The Current State of Cyber Security and How to Defend Your Data.

Slides:



Advertisements
Similar presentations
By Kathryn DuFresne. WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should.
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Travelers CyberRisk for Insurance Companies
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
David A. Brown Chief Information Security Officer State of Ohio
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.
Website Hardening HUIT IT Security | Sep
Maritime Cyber Risks – What is real, what is fiction?
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Computer & Network Security
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
The Beneficent the MERCIFUL In the NAME of. “ASSURING RELIABLE AND SECURE IT SERVICES”
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Scott Charney Cybercrime and Risk Management PwC.
Frontline Enterprise Security
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
Computer Security By Duncan Hall.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Security Mindset Lesson Introduction Why is cyber security important?
Cybersecurity Disaster Recovery Plan. What is a Disaster Recovery Plan? A documented plan designed to maintain normal day to day operations in the event.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Your security risk is higher than ever.
Firmware threat Dhaval Chauhan MIS 534.
Cyber Warfare and Importance of Cyber Awareness
Stuxnet By Shane Serafin.
Cybersecurity - What’s Next? June 2017
David Brown, MBA Certified Information Systems Security Professional (CISSP) Security Expert (GSE) Critical [Security] Controls Certification (GCCC) Exploit.
Agenda Control systems defined
Public Facilities and Cyber Security
Security Risk Profiles – Tips and Tricks
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
CIS 560 Education for Service-- snaptutorial.com.
CIS 560 Teaching Effectively-- snaptutorial.com
I have many checklists: how do I get started with cyber security?
Cyber Defense Matrix Cyber Defense Matrix
Information Security Awareness
Cybersecurity Am I concerned?
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Security in the Real World – Plenary Day One
IT Management, Simplified
IT Management, Simplified
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

The Current State of Cyber Security and How to Defend Your Data

 Jacob Kelley  Sam Morales  Our History  Our Services & Solutions

 The act of manipulating people to accomplish goals that may or may not be in the “target’s” best interest  Example – Your child uses social engineering to get you to buy a toy they want  Or – A hacker gets you to plug a USB device into your PC  Social Engineering is a tactic that is widely used by hackers/attackers to gain access to systems  By exploiting our inherent proclivity for kindness, attackers use our own nature against our best interests  Imagine you find a thumb drive laying around in the office or parking lot – What do you do?

 Common hacker tools now have infrastructure exploits  Secure infrastructure devices exist – but are they patched?  Brazil blackouts spur hacking fears  Anchorage traffic signs hacked  Stuxnet/Natanz disruption

 Hacktivism is politically motivated hacking  Recently, hacktivism has seen a drastic increase in volume and visibility  Conduct a Google search for “Anonymous HB Gary” to see how damaging hacktivism can become  Gary McKinnon “hacked” NASA by logging on with default (read:no) password

 President Obama confirmed Stuxnet was developed by US and Israel  Iran claims USAF drone rootkit/keylogger was theirs  Plan X – DARPA’s cyber warfare project

 Most organizations opt to use “BYOD” without considering the implications  89% of corporations have mobile devices connecting to their networks  65% allow personal devices to connect to corporate networks  Android platform widely viewed as most risky and least secure  Android growth outpacing Apple – corporate risk rising  Almost 3 out of 4 IT Professionals ranked careless employees as a greater security risk than hackers

 FBI ranks Cyber Attacks as third greatest threat to the U.S. behind nuclear war and WMDs (weapons of mass destruction)  Over 10 Million Cyber Attacks daily  Cyber Attacks up 93% in 2011  Due to Cyber Criminals using “attack Kits”  Cyber Attacks could paralyze the nation – 2012 Leon Panetta Secretary of Defense report

 “An ounce of prevention is worth a pound of cure”  Australian government has provided excellent free advice  See Australia’s 35 Strategies to Mitigate Cyber Intrusions  4 Basic strategies prevent over 90% of intrusions  Application Whitelisting, Patching OS, Patching 3 rd Party Software, Limiting Admin Privileges  Free Security Websites - NIST, US-CERT, SANS, etc…  NSA Manageable Network Plan  SANS – Free security resources  20 Critical Security Controls  Free Security Templates

 Follow basic security best practices  Routine penetration testing, vulnerability assessment and review  Social Engineering – training, policies, procedures, and prevention/protection  Critical Infrastructure – one-way data flow, disaster recovery, backup configurations  Hacktivism – SQL injection prevention/code review, DDoS prevention, network infrastructure planning, user education  Cyber Warfare – see social engineering above

*Social Engineer Toolkit: *More Information about social engineering: *Iron key product available: *CNN Report on Cyber Warfare: *McAfee predicts high profile attacks: *Anchorage signs hacked: *Hacker tools to attack infrastructure: *Anonymous attacks against HB Gary: *Gary McKinnon hacks: *USAF Drone Gets Hacked: *Obama Confirms Stuxnet: iran.html?pagewanted=allhttp:// iran.html?pagewanted=all *Cyber Attacks FBI Ranks Third Behind Nuclear War and WMD’s: *Cyber Attacks Nearly Double in 2010: *10 Million Daily Cyber Attacks: *5.5 Billion Cyber Attacks in 2011: *Panetta Report: *35 Strategies to Mitigate Cyber Intrusions: *NSA Manageable Network Plan: *SANS Templates: *SANS Critical Security Controls: *Social Engineering paper: *Checkpoint study on mobile devices:

*Android growth outpacing Apple in 2012: *Iran set to take legal action in response to Stuxnet: *TED talk about Stuxnet: *Slide 3 image credit: *Slide 4 image credit: *Slide 5 image credit: *Slide 8 image Credit: *Slide 10 image Credit: *Brazillian blackouts: *Hacktivism statistics: *Smartphone sales outpace PCs: