2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.

Slides:



Advertisements
Similar presentations
Cybersecurity and UAV Issues John Rose, Deputy-Director, Public Policy, Region VI.
Advertisements

2000 How many children in the UK have been investigated for social media abuse, offensive Twitter messages and online bullying since How many children.
You can socialise with the internet by using websites such as Facebook, twitter and MySpace. The good things about this is that you can talk to your friends.
David A. Brown Chief Information Security Officer State of Ohio
CURRENT LAWS, FUTURE LEGISLATION, AND PRIVACY ABUSES GROUP Internet Privacy and Security Legislation.
29 May 2006RNSA Workshop 1 Social Implication of National Security RNSA Workshop The risk of public data availability on critical infrastructure protection.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Chris Tan Chris Ye. provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cyber.
Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014.
“Cutting Costs or Cutting Our Throats?” Mark D. Troutman, Ph.D. Associate Director Center for Infrastructure Protection/Homeland Security George Mason.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
© 2014 WESTERN DIGITAL CORP. ALL RIGHTS RESERVED. Company Confidential Legislative & Regulatory Activities Involving Cyber Security Bob Bowen May 2015.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
2 | Cyber, Electronic Warfare, and Critical Infrastructure Strategies for National Security | October 1, 2014 Chatham House Rule “Participants are free.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
THE FEDERAL BUREACRACY Examining the “Fourth Branch.
1 The Military in a Democracy: A U.S. Perspective.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Understanding the Threats of and Defenses Against Cyber Warfare.
Hurdles in implementation of cyber security in India.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
By Alec Sherwood, Billy Myers, Robin Roessner.  Bring attention to government proposed legislation  Talk about:  SOPA  PIPA  ACTA  CISPA  Database.
 Vetting: To make a careful and critical examination of (something).
1 Interel McAfee research survey The 2012 Olympic Games and cybersecurity MPs, Business People and Journalists June - July 2011.
INTRODUCTION & QUESTIONS.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Government Agencies. State Department 1789 French Revolution caused us to think about having an agency that deals with other countries Secretary of State.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
Chapter 17: Foreign Policy and National Defense Section 2.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
TOTAL POLICING LDSC: Protecting London’s Business Community. Presentation to.
THE FEDERAL BUREACRACY Examining the “Fourth Branch”
Office of the Chief Privacy Officer Update June 23, 2016 Lucia Savage, JD, Chief Privacy Officer, ONC.
Cook Children’s 1 Theresa Meadows, RN, MS, CHCIO Senior Vice President and CIO Co-Chair HHS Health Care Cyber Security Task Force July 2016 Cybersecurity:
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Cybersecurity Outlook for 2011
Rule By Desks—Bureaucracy
Nation State Actors Lex Dunlap.
Security Challenges for Digital India Program
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Enterprise Mobility Suite Technical and Business Briefing
Cybersecurity in the United States
Enterprise risk management
Liberty International Underwriters
Cybersecurity Education & Awareness Overview
Unit 32 – Networked Systems Security
White Hat vs. Black Hat White Hat Black Hat
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
LO1 - Know about aspects of cyber security
No!. [NEXT SLIDE] LOGO HERE.
NPHS 1510 Federal and International
Presentation transcript:

2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

Outline and Review One of the biggest challenges in Cybersecurity intelligence has been the lack of intelligence. Companies are not sharing /collaborating to overcome many of the threats currently facing organizations is predicted to be the year when we may overcome many of these challenges Articles/Topics Discussed: Obama Endorses CISPA Obama talks cybersecurity, but Federal IT system breaches increasing Obama talks cybersecurity, but Federal IT system breaches increasing Cyber War Games

Cyber Intelligence and Information Sharing Act (CISPA) Originally introduced in 2013 Passed the House but not Senate Reintroduced earlier this week with administration support. Allows companies to share cyber threat information with the Dept. of Homeland Security Argument by leaders: “We must stop dealing with cyber attacks after the fact.” (in reference to recent Sony hack)

Figure 2-1 Information Security and Planning Source: Course Technology/Cengage Learning CISPA: Controversial? Under CISPA 2015 (HR 234), the Secretary of Homeland Security, the Attorney General, the Director of National Intelligence, and the Secretary of Defense would create the cyber threat information sharing program and also provide oversight for the program’s civil liberties protections. CISPA 2015 also mandates privacy and civil liberties reports, but allows government agencies to classify the annexes to the reports. In other words, CISPA 2015 does not intend to have any real oversight for civil liberties and privacy. Cyber threat information shared with the government would also be exempt from the Freedom of Information Act. It would give immunity from criminal prosecution and lawsuits to anyone sharing cyber threat information with the government.

Federal IT & Cybersecurity Recent Actions: Pledging Free and Open Internet Broadband expansion Embrace Cyber Security Legislation Federal Government IT Professionals Poor track record 2006 – 5,503 cyber breaches on federal IT systems Any guesses how many last year? By 2013, 40% of federal breaches involved potential exposure of private data

Cyber War Games US and UK have agreed to hold the first Cyber War Games later this year Target: UK Banks The first war game will involve the Bank of England and commercial banks, targeting the City of London and Wall Street, and will be followed by "further exercises to test critical national infrastructure", Downing Street said

What’s involved in Cyber War Games? Step up from penetration tests Pen tests generally target computers (internal staff know) Cyber game attack will test the internal staff as they won’t know how or when the attack will occur. Not entirely new Waking Shark bank staff reacting to a series of different problems such as ATM networks failing or phone systems breaking down, to see how response teams fared.  Nato 2014 Wargame Involved 700 soldiers and civilians across 28 nations 3 day exercise involving 100 attacks (from booby-trapped apps sent to Android phones to compromising equipment from firms supplying military material