SlideShare a Scribd company logo
1 of 11
CRITICAL
INFRASTRUCTURE
AND CYBER THREAT
SAFER CITIES. THRIVING COMMUNITIES.
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
Critical Infrastructure sectors
have become prime targets
for cyber criminals due to
their vitality to a nation’s
security and stability.
16 CRITICAL
INFRASTRUCTURE SECTORS
Department of Homeland Security classified the top 16 sectors at risk to cyber attacks
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
16 CRITICAL
INFRASTRUCTURE SECTORS
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
1. CHEMICAL
2. COMMERCIAL FACILITIES
3. COMMUNICATIONS SECTOR
4. CRITICAL MANUFACTURING
5. DAMS
6. DEFENSE INDUSTRIAL BASE
7. EMERGENCY SERVICES
8. ENERGY
9. FINANCIAL SERVICES
10. FOOD AND AGRICULTURE
11. GOVERNMENT FACILITIES
12. HEALTHCARE AND PUBLIC HEALTH
13. INFORMATION TECHNOLOGY
14. NUCLEAR REACTORS, MATERIALS, AND WASTE
15. TRANSPORTATION SYSTEMS
16. WATER AND WASTEWATER
DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT
RISK TO CYBER ATTACKS
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
INTERCONNECTED
SYSTEMS
• The continued increase of
interconnected systems and
devices provide cyber criminals
limitless attack vectors. 25 billion
networked devices are projected
by 2020.
Source: ITU’s Trends in Telecommunication Reform 2015,
http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
MALWARE OUTBREAK
• 1 million new malware instances released every day
• Ransomware attacks soared 113% in prior year
• Increasing number of zero day attacks
Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/
2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
UNAUTHORIZED CONNECTIONS
CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST
Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf
*Risk Ratio of Spear-Phishing Attacks by Industry
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
INDUSTRY RISK RATIO* INDUSTRY RISK RATIO”
Mining
Wholesale
Manufacturing
Transportation,
Communications,
Electric, Gas &
Sanitary Services
Public Administration
(Government)
Finance, Insurance
& Real Estate
44%
34%
33%
29%
21%
21%
1 in 3.41 in 2.3
1 in 2.9
1 in 3.0
1 in 3.4
1 in 4.8
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
SOURCE:, InformationWeek's 2013 enterprise security survey,
http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic-
Security-Survey.html
BRING YOUR
OWN DEVICE
(BYOD)
• 45% of organizations have had
a mobile device containing
enterprise data reported missing
• 11% have experienced a data
breach requiring public disclosure
SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft-
subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html
IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras-
installed-globally-in-2014
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
FIXED CAMERA
• More than 210 million CCTV
cameras worldwide
• 73,011 locations with unsecured
cameras in 256 countries
INSIDER THREAT
• 55% of threats come from insider abuse or misuse
• 32% of organizations report insider crimes are more
costly or damaging than incidents caused by outsiders
SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
Motorola Solutions has in depth experience, expertise and
robust capability to assist with today's cyber risk challenges.
We take a comprehensive approach to help customers
• Evaluate Environment
• Assess Threats
• Manage Risk
Unique to each customer's operational setting.
Visit us at motorolasolutions.com/cybersecurity
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
THANK YOU!

More Related Content

What's hot

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 

What's hot (20)

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Fundamentals of IoT Security
Fundamentals of IoT SecurityFundamentals of IoT Security
Fundamentals of IoT Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security
cyber securitycyber security
cyber security
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 

Viewers also liked

Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2
Advantec Distribution
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Juniper Networks
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
Vertical Solutions
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
Symplified
 

Viewers also liked (17)

Good Rules for Bad Apps - Shem magnezi
Good Rules for Bad Apps - Shem magnezi Good Rules for Bad Apps - Shem magnezi
Good Rules for Bad Apps - Shem magnezi
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer Cities
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
 
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew James
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
TXT Next Presentation
TXT Next Presentation TXT Next Presentation
TXT Next Presentation
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testing
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
 

Similar to Critical Infrastructure and Cyber Threat

Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
ssuserc1c354
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
Numaan Huq
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
Krishna N
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
Fas (Feisal) Mosleh
 

Similar to Critical Infrastructure and Cyber Threat (20)

2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
P04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdfP04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdf
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 

More from Motorola Solutions

Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
Motorola Solutions
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Motorola Solutions
 

More from Motorola Solutions (6)

RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITY
 
Manage the Complexity
Manage the ComplexityManage the Complexity
Manage the Complexity
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio Demo
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova Scotia
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Critical Infrastructure and Cyber Threat

  • 1. CRITICAL INFRASTRUCTURE AND CYBER THREAT SAFER CITIES. THRIVING COMMUNITIES.
  • 2. CRITICAL INFRASTRUCTURE AND CYBER THREAT Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation’s security and stability.
  • 3. 16 CRITICAL INFRASTRUCTURE SECTORS Department of Homeland Security classified the top 16 sectors at risk to cyber attacks Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors CRITICAL INFRASTRUCTURE AND CYBER THREAT 16 CRITICAL INFRASTRUCTURE SECTORS Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors 1. CHEMICAL 2. COMMERCIAL FACILITIES 3. COMMUNICATIONS SECTOR 4. CRITICAL MANUFACTURING 5. DAMS 6. DEFENSE INDUSTRIAL BASE 7. EMERGENCY SERVICES 8. ENERGY 9. FINANCIAL SERVICES 10. FOOD AND AGRICULTURE 11. GOVERNMENT FACILITIES 12. HEALTHCARE AND PUBLIC HEALTH 13. INFORMATION TECHNOLOGY 14. NUCLEAR REACTORS, MATERIALS, AND WASTE 15. TRANSPORTATION SYSTEMS 16. WATER AND WASTEWATER DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT RISK TO CYBER ATTACKS
  • 4. CRITICAL INFRASTRUCTURE AND CYBER THREAT INTERCONNECTED SYSTEMS • The continued increase of interconnected systems and devices provide cyber criminals limitless attack vectors. 25 billion networked devices are projected by 2020. Source: ITU’s Trends in Telecommunication Reform 2015, http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf
  • 5. CRITICAL INFRASTRUCTURE AND CYBER THREAT MALWARE OUTBREAK • 1 million new malware instances released every day • Ransomware attacks soared 113% in prior year • Increasing number of zero day attacks Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/ 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
  • 6. UNAUTHORIZED CONNECTIONS CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf *Risk Ratio of Spear-Phishing Attacks by Industry CRITICAL INFRASTRUCTURE AND CYBER THREAT INDUSTRY RISK RATIO* INDUSTRY RISK RATIO” Mining Wholesale Manufacturing Transportation, Communications, Electric, Gas & Sanitary Services Public Administration (Government) Finance, Insurance & Real Estate 44% 34% 33% 29% 21% 21% 1 in 3.41 in 2.3 1 in 2.9 1 in 3.0 1 in 3.4 1 in 4.8
  • 7. CRITICAL INFRASTRUCTURE AND CYBER THREAT SOURCE:, InformationWeek's 2013 enterprise security survey, http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic- Security-Survey.html BRING YOUR OWN DEVICE (BYOD) • 45% of organizations have had a mobile device containing enterprise data reported missing • 11% have experienced a data breach requiring public disclosure
  • 8. SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft- subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras- installed-globally-in-2014 CRITICAL INFRASTRUCTURE AND CYBER THREAT FIXED CAMERA • More than 210 million CCTV cameras worldwide • 73,011 locations with unsecured cameras in 256 countries
  • 9. INSIDER THREAT • 55% of threats come from insider abuse or misuse • 32% of organizations report insider crimes are more costly or damaging than incidents caused by outsiders SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf CRITICAL INFRASTRUCTURE AND CYBER THREAT
  • 10. Motorola Solutions has in depth experience, expertise and robust capability to assist with today's cyber risk challenges. We take a comprehensive approach to help customers • Evaluate Environment • Assess Threats • Manage Risk Unique to each customer's operational setting. Visit us at motorolasolutions.com/cybersecurity CRITICAL INFRASTRUCTURE AND CYBER THREAT