Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
MINISTRY FOR INFORMATION SOCIETY AND TELECOMMINUCATIONS CIRT - Computer Incident Response Team GOVERNMENT OF MONTENEGRO MINISTRY FOR INFORMATION SOCIETY.
Economic and Social Impact of Digital Security Eng. Qusai AlShatti Deputy Director for Information Technology.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
David A. Brown Chief Information Security Officer State of Ohio
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Cyber-Warfare: The Future is Now!
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
CYBER CRIME AND SECURITY TRENDS
Joel Maloff Phone.com February, 2012.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Information Warfare Playgrounds to Battlegrounds.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
Cyber Security Nevada Businesses Overview June, 2014.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 End to End Security on the Smart Grid Perry Jurancich Utilities Vertical Market Development Verizon.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Hurdles in implementation of cyber security in India.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
© Cloud Security Alliance, 2015 Jim Reavis CEO, Cloud Security Alliance.
CYBER WARFARE What is it and what does the future hold?
Information Warfare Playgrounds to Battlegrounds.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Chapter 17: Foreign Policy and National Defense Section 2.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
October 28, 2015 Cyber Security Awareness Update.
Cyber Threat Intelligence Program Primer NASCUS August 1, 2016 Chicago, IL Christina Saari, Senior Cyber Intelligence Officer National Credit Union Administration.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Securing Information Systems
Cybersecurity - What’s Next? June 2017
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
Securing Information Systems
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Challenges and Successes in the Zambian ICT Security Sector
Texas Assisted Living Association 2019 Conference
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Presentation transcript:

Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use

“We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, our air traffic control systems.” President Barack Obama, State of the Union (Feb. 12, 2013) “Increasingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyber intrusions emanating from China on an unprecedented scale.” National Security Adviser Thomas E. Donilon (Mar.11, 2013) “We are also clear-eyed about the challenges in cyber. The United States has expressed our concerns about the growing threat of cyber intrusions, some of which appear to be tied to the Chinese government and military.” Secretary of Defense Chuck Hagel (June 1, 2013) Ambition to penetrate industrial control systems (SCADA) or otherwise to damage or destroy data or systems. Saudi Aramco, RasGas, South Korea DDOS attacks against the financial sector Terrorists and other extremists deface websites, harass, recruit, and fundraise. Syrian Electronic Army Tunisian Cyber Army

Gov’t Warns of More Attacks Credit Cards Stolen Banks Continue to Suffer Attacks New York Times Accuses China of Hacking ECONOMIC ESPIONAGE More Companies Report Cyber Attacks President Issues Cybersecurity Order

Today’s Cyber Threats Malicious activity by hacktivists Financial crimes and other frauds Website defacements Theft of confidential business information and proprietary technology Denial of service (DDOS) attacks Destruction of information and systems

What the USG is Doing E.O , Improving Critical Infrastructure Cybersecurity (2013), –Share information about cyber threats, including with the private sector –Expand cyber security services for critical infrastructure beyond the U.S. defense industrial base –Directs the National Institute of Standards and Technology to establish standards to improve cyber security

NSCS Criminal Division Computer Crimes Expertise National Security Division Intelligence Information USAOs Local relationships and experience National Security Cyber Specialist Network

to combat cyber attacks, we need to work together

no intrusion is to report too small

CRIME SCENE DO NOT CROSS CRIME SCENE DO CRIME SCENE DO NOT CROSS CRIME SCENE DO NOT we will work to minimize CRIME SCENE DO NOT CROSS CRIME SCENE DO NOT CROSS CRIME SCENE DO time and resources required to report intrusions

in return, we will share information when we can U.S. Government Private Sector

IntrusionInvestigation Notification of Customers disclosing an intrusion to customers or the public may affect an ongoing investigation

criminal prosecution for combating intrusions is a powerful, long-term tool

What You Can Do Today Prepare for the worst—hope for the best Organize a crisis-response team within the company Participate in information sharing organizations, like InfraGard or the Electronic Crimes Task Forces Use modern network defense best practices

Cyber Incident Preparation Know your legal agreements with users and partner companies Make sure your IT staff and managing partners are talking regularly Segment your networks (e.g., finance vs. HR/payroll vs. operations) Segment your authentication (e.g., two- factor authentication) Carefully consider the tradeoff between security and productivity Remember: Any network link is a potential intrusion vector Have at least 2 to 3 IT staff members trained in cyber incident response Contact law enforcement as soon as an intrusion is identified

Cyber Incident Response Point of contact for legal, technical (IT), and project management Copies of banners/ computer use agreements Employee handbook, other corporate policies Network topography maps Internal and external IP address and host lists List of network devices (switches, routers, other devices) Incident logs (e.g., security, host, IDS/IPS, web, database, network) Archived network traffic Forensic images of compromised hosts (live memory captures) Physical access logs (video cameras, key cards, TFA devices)

(407) Questions?