Presentation is loading. Please wait.

Presentation is loading. Please wait.

IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.

Similar presentations


Presentation on theme: "IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple."— Presentation transcript:

1 IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple CIBER Global Security Concerns October 2 & 3, 2003 The Philadelphia Federal Reserve

2 “The regulatory, ethical, and legal framework that provide protections to us and individuals and to our business activities at home do not apply abroad.” Overseas Security Advisory Council LMC™

3 Western Europe 28% Latin America 22% Far East/Pacific Is. 14% Mid East/No Africa 11% Eastern Europe 9% South/Central Asia 9% Sub Saharan Africa 7% THREATS BY REGION 2003 to Date LMC™ Overseas Security Advisory Council - 2003

4 Fast Food 35% Religious17% Soft Drink 10% Oil9% Retail9% Financial8% Hotel4% Airline4% Other4% THREATS BY INDUSTRY: 2003 to Date LMC™ Overseas Security Advisory Council - 2003

5 THREATS TO BE CONSIDERED IN AN INTERNATIONAL ENVIRONMENT THREATS TO BE CONSIDERED IN AN INTERNATIONAL ENVIRONMENT  TERRORISM  PERSONAL SECURITY  PERSONNEL SECURITY  PHYSICAL SECURITY OF FACILITY  INFORMATION AND DATA SECURITY  COMMUNICATIONS SECURITY  INFRASTRUCTURE SECURITY LMC™ Overseas Security Advisory Council - 2003

6 THREATS TO BE CONSIDERED IN AN INTERNATIONAL ENVIRONMENT  DISGRUNTLED INSIDERS  CIVIL UNREST AND/OR CULTURAL CONFLICTS  CRIMINAL THREATS  ECONOMIC COMPETITION  ACTS OF INTELLIGENCE SERVICES  ACTS OF WAR LMC™ Overseas Security Advisory Council - 2003

7 LMC™ LESSONS FROM RECENT CYBER ATTACK CASE STUDIES  CYBER ATTACKS IMMEDIATELY ACCOMPANY PHYSICAL ATTACKS  CYBER ATTACKS ARE INCREASING IN VOLUME, SOPHISTICATION, AND COORDINATION  CYBER ATTACKERS ARE ATTRACTED TO HIGH VALUE TARGETS I INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE, 9/22/01

8 LMC™ POTENTIAL SOURCES OF CYBER ATTACKES  TERRORIST GROUPS  TERRORIST SYMPATHIZERS AND ANTI- U.S. HACKERS  TARGETED NATION-STATES  THRILL SEEKERS INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE, 9/22/01

9 LMC™ CYBER ATTACKERS HAVE RECENTLY: DEFACED ELECTRONIC INFORMATION SITES IN THE UNITED STATES AND ALLIED COUNTRIES AND SPREAD DISINFORMATION AND PROPAGANDA. INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE, 9/22/01

10 LMC™ CYBER ATTACKERS HAVE RECENTLY: INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE, 9/22/01 DENIED SERVICE TO LEGITIMATE COMPUTER USERS IN THE U.S. AND ABROAD BY USE OF:  WORMS  VIRUSES  OTHER COMPUTER WEAKNESSES

11 LMC™ CYBER ATTACKERS HAVE RECENTLY: COMMITTED UNAUTHORIZED INTRUSIONS INTO SYSTEMS AND NETWORKS BELONGING TO THE UNITED STATES AND ALLIED COUNTRIES, RESULTING IN CRITICAL INFRASTRUCCTURE OUTAGES AND CORRUPTION OF VITAL DATA. INSTITUTE FOR SECURITY TECHNOLOGY STUDIES AT DARTMOUTH COLLEGE, 9/22/01

12 ONLINE RESOURCES  www.cert.org (The Carnegie Mellon Computer Emergency Response Team) www.cert.org  www.fedcirc.gov (The Federal Computer Incident Response Center) www.fedcirc.gov  www.incidents.org (community and business collaboration of victimization) www.incidents.org  www.ists.dartmouth.edu (The Institute for Security Technology Studies at Dartmouth) www.ists.dartmouth.edu  www.nipe.gov (The National Infrastructure Protection Center) www.nipe.gov  www.sans.org (The System Administration, Networking and Security) www.sans.org LMC™

13 RISK, THREAT & VULNERABILITY CONSIDERATIONS  THREAT = INTENT + CAPABILITY  CAPABILITY = TOOLS + KNOWLEDGE  RISK = THREAT + COUNTERMEASURES  HOW OFTEN WILL THE RISK OCCUR? LMC™ Overseas Security Advisory Council - 2003

14 SECURITY RISK COSTS p LEGAL & DAMAGE CONTROL p EXPECTED REVENUE LOSS p SHAREHOLDER VALUE p REPUTATION (GOOD WILL) p LOSS OF PRODUCTIVITY p MARKET SHARE & TIMING p RELATIONSHIPS WITH CONTRACTORS LMC™

15 FINANCIAL IMPACT OF SECURITY LOSSES p IMPACT TO OTHER PRODUCT DESIGN p EMPLOYEE MORALE p COST TO SERCURE (AFTER THE FACT) p RESEARCH & DEVELOPMENT p SPECIAL EQUIPMENT CAPITALIZED p STAFF RECRUITING & TRAINING p OVERHEAD COSTS p DEBT SERVICE LMC™

16 COST OF PROGRAM PREDICTABILITY OF LOSS COMPUTATION OF INFORMATION LOSS NET PRESENT LOSS OR OR NET PRESENT GAIN NET PRESENT VALUE LMC™

17 EXAMPLE COST OF ONE INFORMATION LOSS $1,000,000.00 COST DIVIDED BY POTENTIAL FOR LOSS TO OCCUR OVER A TEN-YEAR PERIOD. IF ONLY ONCE, DIVIDE BY 10=COST/YR 100,000.00 LESS COST OF PROGRAM/YR 75,000.00 NET PRESENT VALUE -------------------- $ 25,000.00 LMC™

18 SECURITY OBJECTIVES  DETER  DETECT  DELAY  RESPOND  RECOVER LMC™

19 THE MISSION OF NTERNATIONAL SECURITY MANAGEMENT RISK SECURITYATT ITUDE CHANCE LMC™

20 THE MISSION OF NTERNATIONAL SECURITY MANAGEMENT  PEOPLE  INFORMATION  PROPERTY  REPUTATION SECURTY OF: RISK S E C U R I T Y ATTITUDE CHANCE LMC™

21 RISK ASSESSMENT THE ART AND SCIENCE OF MEASURING THE FORESEEABILITY OF EVENTS AFFECTING THE SAFETY AND SECURITY OF ASSETS LMC™

22 EXAMPLES OF WHAT A RISK ASSESSMENT SHOULD CONSIDER  INTELLIGENCE GATHERING  OPERATIONAL ASPECTS OF THE ASSET/FACILITY  NATURE OF NEIGHBORING FACILITIES (OR TENANTS)  ACCESS ROADS TO FACILITY LMC™

23 EXAMPLES OF WHAT A RISK ASSESSMENT SHOULD CONSIDER LMC™  ORGANIZATION’S INCIDENT HISTORY AND ABILITY TO ANALYZE THE DATA  FACILITY MANAGEMENT EFFICIENCY  EFFICIENCY OF EXISTING SECURITY STRATEGY

24 HOW DO WE DETER, DETECT, DENY, RESPOND TO AND/OR RECOVER FROM ATTACKS?  TECHNOLOGY MANAGEMENT  PROCEDURAL MANAGEMENT  SECURITY AWARENESS  INTELLIGENCE GATHERING AND ANALYSIS  LAW ENFORCEMENT MANAGEMENT LMC™

25 STANDARD SECURITY INDUSTRY PRACTICES  PUBLISH SECURITY GUIDELINES  PREPARE SUPPORT MATERIALS  EMPLOYEE & CONTRACTOR(NEW & EXISTING) ORIENTATION  SECURITY AWARENESS TRAINING SECURITY PROJECTS LMC™

26 THE MISSING LINK  PAY ATTENTION TO GOVERNMENT ALERT LEVELS.  CARE ENOUGH TO REPORT SOMETHING THAT DOESN’T LOOK RIGHT TO YOU!  BE AWARE BUT NOT PARANOID LMC™

27 WHAT YOU CAN DO? LMC™ BECOME PART OF THE SOLUTION VS. BEING PART OF THE PROBLEM


Download ppt "IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple."

Similar presentations


Ads by Google