Identifying and Preparing for Emerging Industry Risks

Slides:



Advertisements
Similar presentations
OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Advertisements

7 Effective Habits when using the Internet Philip O’Kane 1.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
Lecture 11 Reliability and Security in IT infrastructure.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Enterprise Network Risks Attachments -- Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.4.4 The opportunities and problems of entering new markets abroad:
March 21, 2012 John Vigouroux CEO M86 Security (acquired by Trustwave)
Topic 5: Basic Security.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Return to the PC Security web page Lesson 6: Improving Security.
Understand Malware LESSON Security Fundamentals.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
Mac OS X backdoor Trojan, now in beta? 報告人:劉旭哲. Introduction It targets users of Mac OS X As even the malware itself admits, it is not yet finished. It.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
2016 ECOMMERCE PREDICTIONS: INNOVATE OR DIE BY HARIHARAN KOLAM.
How To Remove Flooders?-Get Help Website:
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Computer safety Filip Hruby.
Chapter 40 Internet Security.
WannaCry/WannaCrypt Ransomware
Ransomware Guidance For Health Centers
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Your Partner for Superior Cybersecurity
CISOs Guide To Communicating WNCRY.
WannaCry/WannaCrypt Ransomware
Ilija Jovičić Sophos Consultant.
Your security risk is higher than ever.
DDoS Attacks on Financial Institutions Presentation
Approaches to Defining Risk
Cisco 2017 Security Annual Report
Network Security Fundamentals
Unit 32 – Networked Systems Security
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Computer Security Fundamentals
Cyber Security & IT: What’s Next?
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
CHAPTER 4 Information Security.
Encryption Ransomware
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
FinTech
Risk of the Internet At Home
Malware, Phishing and Network Policies
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Building Competitive advantage through functional level strategies
Viruses and Virus Protection
Philip Nichilo Vincent Carestia
Security Use Case Description Public charter schools serving grades K-12. Operates 40 schools and serves over 16,000 students and over 2,000 teachers.
Building Competitive advantage through functional level strategies
How to keep the bad guys out and your data safe
Incident response and intrusion detection
Tom Murphy Chief Information Security Officer
CSCD 434 Spring 2019 Lecture 10 Attacks for Profit Ransomeware 1.
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Privacy, Security, and Ethics
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Cybersecurity Simplified: Ransomware
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

Identifying and Preparing for Emerging Industry Risks Samuel Jabbour, Natalia Nincevic, Mary Kate Truss, Justin Simmons, and Vivian Wu

Ransomware Change Fatigue Emerging Risks Ransomware Change Fatigue Risk that takes the form of a systematic issue or business practice that has: Not previously been identified Been identified but dormant Yet to rise to an area of significant concern All of the above

Ransomware

Ransomware Ransomware attacks were predicted to be a $1 Billion dollar business by the end of 2016 -FBI Ransomware attacks have increased 6,000% in 2016 and are in almost 40% of spam messages -IBM Security Ransomware attacks were most common in the financial services and healthcare industries -Malwarebytes

Ransomware What is Ransomware? Ransomware is a type of malware that infects a system and blocks access to the victim’s data. The virus then threatens to perpetually block access to the data or publish it unless a ransom is paid Ransomware

How Does A Ransomware Infection Occur? The most common way is in an email messages that is carrying downloader Trojans (phishing) Websites hosting exploit kits, which attempt to exploit vulnerabilities in the browser or other software

Issue With Ransomware The biggest issue is if a computer containing Non- public information (NPI) becomes infected Ransomware spreads like most malware. So if a single computer is infected, it can spread through various means to others on the network So if a system without any NPI is affected, it can potentially spread to one that does contain NPI

Hypothetical Scenario Server Server

Hypothetical Scenario Server Server

Mitigation Strategies What We Do Additional Strategies Regularly patch software & system Whitelisting software apps running on machines Educate and inform employees about phishing and other exploit attempts Have at least three backups of the data (3-2-1 rule) Additional security required to use UIs that connect to production servers Expand use of two factor authentication Blacklist checking

Change Fatigue

Change Fatigue is the #1 Emerging risk for Q2 2017 The risk of increased employee fatigue and diminished productivity due to high frequency of change initiatives, or poorly operated change initiatives Change Fatigue

Disruptions Effect on Change Fatigue New Players Blend Competitor Partnerships Corelogic & Ellie Mae Large Fintechs Entering Market Finastra has large capabilities Changes in our Industry Consumer behavior Client demands Supply of products & services Organizational Changes Black Knight Stays Competitive Through Innovation Change Management New Policies With this growth will come change management and with change management comes the potential to cause change fatigue. Large-scale Projects

Failed Change Management & Change Fatigue Unintended Consequences Burnout Disengagement Decreased Productivity Increased Turnover Change Resistant Reasons for Failure and Fatigue Poor Communication Poor Design

Organizational Readiness Pyramid of Readiness Mitigation Strategies Fail Fast & Fail Cheap Survey employees on their stress levels and satisfaction Communicate the change initiative to all affected employees Support a high changing culture Use a granular step model Keep ERM & ISO involved throughout the process Ready for Change Individual Readiness Change Agents Target Population Communication Organizational Readiness Scope Definition Stake Holder Analysis Measurement

Questions?