DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Recommendation: Buy KEYW Holding Corporation Green and Gold fund.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Homeland Security UNCLASSIFIED United States Coast Guard Office of Port and Facility Compliance (CG-FAC) Cyber Security and the Marine Transportation System.
Cyber Security Nevada Businesses Overview June, 2014.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Desktop Security: Making Sure Your Office Environment is Secure.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
INFORMATION TECHNOLOGY SERVICES Mike Russo, PMP, CISSP, CISA, CFE, CGEIT Director, Information Security and Privacy Office CYBERSECURITY AND PRIVACY Information.
New A.M. Best Cyber Questionnaire
By Celine and Josh.  A loss caused by customer theft, fraudulent payment, or nonpayment  Shoplifting costs retailers billion dollars a year, according.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
A threat to global security and economy Koushik Mannepalli CMPE 294.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
Michael Wright • Chief Security Officer • Tech Lock
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Information Security Program
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
CSI Survey 2007 Tiffany Gorman
بهترین راهکار را انتخاب کنید...
CYBER CRIME Matthew Purchase.
Clemson University: Jill Gemmill
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Curating an Effective Security Culture
Ransomware and Data breaches in public libraries
Cyber Security Culture
Cybercrime and Canadian Businesses
Cybersecurity Threat Assessment
Strategic threat assessment
Keeping the Lights on in a Dangerous World
Information Protection
DATA BREACHES 6 4 , 9 3 There were…
Figuring out CyberSecurity Return On Investment
Information Protection
SECURITY IN THE DIGITAL AGE
Cybersecurity and its Relevance to CIT
Presentation transcript:

DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source: Office of Intelligence and Analysis, “Intelligence Assessment: Damaging Cyber Attacks Possible, but Not Likely Against the U.S. Energy Sector,” Department of Homeland Security, January 27, 2016; Parkjisun, “Anonymous,” Noun Project, April 5, 2016; Creative Stall, “Eye,” Noun Project, April 5, FindingImplication Persistent, but low level threat from nation-state cyber actors Nation-state actors are constantly engaging in cyber activities against U.S. energy sector Most of the activities are cyber- espionage or maintaining access in order to introduce malware Major cyber attack would most likely only occur if nation-states engaged in open hostilities with U.S. Majority of cyber activities against energy sector are low-level cybercrime Most actors are seeking financial gain when targeting energy sector Seek intellectual property or hold data ransom Public misperception of cyber activity in energy sector DHS noted media’s inability to distinguish between cybercrime and cyber attacks Danger of public developing “risk fatigue” and unwillingness to act Major Findings of Department of Homeland Security’s Report DHS Recommendations for Bolstering Cybersecurity 1.) Implement current filters 2.) Keep anti-virus definitions up-to-date 3.) Maintain current software patches (software that updates computer program) for security 4.) Train employees in latest cybersecurity measures

Cybercrime Cost Energy Sector Companies Over $21 Million on Average Over the Past Six Years April 6, 2016 | Ben Booker Source: Ponemon Institute, “2015 Cost of Cyber Crime Study: United States,” October 2015; Office of Intelligence and Analysis, “Intelligence Assessment: Damaging Cyber Attacks Possible, but Not Likely Against the U.S. Energy Sector,” Department of Homeland Security, January 27, DHS REPORT ON ENERGY CYBERSECURITY ■ FY 2015 Costs ■ Six Year Average Average Annualized Cost of Cybercrime in Energy Sector, Millions of Dollars Costs Indicate Average Cost per Company Surveyed Energy Sector Big Target for Cyber Crime In 2015, energy sector was the second-most affected industry (behind finance) by cyber crime However, energy sector had the highest six year average DHS acknowledged in their report that energy sector potentially loses billions in cyber crime related activities annually

Financial, Energy, and Defense/Aerospace Sectors are the Most Affected by Cybercrime April 6, 2016 | Ben Booker Source: Ponemon Institute, “2015 Cost of Cyber Crime Study: United States,” October 2015; Office of Intelligence and Analysis, “Intelligence Assessment: Damaging Cyber Attacks Possible, but Not Likely Against the U.S. Energy Sector,” Department of Homeland Security, January 27, DHS REPORT ON ENERGY CYBERSECURITY ■ FY 2015 Costs ■ Six Year Average Average Annualized Cost of Cybercrime in Millions of Dollars by Sector Costs Indicate Average Cost per Company Surveyed