Your SlideShare is downloading. ×
0
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Managing Cyber Threats: A Cyber Security Conversation with the Experts
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Managing Cyber Threats: A Cyber Security Conversation with the Experts

2,031

Published on

Managing Cyber Threats: A Cyber Security Conversation with the Experts …

Managing Cyber Threats: A Cyber Security Conversation with the Experts

Cyber security has become as important as locking your front door. We must protect and secure information. As our reliance on technology increases, the need to build innovative approaches to cyber security efforts becomes critical. The opportunities in this field are great. Cyber Security is a National Priority. Join our panel of experts as we talk about managing cyber threats and ways to gain access to cyber security opportunities.

Learning Outcomes: Increase Cyber Security knowledge, technical skills, and awareness of trends

At the end of this seminar, participants will be able to:

a) Identify required skills and areas in cyber security careers
b) Explore opportunities and challenges in Cyber security
c) Examine critical success factors
d) Connect with other successful cyber security professionals
e) Explore trends and best practices for 2013 in Cyberspace

Published in: Business, Technology
1 Comment
3 Likes
Statistics
Notes
No Downloads
Views
Total Views
2,031
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
221
Comments
1
Likes
3
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. MANAGING CYBER THREATS A Cyber Security Conversation with the Experts Renata Spinks Reginald Gillins Jane Odero Simoné Thomas
  • 2. Overview • Let’s Talk about Cyber – Overview of What is CyberSpace vs. Cyber Security • Framework of Cyber Threats – The types, styles, and existence of Cyber Threats • Challenges of Managing Cyber Threats – Global Awareness and Collaboration: Public & Private • Conversation with the Experts – Cyber Security Real-world Experiences • 2014 Cyber Security Focal Points – Key points to consider when dealing with Cyber Security • Question and Answers 2
  • 3. Let’s Talk About Cyber • Cyberspace vs. Cyber Security -Cyberspace -- the online world of computer networks and the Internet -Cyber security -- measures taken to protect a computer or system against unauthorized access or attack 3
  • 4. Let’s Talk About Cyber • Cyber Security is similar to Home Security 4
  • 5. Framework of Cyber Threats • Types of Threats • Bot-network operators • Hackers that take over multiple systems in order to coordinate attacks and distribute malicious code • Criminal Groups • Seek to attack systems for monetary gain • Foreign intelligence services • Use cyber tools as part of their information-gathering and espionage • Hackers • Break into networks for the thrill of the challenge or for bragging rights in the hacker community • Insiders • Disgruntled or unaware user of the system; uses unrestricted access to cause damage or to steal system data. (Primary source of computer crime) 5
  • 6. Framework of Cyber Threats (cont.) • Types of Threats – Phishers • Individuals, or small groups, who execute phishing schemes in an attempt to steal identities or information for monetary gain (use bait to catch unaware users) – Spammers • Individuals or organizations who distribute unsolicited e-mail with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware/malware, or attack organizations (i.e., denial of service). – Spyware/malware authors • Individuals or organizations with malicious intent carry out attacks against users by producing and distributing spyware and malware. – Terrorists • Terrorists seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, cause mass casualties, weaken the U.S. economy, and damage public morale and confidence. “Types of Threats” Source: Government Accountability Office (GAO), Department of Homeland Security's (DHS's) Role in Critical Infrastructure Protection (CIP) Cybersecurity, GAO-05-434 (Washington, D.C.: May, 2005). 6
  • 7. Framework of Cyber Threats (cont.) • Why do Cyber Threats Exist? – National Governments • Goal is to weaken, disrupt or destroy the U.S. – Terrorists • Goal is to spread terror throughout the U.S. civilian population – Industrial Spies and Organized Crime Groups • Goals are profit based to conduct industrial espionage and large-scale monetary theft – Hacktivists • Goals are to support their political agenda, propaganda and causing damage to achieve notoriety for their cause – Hackers • Goals are associated with notoriety, profit, and cause disruption 7
  • 8. Challenges in Managing Cyber Threats • Global Awareness • Directives, Executive Orders, Working Groups 8
  • 9. Conversing with the Experts • Serving in the Cyber Security Field • Areas of Focus for a Career in Cyber – DHS Initiatives – Investigations • Resources – Education – Blogs 9
  • 10. 2014 Cyber Security Focal Points • Critical Success Factors • THINK Cyber BEYA 2013 – THINK about what’s happening in Cyberspace – Military Reliance on Technology and Innovation – Engineers and others who produce innovative technology – Young Men and Women to take an Interest 10
  • 11. Questions WHO? HOW? WHERE? 11

×