Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Information Warfare Theory of Information Warfare
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Cracking down on international cyberterrorism
Unit 4 – Impact of the use of IT on Business Systems.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
® ® CLS and the CLS Logo are registered trademarks of CLS UK Intermediate Holdings Ltd © 2014 CLS UK Intermediate Holdings Ltd. Growing.
Information Warfare Playgrounds to Battlegrounds.
Class 8 The State of Cybercrime Today- Threads & Solutions.
Cyber Security Nevada Businesses Overview June, 2014.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Information Warfare Playgrounds to Battlegrounds.
FFIEC Cyber Security Assessment Tool
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
ISSP Information Systems Security Partners | GiTi: 2015 Transforming IT Security Strategy: shifting focus from technologies to business process Artem Mykhailov.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Homeland Security and Emergency Management Discussion U.S. Department of Homeland Security  National Preparedness Directorate, FEMA Higher Education Conference.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
| World Pork Expo Cyber Security | May Cybersecurity and Your Data Dr. Lane Arthur, Director, John Deere Intelligent Solutions Group James M. Johnson,
FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.
Proactive Incident Response
Information Security Program
Cybersecurity, competence and preparedness
Financial Institutions – Cyber Risk
Public Facilities and Cyber Security
Journey to Microsoft Secure Cloud
Cyber Security: State of the Nation
Securing Information Systems
8 Building Blocks of National Cyber Strategies
{ Cyber Threat Intelligence: Understanding adversaries to banks in the-GCC and the importance of data sharing. Matt Suiche.
Artificial Intelligence Changes the Security Landscape
Cybersecurity at PJM Jonathon Monken
Top Security Priorities 2018
Federal Protective Service
Forth International Forum
PGE Chris Nolke, Director of Cybersecurity
Cybersecurity Threats and Opportunities in Latin America
The Global Challenges of Cybersecurity and Digital Terrorism
Protecting Your Company’s Most Valuable Asset
The State of Cybersecurity in State Government NAST March 26, 2019
Cybersecurity Threat Assessment
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
Cybersecurity at PJM Jonathon Monken
Texas Assisted Living Association 2019 Conference
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Cybersecurity and its Relevance to CIT
Presentation transcript:

Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT

The Cyber World of DoD Nation States International Cyber Criminals THREAT ACTORS MOTIVATIONS Nation States Cyber-Espionage Harvesting PII for spear-phishing Platform for future exploitation Economic data indicators Competitive intelligence Intellectual property theft Cyber-Crime Harvesting PII for identity theft Supply chain manipulation Credit authorization manipulation Customer account manipulation Physical theft Cyber-Hacktivism Hacktivism for the Lulz (Thrill) Cyber-civil disobedience Political hacktivism Retribution hacking Terrorism China Russia Iran North Korea International Cyber Criminals Russia Eastern Europe Asia Americas Hacktivists and Terrorists Anonymous LulzSec Al Qassam Cyber Fighters Syrian Electronic Army Guardians of Peace (GOP) The Cyber World of DoD SOURCE: US DoD

Private Sector: Surrounded By Threats SOURCE: CDG

? BIG THE What Do We Do Now?

Risk management is a leadership issue 1. CISO – Do I need one? You need an owner – one leader Depends on size and scope of business Depends on size and scope of information But… Someone needs to do the following… Risk management is a leadership issue

Managing Risk for Present & Future 2. Cyber Strategy Not everything requires the same level of security. Make security a part of every business decision. Security is NOT about saying no. Managing Risk for Present & Future

Inspect, Don’t Just Expect 3. Insider Risk Cyber Security Training is the first step. Create a culture of cyber responsibility Ensure planning includes partners (e.g., outsourced IT, partners, etc.) Use audits and metrics to monitor implementation, effectiveness and impact. Inspect, Don’t Just Expect

Build Cyber Protection: Maintain the Technology Build cyber protection in phases – it’s not just the tools Build experience to implement and manage the controls. Maintain all the technology Manage technology contracts and procurement. Build Cyber Protection: Maintain the Technology

When Prevention is Not Enough 5. Disaster Recovery and Business Continuity Old Concept – Think in terms of Cyber. Know who is in charge when a breach occurs There is no “storm warning” for Cyber attack When Prevention is Not Enough

? BIG ANOTHER What Is Next?

Next Generation Solutions Identity Analytics Next Generation Cloud Security • Within • Between Systems designed with proactive and preventative detection Next Generation Solutions

The Internet of Things refers to the interconnection of computing devices across the Internet and includes devices as diverse as implanted heart monitors, cows and sheep with biochip transponders, smart buildings, and even the clothes we wear. The Next Big Threat SOURCE: WEARABLE

Beckstrom’s Law If it’s connected to the Internet it’s hackable. Everything is being connected to the Internet. Therefore everything is hackable. Rod Beckstom Beckstrom’s Law

Cybersecurity is a Journey, Not a Destination The cyber threat is evolving and it’s a moving target. Continuing investment is a new business reality. Cybersecurity is a Journey, Not a Destination

THANK YOU Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT