FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group
FBI Phoenix Computer Crime Squad Cyber Front Status Report
FBI Phoenix – Computer Crime Squad
social engineering
FBI Phoenix – Computer Crime Squad vulnerabilities tech
FBI strategy Computer Crime Squad Network Security Issues
FBI Phoenix – Computer Crime Squad FBI Priorities Post 9/11/2001 counterterrorism counterintelligence computer crime investigations prevention
FBI Phoenix – Computer Crime Squad unauthorized access malicious code denial of service Investigation - Computer Intrusion Program
FBI Phoenix – Computer Crime Squad Active investigations Developing intelligence Sharing intelligence Investigation - Computer Intrusion Program
FBI Phoenix – Computer Crime Squad InfraGard Chapters Outreach Presentations Information Sharing Prevention - InfraGard Program
FBI Phoenix – Computer Crime Squad CSI/FBI 1996 – 2003 COMPUTER CRIME AND SECURITY SURVEY
Unauthorized use of computer systems within the last 12 months? CSI/FBI 2001 Computer Crime and Security Survey Source: Computer Security Institute 2001: 532 Respondents/99.6% 2000: 585 Respondents/91% 1999: 512 Respondents/98% 1998: 515 Respondents/99% 1997: 391 Respondents/69% 1996: 410 Respondents/96% YESNODON’T KNOW Percentage of Respondents
FBI Phoenix – Computer Crime Squad
FBI Phoenix – Computer Crime Squad 56 FBI offices 79 chapters members information sharing
FBI Phoenix – Computer Crime Squad SA Tom Liffiton x contact
FBI Phoenix – Computer Crime Squad
ISO STANDARDS Security Policy Security Organization Asset classification and control Personnel Security Physical and environmental security Communications and operations management Access Control Systems Development and maintenance Business Continuity Management Compliance (HIPAA) (Gramm-Leach-Bliley)
Implementing the National Strategy Congress and Conference InfraGard 2003 Washington, DC June 23-25, 2003
FBI Phoenix – Computer Crime Squad wireless vulnerabilities pbx vulnerabilities incident response intrusion detection computer forensics encrypted storage disaster recovery local presentations
FBI Phoenix – Computer Crime Squad have a relationship with law enforcement adopt info assurance best practices develop incident response plan educate users on security participate in InfraGArd maintain audit logs think evidence practice due diligence to do to do to do to do to do
FBI Phoenix – Computer Crime Squad SA Tom Liffiton x contact