Cybersecurity and its Relevance to CIT

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
The cloud is not safe Pract The Facts. Click to see video Illegal Activity Online Pract The Facts.
Overview of Cybercrime
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Security Mindset Lesson Introduction Why is cyber security important?
Internet Security and Implications on Transportation Systems 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
By. Andrew Largent COSC-480. Upstream Intelligence (UI) is data about IP’s, domains and Autonomous System Numbers (ASN) acting or representing the presence.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Dual Benefits from Applications of Innovative Transportation Security Technologies Mike Dinning U.S. Department of Transportation Volpe National Transportation.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security – Current Challenges
Financial Institutions – Cyber Risk
Managing a Cyber Event Steven P. Gibson President
The Third Wave of Hacking Cyber-Crime as a Service
Public Facilities and Cyber Security
Information Technology Sector
A Project on CYBER SECURITY
PowerPoint Template The Coolest Design Type something here
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
Speaker Name Title of Presentation
Speaker Name Title of Presentation
BUSINESS REPROT TEMPLATE
Staff Training Type your subject here.
Cyber Trends and Market Update
Names, titles & Affiliations
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Welcome To Coolsummer 95% From 2015 COOL SUMMER
Names, titles & Affiliations
INFORMATION SYSTEMS SECURITY and CONTROL
NAME OF PRESENTATION Company Name.
Names, titles & Affiliations
Names, titles & Affiliations
The Global Challenges of Cybersecurity and Digital Terrorism
Title of Article Topic By: Your Name Homeroom.
Names, titles & Affiliations
PROJECT TEAM STRUCTURE
Names, titles & Affiliations
Despicable me, Little YELLOW.
Protect Your Ecommerce Site From Hacking and Fraud
Forensic and Investigative Accounting
WELCOME Welcome to the Business Presentation Template
National Information Assurance (NIA) Policy
Staff Training Type your subject here.
S O W T | SWOT Analysis Sample Opportunities Strenghts Threats
Presentation Title Goes Right Here
Horizontal Organization Chart SmartArt
8 Name Here years PROFILE EXPERIENCE EDUCATION SKILLS of experience
NAME OF THE COMPANY PITCH DECK. DESIGN BY © SLIDELAB ABOUT US Insert example #1 here Insert example #2 here Insert example #3 here Insert example #4 here.
CLICK TO EDIT MASTER TITLE Click to edit Master subtitle style.
Paper/presentation title
Business Flat General Ppt Template LOGO
Title Slide Templates.
2019 PRESENTATION TITLE LOGO
8 Name here years PROFILE EXPERIENCE EDUCATION SKILLS of experience
Presentation transcript:

Cybersecurity and its Relevance to CIT

CIT is part of this ecosystem. US Department of Homeland Security has identified a growing digital threat to surface transportation in general. Relatively unsophisticated attacks have successfully disrupted the system. CIT is part of this ecosystem. From DHS Small scale attacks have shown that a relatively simple intrusion could upend surface transportation services causing significant harm and disruption. As Cyber actors become more sophisticated and transportation systems are increasingly reliant on technology the vulnerability grows.

Cyber Threats Terrorism Crime Espionage Hacktivism Extortion Terrorism- Take control to inflict human and economic damage for revenge Crime- Steal personal information for profit through identity theft and fraud Espionage-Steal intellectual property or proprietary data for competitive gain Hacktivism- Release sensitive data as punishment for real/perceived injustice Extortion- Take sole control of data for ransom *** Mineta Transportaion institute *** Mineta Transportation institute

Enterprise operating systems of CIT carriers are high value targets. These systems control all facets of the companies’ route logistics, inventory management, data surrounding pickups, deliveries, pavement amounts and are at significant risk of business interruption, hijack and ransom and state-sponsored cyber-attack.

Cyber Risks Delivery Customer Competitive Disclosure Product Delivery- Revenue loss form inability to deliver products and services Customer-Reduced revenue resulting from lack of confidence (brand) Competitive- Reduced profitability resulting from theft of confidential information Disclosure- Reduced net income resulting from theft of personal information Product- Reduced net income resulting from liability claims of inadequate care *** Mineta Transportation institute *** Mineta Transportation institute

Safeguarding valuables increasingly must be more than physical security with guards, armored truck and vaults. The industry must act proactively to protect cyber assets and technology infrastructure, as huge portions of deposits become digitized as they enter the federal banking system.

Past as Prelude to the Future - Target Evolution to Scale Over Time 1980’s onward Credit card users targeted 2000’s onward Online banking users targeted Core banking systems targeted SWIFT system and other international analogues 2016 onward Attacks on these targets are increasingly sophisticated and have been spectacularly successful due to their scale. Lorem ipsum dolor sit amet Sed do eiusmod tempor incididunt ut labore

Increased connectivity creates the need for greater collaboration. Greater connectivity creates greater interdependence, to mitigate this risk carriers, institutions and customers must embrace collaboration.

Compliance / Security Are we doing enough???? No one is doing enough