Information Security – Current Challenges

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Strategy and Policy Unit: Current Activities and Future Tasks
Jordan’s Tourism Strategy and Aspirations for the Future H.E. Issa Gammoh, Secretary General, Ministry of Tourism and Antiquities.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Digital Economy New Challenges and Opportunities from the point of Information Security Ing. Petra Hochmannová – csirt.sk.
Jordan’s ICT Sector Information Technology Association
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
The Business Case for Disaster Risk Reduction 30 March 2017
Broadband Challenges 2017 Christopher Tamarin
Future Innovations in Europe
A Presentation to the 2017 GEO Work Programme Symposium,
The Philippine Situationer: Climate Change Resilience on Agriculture and Fisheries Sector1 Digna L. Sandovalad, Gian Carlo R. Espiritubd and Marjorie.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security Program
Iowa Communications Alliance
Cybersecurity, competence and preparedness
Cybercrime: Mitigation Challenges
BUSINESS CONTINUITY BY HUI ZHENG.
5 OCTOBER 2015 MANILA, PHILIPPINES
Information Technology Sector
African Space Policy & Strategy
Intelligent Buildings and Cybersecurity
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
BRIDGING DIVIDES: towards digital dividends for all
Securing Information Systems
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Cyber Security in Ports Business as Usual?
Advancing South-South Cooperation for Effective Implementation of
Securing the Threats of Tomorrow, Today.
Combating Cybercrime: Tools and Capacity Building for Emerging Economies WSIS 2015, Geneva Jinyong Chung May 25, 2015.
Promoting Global Cybersecurity
Opportunities in Horizon2020 in Cybersecurity call for proposals
How to Mitigate the Consequences What are the Countermeasures?
DATA LOSS PREVENTION Mr. Collins Oduor.
The European Union response to cyber threats
The State of Cybersecurity in State Government NAST March 26, 2019
Managing IT Risk in a digital Transformation AGE
Session 8: Innovative Uses of Captives: Cyber and Beyond
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
5th PASET Forum Kigali, Rwanda| May 22, 2019
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Enterprise Networking Market Size to Exceed $90 bn by 2025 Growing at CAGR.
SECURITY IN THE DIGITAL AGE
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Global Identity and Access Management Market Worth Over $20 bn by 2025:
Presentation transcript:

Information Security – Current Challenges and Practices: Malaysia’s experience by Dato’ Dr. Haji Amirudin Abdul Wahab Chief Executive Officer CyberSecurity Malaysia 14 July 2017

Introduction Trends of Computing Mobile Devices Big Data INTRODUCTION: OUR DIGITAL ENVIRONMENT HAS VARIOUS TREND OF TECHNOLOGIES THAT MAKES OUR ENVIRONMENT COMPLEX

EMERGING CYBER THREATS IN DIGITAL ENVIRONMENT New technology introduces more devices with more vulnerabilities, hence more risks of cyber attacks Technology changes very fast. We already now that the world is moving towards Industry 4.0 in smart manufacturing environment. Industry 4.0 will utilizes various technologies i.e cloud computing, big data, IoT, etc therefore, the issues of cyber security will be the prime concern of industry in many more years to come. With more devices and connectivity we will expect more risks in our digital environment

MALAYSIA IS DRIVEN BY DIGITAL ECONOMY - Brought along new technologies that come with new security issues

12,744 Cyber Security Incidents Reported TREND OF MALAYSIA CYBER SECURITY THREATS IN 2016 - 2017 (AS OF 31 MAY 2017) MISUSE OF CYBER SPACE 12,744 Cyber Security Incidents Reported CYBER HARASSMENT 1,510,694 Spam Emails 4,594,705 Malware & Botnet Drones Infections Info: www.mycert.my 6 FRAUD!

Recent Global Cyber Threat Trends

GLOBAL COSTS OF CYBER CRIMES

Critical information infrastructure breakdown GLOBAL RISKS LANDSCAPE 2016 Cyberattacks Critical information infrastructure breakdown Terrorist attacks Data theft or fraud Source: Global Risks Perception Survey 2015

TOP FIVE GLOBAL BUSINESS RISKS Business Interruption & Supply Chain Risk 46% National Catastrophes 30% Fire/Explosion 27% Changes in Legislation & Regulation 18% Cyber crime, IT Failures, Espionage, Data Breaches 17% Business Interruption (Including supply chain disruption) 38% Market Developments (Volatility, intensified competition, market stagnation) 34% Cyber Incidents (Cybercrime, data breaches, IT failures) 28% Natural Catastrophes (Storm, flood, earthquake) 24% (Economic sanctions, protectionism) 2015 2016 Source: Allianz Risk Barometer 2015 & 2016 * Figures represent the number of responses as a percentage of total survey responses (1,146)

CYBER SECURITY IS THE BOARDROOM’S MATTERS - Cyber Attacks Are Damaging Brand impact Sensitive media scrutiny Customer churn Loss of business due to critical intellectual asset loss Financial impact Detection and escalation Notification Lost business Response costs Competitive disadvantage Regulatory impact Independent audits Regulatory fines Restriction on information sharing Implementation of comprehensive security solutions Operational impact Diversion of employees from strategic initiatives to work on damage control Average consolidated total cost of a data breach grew from $3.8 million to $4 million. Average cost incurred for each lost or stolen record containing sensitive and confidential information increased from $154 to $158. The cost to organizations comes at each stage of the incident response lifecycle — detection, notification, post-response, and the cost of lost business.

Adoption of holistic approach that identifies potential threats to Critical National Information Infrastructure (CNII) organization and impacts to the national security & public well-being AND; to develop the nation to become cyber resilience having the capability to safeguard the interests of its stakeholders, reputation, brand and value creating activities

NATIONAL CYBER SECURITY POLICY (NCSP) VISION NCSP OBJECTIVES Thrust 1: Effective Governance Thrust 5: R&D Towards Self Reliance “Malaysia’s CNII shall be secure, resilient and self-reliant. Infused with a culture of security it will promote stability, social well being and wealth creation” Address The Risks To The Critical National Information Infrastructure (CNII) Thrust 2: Legislative & Regulatory Framework Thrust 6: Compliance & Enforcement Government Service Energy Health Services Banking & Finance Ensure CNIIs are Protected Thrust 3: Cyber Security Technology Framework Thrust 7: Cyber Security Emergency Readiness Emergency Services Water Defense & Security Food & Agriculture Transportation Information & Communication Develop And Establish Comprehensive Program And Frameworks Thrust 4: Culture of Security & Capacity Building Thrust 8: International Cooperation Critical National Information Infrastructure (CNII)

LOCAL & INTERNATIONAL COLLABORATION - Regional And Global Level Strengthening Domestic Security Cooperation at the Regional & Global Level

ITU Global Cybersecurity Index (GCI) 2017 Top Ten Countries

CONCLUSION AND WAY FORWARD Malaysia’s approach is to adopt holistic approach in order stay ahead of cyber threats To effectively face the challenges require not only innovations, but also collaboration among each other, domestically and globally Strengthening Public-Private-Partnership - enhancing industrial research via collaboration Government-Industry-Academia Continuously and consistently enhancing initiatives under NCSP: Sharing of Information amongst relevant parties Cyber Incidents Response and Coordination Innovative & Collaborative Research Capacity Building Cyber Security Awareness and Education