber Insurance: What is your bank doing to manage risk? presented by

Governance Ideas Exchange

Cyber Security Risk Management and Identity Theft

Cybersecurity and Nonprofit

June 2 nd, 2016 Security Awareness

Understanding the Changing Cybersecurity Problem

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

The Cyber War on Small Business

Combating Cyber Risk in the Supply Chain

716 West Ave Austin, TX USA

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

2017 Annual Meeting of Members and Board of Directors Meeting

Personal Cybersecurity

Cyber Threat Landscape April 2013

CYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Security & Phishing

Cybowall Solution Overview

Cyber Risks in the Boardroom Conference

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Hacking and Cyber Espionage

SHARE Session Protecting Critical Data on a z/os Mainframe: A New Attitude

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

What It Takes to be a CISO in 2017

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

ISACA West Florida Chapter - Cybersecurity Event

The Cost of Denial-of-Services Attacks

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Enterprise D/DoS Mitigation Solution offering

Altitude Software. Data Protection Heading 2018

Security Standardization and Regulation An Industry Perspective

FOR FINANCIAL SERVICES ORGANIZATIONS

Cybersecurity and Hospitals: A Board Perspective

Machine Learning and Advanced Analytics to Address Today s Security Challenges

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

PT Unified Application Security Enforcement. ptsecurity.com

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

Background FAST FACTS

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Too Little Too Late: Top Reasons Why You Got Hacked

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Todays Threat Landscape Cloud / Big data / Mobile Jonathan Martin HP Enterprise Security Products

Cyber Attacks & Breaches It s not if, it s When

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Unified Communications Phase 2 Presentation to IT Services Users Group

Cyber Security Issues

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

Tackling Cybersecurity with Data Analytics. Identifying and combatting cyber fraud

Building Resilience in a Digital Enterprise

Designing and Building a Cybersecurity Program

HOSTED SECURITY SERVICES

Information Security Is a Business

Does someone else own your company s reputation? EY Global Information Security Survey 2018

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Cybersecurity Roadmap: Global Healthcare Security Architecture

CloudSOC and Security.cloud for Microsoft Office 365

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Security Breaches: How to Prepare and Respond

Cyber Risk Having better conversations on cyber

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Speakers. Shellie Zavatsky Director of Internal Audit at Hurley Medical Center. Trent Long Director of Managed Privacy Services at FairWarning, Inc

Preventing Corporate Espionage: Investigations, Data Analyses and Business Intelligence

Cybersecurity The Evolving Landscape

Caribbean Cyber Security: Not Only Government s Responsibility

It s About the Data, Stupid.

Onapsis: The CISO Imperative Taking Control of SAP

Data Breach Preparedness & Response

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

Protecting your next investment: The importance of cybersecurity due diligence

DeMystifying Data Breaches and Information Security Compliance

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

AIRMIC ENTERPRISE RISK MANAGEMENT FORUM

Business continuity management and cyber resiliency

GDPR: The Day After. Pierre-Luc REFALO

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

CYBER SECURITY AIR TRANSPORT IT SUMMIT

Security. Risk Management. Compliance.

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Cybersecurity Today Avoid Becoming a News Headline

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

From Russia With Love

It Takes the Village to Secure the Village SM

Learning from a breach

How Cyber-Criminals Steal and Profit from your Data

New World, New IT, New Security

Building a Threat Intelligence Program

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

(U) Cyber Threats to the Homeland

IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice

E-BOOK. Healthcare Cyber Security and Compliance Guide

TAN Jenny Partner PwC Singapore

mhealth SECURITY: STATS AND SOLUTIONS

Transcription:

Michael Mavroforakis, PhD Group CISO & CDO SEV: Workshop on Digital Enablers (Cloud & Cybersecurity) 27th March 2018

Agenda: CYBERSECURITY Potential Targets Attack Examples Insider vs Outsider Threats Origin, Motives, Targets, Methods, Attacks Target: Customers (Methods & Impact) for Internal and External Threats Cybersecurity Architecture Steps Taken to Address Cybersecurity Risks 1

Potential Targets: All Types of Industries 2

Attack Examples: Money & Capital Loss How Hackers Stole $80 Million from Bangladesh Bank 18 th of May, 2016 September, 2017 Massive Equifax Data Breach Could Affect Half of the U.S. Population (145,5M) Equifax, Inc. Stock Chart The attack on Bangladesh's central bank that let hackers stole over $80 Million from the institutes' Federal Reserve bank account was reportedly caused due to the Malware installed on the Bank's computer systems A typo in some transaction prevented a further $850 Million Heist US-based credit ratings firm says records of UK citizens were among those unlawfully accessed during cyber-attack in July Potential GDPR Fines 3

Attack Examples: Blackmail (Ransomware) 4

Insider vs Outsider: Threats Origin Insider Threats: Originate from within a business. Can include any party that introduces risk through malicious of unintentional behavior. Outsider Threats: Originate from external sources. Can be any threat actor that isn t affiliated with the business directly. Employees Cybercriminals Business Partners Hacktivists Contractors Competition - sponsored attackers Compromised Internal Accounts Nation - sponsored attackers 5

Insider vs Outsider: Threats Motives Insider Threats Outsider Threats Financial Gain Financial Gain Personal Advantage Corporate or Nation Sponsored espionage Professional Revenge Political or Military Advantage Outside Influence (Competitor/Nation State/Criminals) Political or Social Change 6

Insider vs Outsider: Threats Targets Insider Threats Intellectual Property and Trade Secretes Business Plans and Corporate Secrets Products and R&D Information Source Code Personal Information Financial Information Outsider Threats Cybercriminals Likely Targets: Financial and Personal information Hackivists Likely Targets: Corporate Secrets & Business Information Competition Sponsored Attackers Likely Targets: Trade Secrets & Business Plans Nation - Sponsored Attackers Likely Targets: Trade secrets Business Information Critical Infrastructure Employee/Customer Personal Information 7

Insider vs Outsider: Threats Methods Insider Threats Outsider Threats Social Engineering Physical Theft Privileged Abuse Copying or Offloading Sensitive Data to Personal Accounts/Drives Unintentional Data Leaks or Loss of Company Property Social Engineering Hacking Malware Distributed Denial Of Service (DDoS) Malicious USB Drops Physical Theft 8

Outsider Insider vs Outsider: Threats Attacks Much More Costly than Outsider Attacks Malicious Insider Attacks Are: Source: 2016 Ponemon Instutute OUTSIDER THREAT More Prevalent Than Attacks By Malicious insiders Source: 2017 Verizon, Data Breach Investigation Report Outsider Attack Methods like DDoS and Web Attacks Are: 9

Are Insiders or Outsiders BIGGER Threat to Your Business? Careless Insider Malicious or Criminal Insider BOTH! THE MOST LIKELY ROOT CAUSES OF DATA BREACHES ARE: External Attacker Combined Insider and External Attacker 10

Target: Customers Attack Methods & Impact Attack Methods Phishing Identity Theft Account Takeover Malware Card Fraud Impact Financial Loss Reputational Damage (Dramatic) Customer Base Shrinkage Penalties / Compensations Legal Implications 11

for Internal and External Threats PROCESSES Policies Procedures Guidelines Technical Standards PEOPLE Security Awareness Training TECHNOLOGY 12

Cybersecurity Architecture: Typical Example Internal Network 1. DP - Directory Policies 2. AV AntiVirus 3. PIM - Privileged Identity Management 4. DCS - Database Compliance System 5. DLCM - Data Life-Cycle Management 6. MPKI-Managed Public Key Infrastructure 7. NAC - Network Access Control: Allow only authorized Devices to Connect to Network (wired or wireless) 8. SIEM - Security Information & Event Management: From several billion alerts per month a few cases are investigated leading to successful resolution of all high severity incidents 9. DBF - Data Base Firewall 1.IS 9.RA 8.UF 7.SEG Internet Perimeter 1.A-DDos Internal Network 1.DP 2.AV 3.PIM 4.DCS 5.DLCM 6.MPKI 7.NAC 8.SIEM 9.DBF 6.SWG 5.IPS 2.DLP 4.WAF 2.APHI 3.NF Internet Perimeter 1. A-DDoS - Anti-Distributed Denial of Service: Up to Tenths of serious DDos attacks per month 2. DLP - Data Loss Prevention 3. NF - Network Firewall: Several million attacks per month, are successfully confronted 4. WAF - WEB Application Firewall: Thousands attacks per week are successfully confronted 5. IPS - Intrusion Prevention Systems: Thousands of attacks per week are successfully confronted 6. SWG - Secure Web Gateway: Several billion attacks per month, are successfully confronted 7. SEG - Secure Email Gateway: Millions rejects per week 8. UF - URL Filtering 9. RA - Remote Access 3.AFS 1. IS - Internet Surveillance 2. APHI - Anti-Phishing 3. AFS - Anti-Fraud Services: From several million transactions per month several thousand malicious transactions are blocked 13

Steps taken to address Cybersecurity risks We can t eliminate the risk of cyber attacks, but we can minimize their consequences. Five (5) things we do to combat cybersecurity risks: 1 Own the Risk Cyber risk is owned by leadership and is not relegated to the IT function. Periodic cybersecurity briefings are provided to the Board and C-Suite. 2 3 Prioritize Initiatives Leadership prioritizes and monitors cybersecurity investments. Investments are made in new capability, not just technology. Critical Assets are identified and their protection prioritized. Learn and Incorporate Work with leading various external parties, share information on current threats and incorporate learnings into our own cybersecurity strategy and tactics. 4 Enhance Culture A security culture and mindset is established through training, measurement and evaluation. Behaviors and capabilities of the organization are established and reinforce the importance of cybersecurity. 5 Secure the Business Security of the business value chain including suppliers, third party providers and high-risk interconnectionpoints is considered. Adapt to the challenges of new and emerging digital business models. Source: PwC 14