SlideShare a Scribd company logo
1 of 15
Download to read offline
Jamaica:	
  Vic)m	
  or	
  perpetrator	
  
of	
  cyber	
  crime	
  and	
  intrusions?	
  

     INFOSEC	
  Execu)ve	
  Breakfast	
  	
  
      Kingston,	
  Jamaica	
  	
  Ÿ	
  	
  26	
  June	
  2012	
  
Cyber	
  incidents	
  not	
  widely	
  reported	
  
              in	
  the	
  Caribbean	
  
A	
  few	
  possible	
  excep.ons:	
  
•  Tax	
  Administra.on	
  of	
  Jamaica	
  –	
  June	
  2012	
  
•  Hacking	
  of	
  Trinidad	
  &	
  Tobago	
  Parliament	
  
     website	
  –	
  April	
  2012	
  
•  Hacking	
  of	
  Trinidad	
  &	
  Tobago	
  Ministry	
  of	
  
     Finance	
  website	
  –	
  March	
  2012	
  
•  DDoS	
  aHack	
  LIME	
  Barbados	
  network	
  –	
  March	
  
     2012	
  
What	
  do	
  Caribbean	
  network	
  security	
  
experts	
  think	
  about	
  cyber	
  security	
  in	
  
                 the	
  region?	
  
Intrusions	
  are	
  highly	
  prevalent	
  in	
  the	
  
                  Caribbean	
  
•  Success	
  rate	
  of	
  aHempts	
  unknown	
  
•  Top	
  sources	
  for	
  threats	
  –	
  Russia,	
  China,	
  HK	
  
•  Organisa.ons	
  have	
  a	
  narrow	
  view	
  of	
  security	
  
•  Caribbean	
  has	
  not	
  commiHed	
  the	
  necessary	
  
   resources	
  or	
  effort	
  to	
  strengthen	
  frameworks	
  
•  In	
  addi.on	
  to	
  threats	
  in-­‐country,	
  Caribbean	
  
   countries	
  can	
  be	
  used	
  as	
  jump-­‐off	
  points	
  for	
  
   aHacks	
  in	
  other	
  countries	
  
What	
  is	
  the	
  situa)on	
  in	
  Jamaica?	
  
A	
  legal	
  &	
  enforcement	
  framework	
  	
  
             exists	
  for	
  cyber	
  crime	
  
•  Cybercrimes	
  Act	
  2010	
  exists	
  along	
  with	
  a	
  
   Cybercrime	
  Unit	
  (CCU)	
  
•  CCU	
  can	
  only	
  enforce	
  with	
  coopera.on	
  of	
  
   vic.ms	
  and	
  other	
  affected	
  interests	
  
•  Unit	
  has	
  its	
  hand	
  full	
  tackling	
  local	
  crimes	
  plus	
  
   loHo/telemarke.ng	
  scams	
  targeted	
  at	
  the	
  US	
  
•  LoHo	
  scams	
  are	
  affec.ng	
  country’s	
  reputa.on	
  
   –	
  “Beware	
  876”	
  campaign	
  
CCU	
  tackled	
  32	
  cases	
  in	
  2011	
  
So	
  far,	
  Jan—May	
  2012:	
  26	
  cases	
  
CCU	
  data	
  doesn’t	
  tell	
  us	
  much	
  
•  Incidents	
  reported	
  as	
  cyber	
  crimes	
  are	
  done	
  
   according	
  to	
  Cybercrimes	
  Act	
  
•  CCU’s	
  main	
  goal	
  is	
  prosecu.on	
  
•  Focus	
  likely	
  to	
  be	
  incidents	
  origina.ng	
  in	
  
   Jamaica	
  
•  LiHle	
  or	
  possibly	
  no	
  framework	
  for	
  incidents	
  
   affec.ng	
  Jamaicans	
  but	
  origina.ng	
  elsewhere	
  
•  Cases	
  reported	
  to	
  CCU	
  only	
  a	
  drop	
  in	
  the	
  
   bucket	
  	
  
How	
  can	
  
we	
  stem	
  
the	
  )de?	
  
Cyber	
  incidents	
  can	
  be	
  	
  
              debilita)ng	
  and	
  isola)ng	
  
•  Majority	
  of	
  organisa.ons	
  are	
  unaware	
  that	
  
   they	
  have	
  been	
  compromised	
  
•  Incidents	
  cost	
  organisa.ons	
  $MM	
  –	
  .me,	
  
   revenues,	
  produc.vity,	
  remedia.on	
  
•  Many	
  organisa.ons	
  could	
  be	
  having	
  iden.cal	
  
   experiences	
  –	
  unbeknownst	
  to	
  the	
  other	
  
•  Oaen	
  limited	
  insight	
  into	
  scope	
  of	
  incidents	
  -­‐	
  	
  
   frequency,	
  characteris.cs,	
  paHerns,	
  possible	
  
   solu.ons,	
  etc.	
  
Internally,	
  we	
  must	
  be	
  beUer	
  
          prepared	
  and	
  equipped	
  
•  Comprehensively	
  examine	
  systems,	
  networks,	
  
   equipment	
  
•  Strategically	
  establish	
  priori.es	
  &	
  
   con.ngencies	
  
•  Invest	
  in	
  the	
  con.nual	
  maintenance	
  and	
  
   update	
  of	
  defences	
  
•  Exercise	
  even	
  greater	
  vigilance	
  	
  
•  Support	
  staff	
  training	
  and	
  capacity	
  building	
  
We	
  must	
  also	
  be	
  prepared	
  to	
  
        establish	
  trust	
  rela)onships	
  
CERTs/CSIRTs	
  are	
  urgently	
  needed:	
  
•  Provide	
  expert	
  informa.on	
  and	
  support	
  
•  Supplement	
  internal	
  security	
  plans/structures	
  	
  
•  Increase	
  awareness	
  of	
  incidents	
  -­‐	
  frequency,	
  
   characteris.cs,	
  commonali.es,	
  possible	
  
   solu.ons,	
  etc.	
  
•  Ensure	
  that	
  appropriate	
  industry	
  standards	
  
   and	
  prac.ces	
  are	
  established	
  
 
     Thank	
  you!	
  




         Michele	
  Marius	
  
       Blog:	
  	
  ict-­‐pulse.com	
  
FB:	
  facebook.com/ICTPulse	
  
        TwiHer:	
  @ictpulse	
  
Image	
  credits	
  
•      Stethoscope:	
  dreams	
  designs	
  /	
  FreeDigitalPhotos.net,	
  
       hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=1449	
  

•      Binocular	
  image:	
  Ntwowe	
  /	
  FreeDigitalPhotos.net,	
  
       hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=2043	
  	
  

•      Hermosa	
  Wave	
  image:	
  watch4u	
  /	
  flickr,	
  hHp://www.flickr.com/photos/look4u/	
  
	
  

More Related Content

What's hot

Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 

What's hot (19)

2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Maersk Notpetya Crisis Response Case Study
Maersk Notpetya Crisis Response Case StudyMaersk Notpetya Crisis Response Case Study
Maersk Notpetya Crisis Response Case Study
 
(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
 
The Challenge of Anti Corruption in the Eastern Europe
The Challenge of  Anti Corruption in the Eastern EuropeThe Challenge of  Anti Corruption in the Eastern Europe
The Challenge of Anti Corruption in the Eastern Europe
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
2004 07 intelligence new rules seminar
2004 07 intelligence new rules seminar2004 07 intelligence new rules seminar
2004 07 intelligence new rules seminar
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conference
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
Webroot Antivirus Web Security
Webroot Antivirus Web Security Webroot Antivirus Web Security
Webroot Antivirus Web Security
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
CTPAT and Cybersecurity.
CTPAT and Cybersecurity.  CTPAT and Cybersecurity.
CTPAT and Cybersecurity.
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 

Viewers also liked

122912 public notification (obama & pay pal attacks) -slovak
122912   public notification (obama & pay pal attacks) -slovak122912   public notification (obama & pay pal attacks) -slovak
122912 public notification (obama & pay pal attacks) -slovak
VogelDenise
 
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
Nexus Art'Hit
 
DANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVELDANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVEL
VogelDenise
 
01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)
VogelDenise
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopment
PaolaReyesR
 
Lecture 2 3 protein chemistry
Lecture 2 3 protein chemistryLecture 2 3 protein chemistry
Lecture 2 3 protein chemistry
Abo Ali
 
01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)
VogelDenise
 
Research
ResearchResearch
Research
KIMSOP
 
021013 adecco email (dutch)
021013   adecco email (dutch)021013   adecco email (dutch)
021013 adecco email (dutch)
VogelDenise
 

Viewers also liked (20)

03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
 
122912 public notification (obama & pay pal attacks) -slovak
122912   public notification (obama & pay pal attacks) -slovak122912   public notification (obama & pay pal attacks) -slovak
122912 public notification (obama & pay pal attacks) -slovak
 
Bonpu Zen Spa, Chicago, IL.
Bonpu Zen Spa, Chicago, IL.Bonpu Zen Spa, Chicago, IL.
Bonpu Zen Spa, Chicago, IL.
 
Hromadná korepsondence
Hromadná korepsondenceHromadná korepsondence
Hromadná korepsondence
 
Proj erg sala_controle
Proj erg sala_controleProj erg sala_controle
Proj erg sala_controle
 
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
 
Persian 021912 email tounitedstatescongress
Persian   021912 email tounitedstatescongressPersian   021912 email tounitedstatescongress
Persian 021912 email tounitedstatescongress
 
DANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVELDANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVEL
 
01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)
 
Bonpu Restaurant Chicago, IL.
Bonpu Restaurant Chicago, IL.Bonpu Restaurant Chicago, IL.
Bonpu Restaurant Chicago, IL.
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopment
 
Lecture 2 3 protein chemistry
Lecture 2 3 protein chemistryLecture 2 3 protein chemistry
Lecture 2 3 protein chemistry
 
Malay 040412
Malay 040412Malay 040412
Malay 040412
 
CIPR PRide Awards East Anglia
CIPR PRide Awards East AngliaCIPR PRide Awards East Anglia
CIPR PRide Awards East Anglia
 
Cardapio 1a15
Cardapio 1a15Cardapio 1a15
Cardapio 1a15
 
Madd 2007
Madd 2007Madd 2007
Madd 2007
 
01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)
 
Research
ResearchResearch
Research
 
021013 adecco email (dutch)
021013   adecco email (dutch)021013   adecco email (dutch)
021013 adecco email (dutch)
 
Share This Too launch - social media highlights
Share This Too launch - social media highlightsShare This Too launch - social media highlights
Share This Too launch - social media highlights
 

Similar to Jamaica: victim or perpetrator of cyber crime and intrusions (final)

Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
PECB
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
James Fisher
 

Similar to Jamaica: victim or perpetrator of cyber crime and intrusions (final) (20)

David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Jamaica: victim or perpetrator of cyber crime and intrusions (final)

  • 1. Jamaica:  Vic)m  or  perpetrator   of  cyber  crime  and  intrusions?   INFOSEC  Execu)ve  Breakfast     Kingston,  Jamaica    Ÿ    26  June  2012  
  • 2. Cyber  incidents  not  widely  reported   in  the  Caribbean   A  few  possible  excep.ons:   •  Tax  Administra.on  of  Jamaica  –  June  2012   •  Hacking  of  Trinidad  &  Tobago  Parliament   website  –  April  2012   •  Hacking  of  Trinidad  &  Tobago  Ministry  of   Finance  website  –  March  2012   •  DDoS  aHack  LIME  Barbados  network  –  March   2012  
  • 3. What  do  Caribbean  network  security   experts  think  about  cyber  security  in   the  region?  
  • 4. Intrusions  are  highly  prevalent  in  the   Caribbean   •  Success  rate  of  aHempts  unknown   •  Top  sources  for  threats  –  Russia,  China,  HK   •  Organisa.ons  have  a  narrow  view  of  security   •  Caribbean  has  not  commiHed  the  necessary   resources  or  effort  to  strengthen  frameworks   •  In  addi.on  to  threats  in-­‐country,  Caribbean   countries  can  be  used  as  jump-­‐off  points  for   aHacks  in  other  countries  
  • 5. What  is  the  situa)on  in  Jamaica?  
  • 6. A  legal  &  enforcement  framework     exists  for  cyber  crime   •  Cybercrimes  Act  2010  exists  along  with  a   Cybercrime  Unit  (CCU)   •  CCU  can  only  enforce  with  coopera.on  of   vic.ms  and  other  affected  interests   •  Unit  has  its  hand  full  tackling  local  crimes  plus   loHo/telemarke.ng  scams  targeted  at  the  US   •  LoHo  scams  are  affec.ng  country’s  reputa.on   –  “Beware  876”  campaign  
  • 7. CCU  tackled  32  cases  in  2011  
  • 8. So  far,  Jan—May  2012:  26  cases  
  • 9. CCU  data  doesn’t  tell  us  much   •  Incidents  reported  as  cyber  crimes  are  done   according  to  Cybercrimes  Act   •  CCU’s  main  goal  is  prosecu.on   •  Focus  likely  to  be  incidents  origina.ng  in   Jamaica   •  LiHle  or  possibly  no  framework  for  incidents   affec.ng  Jamaicans  but  origina.ng  elsewhere   •  Cases  reported  to  CCU  only  a  drop  in  the   bucket    
  • 10. How  can   we  stem   the  )de?  
  • 11. Cyber  incidents  can  be     debilita)ng  and  isola)ng   •  Majority  of  organisa.ons  are  unaware  that   they  have  been  compromised   •  Incidents  cost  organisa.ons  $MM  –  .me,   revenues,  produc.vity,  remedia.on   •  Many  organisa.ons  could  be  having  iden.cal   experiences  –  unbeknownst  to  the  other   •  Oaen  limited  insight  into  scope  of  incidents  -­‐     frequency,  characteris.cs,  paHerns,  possible   solu.ons,  etc.  
  • 12. Internally,  we  must  be  beUer   prepared  and  equipped   •  Comprehensively  examine  systems,  networks,   equipment   •  Strategically  establish  priori.es  &   con.ngencies   •  Invest  in  the  con.nual  maintenance  and   update  of  defences   •  Exercise  even  greater  vigilance     •  Support  staff  training  and  capacity  building  
  • 13. We  must  also  be  prepared  to   establish  trust  rela)onships   CERTs/CSIRTs  are  urgently  needed:   •  Provide  expert  informa.on  and  support   •  Supplement  internal  security  plans/structures     •  Increase  awareness  of  incidents  -­‐  frequency,   characteris.cs,  commonali.es,  possible   solu.ons,  etc.   •  Ensure  that  appropriate  industry  standards   and  prac.ces  are  established  
  • 14.   Thank  you!   Michele  Marius   Blog:    ict-­‐pulse.com   FB:  facebook.com/ICTPulse   TwiHer:  @ictpulse  
  • 15. Image  credits   •  Stethoscope:  dreams  designs  /  FreeDigitalPhotos.net,   hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=1449   •  Binocular  image:  Ntwowe  /  FreeDigitalPhotos.net,   hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=2043     •  Hermosa  Wave  image:  watch4u  /  flickr,  hHp://www.flickr.com/photos/look4u/