Class 8 The State of Cybercrime Today- Threads & Solutions.

Slides:



Advertisements
Similar presentations
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Advertisements

A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Lessons Learned in Smart Grid Cyber Security
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
Multi-faceted Cyber Security Research Group edited strategy.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Changing World of Endpoint Protection
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Consistency in Reporting Data Breaches
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
© 2014 Cisco and/or its affiliates. All rights reserved.Cisco Confidential 1 Cisco & The “CLOUD” David Matz Product Specialist – Northeast Service Provider.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Enterprise Network Security Threats that are Overlooked.
Total Enterprise Mobility Comprehensive Management and Security
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Surveillance and Security Systems Cyber Security Integration.
Cybersecurity as a Business Differentiator
Cyber in Financial Services
The time to address enterprise mobility is now
Information Security Program
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Cyber Security: State of the Nation
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Impact of IT Consumerisation on Enterprise Security
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
I have many checklists: how do I get started with cyber security?
Company Overview & Strategy
Cloud Security An IaaS Story 2018 © Netskope. All rights reserved.
Threat Landscape for Data Security
Strong Security for Your Weak Link:
Securing the Threats of Tomorrow, Today.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
The State of Cybersecurity in State Government NAST March 26, 2019
MAZARS’ CONSULTING PRACTICE
Session 8: Innovative Uses of Captives: Cyber and Beyond
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Class 8 The State of Cybercrime Today- Threads & Solutions

Webinars on State of Cybercrime Today The top trends in Cybercrime today & how they are manifesting themselves in different market sectors Where cybercrime is coming from The business impact of cybercrime and the primary concerns Why these criminals are so successful What is wrong with various aspects of security today (people, process, technology, etc.) Effective solutions to combat cybercrime

Cybercrime continues to grow in scope and scale, with losses to consumers and businesses across numerous sectors in many countries. Speakers: Brent Conran, CISA, CISM, CCSE, CISSP, CSO, McAfee Lisa O’Connor, Senior Executive, Accenture Security Practice Eddie Schwartz, CISA, CISM, PMP, CISSP, ISSEP, VP and CISO, RSA Cybercrime-Today-Threats-and-Solutions.aspx

Discussion Q & A New cyber security trend in mobility. How does mobility affect cyber security? What is the projected # of malware application on android & IOS models? What is Hacktivism? What is Ransomware- Account takeover of high value accounts (blitzkrieg, Citadel ) – Criminals are leveraging big data to increase effectiveness of attacks & sophistication of analytics in data minding Why does Cybercrime pays today? – There is no justice system in place today to prosecute. No threat to prosecution What is weaponization? – Stuknet, Saudi Arabia Ramco (80% sys down). What industry are more of a target? – Critical infrastructure, intellectual property, banking, healthcare, manufacturing, etc. What is the business impact? – Risk to brand, reputation, intellectual property loss, nationalize infrastructure due to cyber security issue The questions is not WHO but WHEN will you going to be attack

What are the biggest obstacles to security? – Privacy and education, need M2M communication as appose to P2P communication. P2P is too slow to react to crime. Enterprise do security & not enough compliance How do Security folks get Executive’s attention to give resources to prevent Cyber crime? – Communication skills, put a valuation on program effectiveness, have a plan ready to get the $, deconstruct bits/bite to understandable business language, use of visualizations to show the impact (tableau tool) Should Security be outside of IT? No! What are some of the technology failures today? Why are the criminals winning? – Over focus on compliance vs security – Security on-clays- identify intellectual property moving it deeper in the infrastructure (defense-in-depth) – You Can’t security everything. There needs to be degrees of risks & security applied to inventoried assets ( classifications) – Current environment don’t have an identity broker across the internet-De- facto way to authenticate across the network. – Security basics are not prevalent everywhere

What are End user concerns such as spear fishing attracts? – End user don’t care or may care but there is Persistent Advance Threats (PAT)to try to put bad stuff on the devices to then taking info off the devices. – Adaptive authentication ( where U coming from, bio metric) “People are the new perimeter” – Training users to be more sensitive to security. Feedback to end-users real-time – (context sensitive training) – Use tools to check-in your device for the right security posture What is the Holy Grail of Security? – Internal Controls Who has this responsibility – Everybody is responsible. Business leaders needs to partner with Security to make it work-collaborative approach – Integrate security control into the key business process. – Seek help from the expert on security when you are a small firm

What can you do to be secure? – Training – Get the experts to help set the right security posture – Have a strategy for mobility & cloud – Subnet the architecture (defense-in-depth) – Data classifications (protect high-value assets) What is the approach for the Cloud? – Define the type of cloud you use (IAS, ASS, etc.) – Have an internal cloud. Migration of virtualization to internal cloud to hybrid cloud. Sm org. will go all cloud – Have an EXIT strategy for when you need to bring intellectual property back in-house – Understand the services you are getting- have an SLA. – Carefully select what you want to put on cloud – Understand risks and what is covered & not in the cloud