The Global Challenges of Cybersecurity and Digital Terrorism

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Network Vulnerability Scanning Xiaozhen Xue Dept. of Computer Science Texas Tech University, USA Akbar Siami Namin Dept. of Computer.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
GSC: Standardization Advancing Global Communications 1 The New US-CCU Cyber-Security Check List SOURCE:U.S. Cyber Consequences Unit (Submitted by TIA)
Cyber Crimes.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
SafeZone® patent pending 1 Detect. Inform. Prevent. Metcalf Attack #2 August 27, 2014 SafeZone® Detect. Inform. Prevent.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Adversary Defense: Past, Present, Future Presenter’s Name Here Presenter’s Title Here.
1 The Threatscape is evolving rapidly A.Prove capabilities? B.Exact revenge? C.Erode our confidence? D.Perpetrate fraud in the background via the contact.
Cyber Threats Scenarios and Defense Model Principles ASSOCHAM Cyber Security Conference April 2011 Presented by Dr. Nimrod Kozlovski, Chairman,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
7 Information Security.
Cyber Security Nevada Businesses Overview June, 2014.
The Changing World of Endpoint Protection
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
By. Andrew Largent COSC-480. Upstream Intelligence (UI) is data about IP’s, domains and Autonomous System Numbers (ASN) acting or representing the presence.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
The Cyber Wars BRIAN ABDO. Geopolitical Agendas  Upswing in hacking with governmental agendas.  Their purpose is to discover information from the targeted.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
October 28, 2015 Cyber Security Awareness Update.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
U.S. NATIONAL CYBERSECURITY BY: SEIF ABOU NAR. WHY ARE WE TALKING ABOUT CYBERSECURITY? Attacks received the attention of president Clinton and Attorney.
Proactive Incident Response
Industrial Control System Cybersecurity
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cybersecurity, competence and preparedness
Six Steps to Secure Access for Privileged Insiders and Vendors
Healthcare Cybersecurity: State of Industry
2016 Data Breach Investigations Report
Network Security Fundamentals
Level 2 Diploma Unit 11 IT Security
Public Facilities and Cyber Security
Cyber Security: State of the Nation
Computer Crime CJ 520 / CJ October 27, 2010.
What is Computer Security
Six Steps to Secure Access for Privileged Insiders and Vendors
Cyber Security Awareness Workshop
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Dissecting the Cyber Security Threat Landscape
Forensics Week 11.
CSI Survey 2007 Tiffany Gorman
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
Join In Be Secure Presentation
Cybersecurity at PJM Jonathon Monken
Home Internet Vulnerabilities
Top Security Priorities 2018
Prepared By : Binay Tiwari
David J. Carter, CISO Commonwealth Office of Technology
CRITICAL INFRASTRUCTURE CYBERSECURITY
The Practical Side of Meaningful Use:
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Defense in Depth: Windows 8.1 Security
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Digital Vault Market revenue.
Cybersecurity at PJM Jonathon Monken
Cybersecurity and its Relevance to CIT
Presentation transcript:

The Global Challenges of Cybersecurity and Digital Terrorism World Services Group 2018 Annual Meeting Rick Ledgett Copyright The Ledgett Group, 2018. All rights reserved.

Copyright The Ledgett Group, 2018. All rights reserved. “But I’m Not a Target!” National security or defense related information Banking information Intellectual property M&A, IPOs, draft annual reports…. Aggregated personally identifiable information (not just credit cards) Connections to others (bank shots) In the splash zone Copyright The Ledgett Group, 2018. All rights reserved.

Copyright The Ledgett Group, 2018. All rights reserved. How Do They DO That?? Mainly spear-phishing Some credential theft from unsecured WiFi Some watering-hole attacks Overwhelmingly focused on known vulnerabilities with patches available Copyright The Ledgett Group, 2018. All rights reserved.

Insiders Are One of Your Biggest Threats Unintentional Install unauthorized equipment Plug in media Intentional Direct theft Network changes Provide credentials Copyright The Ledgett Group, 2018. All rights reserved.

Copyright The Ledgett Group, 2018. All rights reserved. Who ARE These Guys? The usual (state-sponsored) suspects Russia, China, Iran, North Korea Other nations with cyber capabilities (over 100) Moonlighting High end criminal groups Agenda-driven actors Anyone who can access the dark web Copyright The Ledgett Group, 2018. All rights reserved.

“Abandon Hope All Ye Who Enter Here…” Nobody is unhackable If a determined nation-state or high end criminal group wants you…. Advantage goes to the attacker Strong incentives to continually find new vulnerabilities and develop new exploits Increasingly complex software and networks introduce much greater risk Copyright The Ledgett Group, 2018. All rights reserved.

….But There Are Things You Can Do Defend your network Defense in depth No silver bullet (despite what marketers claim) Detect breaches Behavioral analytics Also good for insider threat detection Have a plan and exercise, exercise, exercise Copyright The Ledgett Group, 2018. All rights reserved.