SlideShare a Scribd company logo
1 of 4
Download to read offline
W
henunidenti-
fied hackers
broke into
a computer
network at the Sands casino in
Las Vegas in February of 2014,
insiders and experts assumed
it was a large-scale but routine
heist. More than a year later,
director of national intelli-
gence James Clapper pinned
the blame on Iran, citing the
foreign government’s anger
regarding anti-Iranian com-
ments made by Sands owner
Sheldon Adelson.
In November of 2014,
North Korea hacked Sony
Pictures with malware, later
leaking personal emails and
unreleased movies online.
When a North Korean group
threatened widespread vio-
lence at Sony’s premiere of
The Interview, many theaters
canceled screenings, and
Sony canceled its theatrical
release (the film later debuted
on streaming platforms and
screened in some theaters).
President Obama called Sony’s
response a “mistake.”
The questions in the cy-
bersecurity and IT world then
became:Whyhaveforeigngov-
ernments turned their atten-
tion to privately owned and
publicly traded companies?
CYBERSECURITY
The New Cyber Threats and
How to Stay One Step Ahead
ITSource Technology’s Brian Arellanes
makes it his business to outpace cyber
crime—when threats get as big as foreign
nationals attacking US companies,
Arellanes knows how to stay cool under
pressure, racing to help his clients respond
by Zach Baliva
ITSOURCE TECHNOLOGY
HEADQUARTERED: San Rafael, CA
FOUNDED: 2006
NUMBER OF EMPLOYEES: 51-200
ABOUT: ITSource Technology is a
management consulting firm focused
on technologies that solve critical
needs and provide quick ROI.
BRIAN ARELLANES
Founder and CEO
ITSource Technology
SEPT/OCT 2015 | VOL 08 | NO
35
on the pulse
2006
ITSource technology is founded. The same year, ITSource
incorporates and memorializes Master Services Agreements
(MSA) with banking giant Wells Fargo, world-leading
biosciences company Becton Dickinson (BD), and world-
leading defense contractor Northrop Grumman
2008
ITSource wins a multi-million dollar R&D contract to develop
hardware and software for Medical Devices
With Northrop Grumman, ITSource wins a multi-million
dollar PO for IT Operations, cybersecurity, and application
development on a $1 billion contract
2011
ITSource forms a partnership with the support of HP to work
on the successful Go-live of $245 million CA Statewide Prison
Case Management System.
2013
ITSource receives the 2013 Marin Count “Be the Dream”
Award for community and diversity leadership in honor of Dr.
Martin Luther King, Jr.’s vision for equality.
ITSource is contracted to support Raley’s Grocery Chain, a
multi-billion dollar top-ranked retailer for cybersecurity, IT
Operations, development support
2014
ITSource is ranked #29 on the HispanicBusiness Fastest
Growing 100
2015
CEO Brian Arellanes receives 2015 Hispanic IT Executive
Council (HITEC)’s “HITEC 100” Award for being one of the top
100 most influential Hispanic leaders in technology
Arellanes sits on several cybersecurity panels for the Hispanic
IT Executive Council, the Mocana360 event, and for PG&E
What role should the White
House have in mediation and
defense? Could a foreign gov-
ernment attack the United
States based on private enter-
prise?
Brian Arellanes, a cy-
bersecurity expert, is hop-
ing to help provide answers.
The founder and CEO of IT-
Source Technology works
with high-profile companies
and major government agen-
cies, using encryption, pro-
cesses, and other techniques
to secure their environments.
After 9/11, Arellanes con-
sulted for the Department of
Homeland Security for what
became the largest hiring ef-
fort in the country’s history.
He was responsible for hiring
and training security profes-
sionals in the national rollout
of explosive detection systems
and technology.
Arellanes says a lot has
changed in the last few years.
“We’re no longer scared of
a hacker in his mom’s base-
ment. The bigger threats are
countries or nation states that
are actually trying to attack
private companies. These are
scarier because countries with
deep pockets and resources
are now attacking us, which
means our nation’s economy
is at risk,” he explains.
Historically, when na-
tions engaged in cyber attacks
against other nations, private
citizens and companies had
been able to trust their gov-
ernment to intervene. But in
this new reality, where na-
tions rise against corpora-
tions, the rules have yet to be
written. The Obama admin-
istration increased sanctions
against North Korea for its role
in the Sony Hack. Arellanes—
who recently sat on an indus-
try panel with the FBI’s squad
leader for cybersecurity—says
the United States will have to
determine what’s considered
an act of war and then draft
guidelines and regulations to
govern its response.
This new breed of hacker
has a specific motivation. “Not
only can they get the person-
ally identifiable information
that we’re concerned about,
but they could get trade secrets
and intellectual property that
could cripple our economy,”
Arellanes says. Countries
have attacked industrial and
engineering companies in an
effort to compete with Amer-
ican companies or simply
produce their own products
to avoid purchasing them di-
rectly. Additionally, accord-
ing to Arellanes, some foreign
governments sponsor indus-
try. “Those governments stand
to profit while weakening the
US economy at the same time,”
he explains. But while the gov-
ernment has strong defenses
in place, corporations general-
ly haven’t yet had to withstand
cyber attacks, and therefore do
not have that level of security.
The modern solutions IT-
Source recommends to cor-
porations at risk include tools
that encrypt and protect
data before a breach occurs
so attackers walk away with
fool’s gold instead of gold.
A Través de los Años
ITSource Technology from startup to
Cybersecurity authority
Brian Arellanes (right) joins (left to right) Bob West, Alberto Yepez, and Myrna Soto on a panel discussing the changing cyber
threat landscape at the 2015 Q1 HITEC Executive Summit.
SEPT | OCT 2015 HISPANICEXECUTIVE.COM
on the pulse
Cyber Threat Report 2015
Source: www.heimdalsecurity.com/enww
$38.5
billion
170
days
$12.7
million
600
thousand
1/10
users
176%
increaseThe most expensive
computer virus of all time
Average time to detect a
malicious or criminal attack
Average annualized cost of
cyber crime in the US
Facebook accounts are
compromised every single day
of social media accounts say
they’ve been hacked
since 2010 in the number of
cyber attacks with an average of
138 successful attacks per week
SEPT | OCT 2015 HISPANICEXECUTIVE.COM
The company has partnered
with industry leaders like HP,
whose Voltage security pro-
cess randomizes information
so hackers don’t realize they
have false information.
Because ITSource Tech-
nology helps Fortune 100 lev-
el clients, the company weaves
security into everything it
does including app develop-
ment, taking every possible
step to secure the way it con-
ducts business. “The reality
of the industry today is that
we have to protect others and
ourselves, both at work and at
home,” Arellanes says, adding
that he enrolled in ID protec-
tion services after discover-
ing his own information was
compromised in the Anthem
attack.
While the Anthem attack
and others have made head-
lines, Arellanes knows that
behind every newsworthy
attack lie hundreds or even
thousands of other attacks
that fly under the radar. “In
addition to detecting and pre-
venting attacks for our cli-
ents, we have to raise aware-
ness around the importance
of protecting data,” he says.
While most companies are in-
creasing IT budgets by 20 per-
cent to address rising threats,
Arellanes expects that number
to jump as high as 40 percent
in the next one to three years.
With the potential increase,
he’s using his experience
and influence to encourage
young Hispanics to consid-
er the huge opportunities in
While most companies are
increasing IT budgets by 20 percent
to address rising threats, Arellanes
expects that number to jump as
high as 40 percent in the next one to
three years.
In 2015, Brian Arellanes was named one of the Hispanic IT Executive Council’s “HITEC 100.” Arellanes (center) celebrates with
HITEC chairman of the board Alberto Yepez (left) and HITEC president Andre Arbelaez (right).
the talent-poor sector of IT
Security.
Although US companies
are more protected than this
time last year, there is a long
way to go. The world is be-
coming more connected as it
moves towards the inevitable
“Internet of things,” in which
every device and every com-
puter and every car and every
gadget is in a network, con-
nected online all the time.
“That will open up huge
holes,” Arellanes says, “and
we’ve got to stay one step
ahead.”
SEPT | OCT 2015 HISPANICEXECUTIVE.COM

More Related Content

What's hot

2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexAndreanne Clarke
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldHillary L
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 

What's hot (20)

The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Evil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the worldEvil Geniuses: How organized cybercriminals could take over the world
Evil Geniuses: How organized cybercriminals could take over the world
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 

Viewers also liked

PORTFOLIO JO ANN J2015
PORTFOLIO JO ANN J2015PORTFOLIO JO ANN J2015
PORTFOLIO JO ANN J2015JO ANN JOHNSON
 
Municipal budget workshop100223
Municipal budget workshop100223Municipal budget workshop100223
Municipal budget workshop100223Leonardo Olivares
 
ManosResume version 3
ManosResume version 3ManosResume version 3
ManosResume version 3Romano V.
 
Hâu quả nặng nề từ thoái hóa sụn khớp
Hâu quả nặng nề từ thoái hóa sụn khớpHâu quả nặng nề từ thoái hóa sụn khớp
Hâu quả nặng nề từ thoái hóa sụn khớpmoira878
 
Installasi os linux mandriva
Installasi os linux mandrivaInstallasi os linux mandriva
Installasi os linux mandrivaindra_rupat
 
Reconciling baps and poc -stepby step
Reconciling baps and poc -stepby stepReconciling baps and poc -stepby step
Reconciling baps and poc -stepby stepMatthew Zebehazy
 
Centro Comercial City Garden
Centro Comercial City GardenCentro Comercial City Garden
Centro Comercial City GardenElena Pandelí
 
How a taboo topic become priority number one
How a taboo topic become priority number oneHow a taboo topic become priority number one
How a taboo topic become priority number oneLaura Shemeza
 
Course and Teacher Survey--Spring2005
Course and Teacher Survey--Spring2005Course and Teacher Survey--Spring2005
Course and Teacher Survey--Spring2005Matthew Zebehazy
 
Berger MasterCard Mid-Summer Eval
Berger MasterCard Mid-Summer EvalBerger MasterCard Mid-Summer Eval
Berger MasterCard Mid-Summer EvalNicholas Berger
 
Keith Peterson_Be All You Can Be_By Gery Deer _Complete Series
Keith Peterson_Be All You Can Be_By Gery Deer _Complete SeriesKeith Peterson_Be All You Can Be_By Gery Deer _Complete Series
Keith Peterson_Be All You Can Be_By Gery Deer _Complete SeriesGery Deer
 
Indra saputra politekniknegeribengkalis_pkmkc
Indra saputra politekniknegeribengkalis_pkmkcIndra saputra politekniknegeribengkalis_pkmkc
Indra saputra politekniknegeribengkalis_pkmkcindra_rupat
 

Viewers also liked (17)

PORTFOLIO JO ANN J2015
PORTFOLIO JO ANN J2015PORTFOLIO JO ANN J2015
PORTFOLIO JO ANN J2015
 
Municipal budget workshop100223
Municipal budget workshop100223Municipal budget workshop100223
Municipal budget workshop100223
 
ManosResume version 3
ManosResume version 3ManosResume version 3
ManosResume version 3
 
Linux mandriva
Linux mandrivaLinux mandriva
Linux mandriva
 
Hâu quả nặng nề từ thoái hóa sụn khớp
Hâu quả nặng nề từ thoái hóa sụn khớpHâu quả nặng nề từ thoái hóa sụn khớp
Hâu quả nặng nề từ thoái hóa sụn khớp
 
Installasi os linux mandriva
Installasi os linux mandrivaInstallasi os linux mandriva
Installasi os linux mandriva
 
90916 spc-2015
90916 spc-201590916 spc-2015
90916 spc-2015
 
Reconciling baps and poc -stepby step
Reconciling baps and poc -stepby stepReconciling baps and poc -stepby step
Reconciling baps and poc -stepby step
 
Centro Comercial City Garden
Centro Comercial City GardenCentro Comercial City Garden
Centro Comercial City Garden
 
How a taboo topic become priority number one
How a taboo topic become priority number oneHow a taboo topic become priority number one
How a taboo topic become priority number one
 
Course and Teacher Survey--Spring2005
Course and Teacher Survey--Spring2005Course and Teacher Survey--Spring2005
Course and Teacher Survey--Spring2005
 
Berger MasterCard Mid-Summer Eval
Berger MasterCard Mid-Summer EvalBerger MasterCard Mid-Summer Eval
Berger MasterCard Mid-Summer Eval
 
Keith Peterson_Be All You Can Be_By Gery Deer _Complete Series
Keith Peterson_Be All You Can Be_By Gery Deer _Complete SeriesKeith Peterson_Be All You Can Be_By Gery Deer _Complete Series
Keith Peterson_Be All You Can Be_By Gery Deer _Complete Series
 
Eng201 -syllabus--r6
Eng201 -syllabus--r6Eng201 -syllabus--r6
Eng201 -syllabus--r6
 
Linux mandriva
Linux mandrivaLinux mandriva
Linux mandriva
 
Indra saputra politekniknegeribengkalis_pkmkc
Indra saputra politekniknegeribengkalis_pkmkcIndra saputra politekniknegeribengkalis_pkmkc
Indra saputra politekniknegeribengkalis_pkmkc
 
SHOP DRAWINGS
SHOP DRAWINGSSHOP DRAWINGS
SHOP DRAWINGS
 

Similar to HE Mag_New Cyber Threats_ITSource

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxsmile790243
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for LegislatorsKristin Judge
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 

Similar to HE Mag_New Cyber Threats_ITSource (20)

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 

HE Mag_New Cyber Threats_ITSource

  • 1. W henunidenti- fied hackers broke into a computer network at the Sands casino in Las Vegas in February of 2014, insiders and experts assumed it was a large-scale but routine heist. More than a year later, director of national intelli- gence James Clapper pinned the blame on Iran, citing the foreign government’s anger regarding anti-Iranian com- ments made by Sands owner Sheldon Adelson. In November of 2014, North Korea hacked Sony Pictures with malware, later leaking personal emails and unreleased movies online. When a North Korean group threatened widespread vio- lence at Sony’s premiere of The Interview, many theaters canceled screenings, and Sony canceled its theatrical release (the film later debuted on streaming platforms and screened in some theaters). President Obama called Sony’s response a “mistake.” The questions in the cy- bersecurity and IT world then became:Whyhaveforeigngov- ernments turned their atten- tion to privately owned and publicly traded companies? CYBERSECURITY The New Cyber Threats and How to Stay One Step Ahead ITSource Technology’s Brian Arellanes makes it his business to outpace cyber crime—when threats get as big as foreign nationals attacking US companies, Arellanes knows how to stay cool under pressure, racing to help his clients respond by Zach Baliva ITSOURCE TECHNOLOGY HEADQUARTERED: San Rafael, CA FOUNDED: 2006 NUMBER OF EMPLOYEES: 51-200 ABOUT: ITSource Technology is a management consulting firm focused on technologies that solve critical needs and provide quick ROI. BRIAN ARELLANES Founder and CEO ITSource Technology SEPT/OCT 2015 | VOL 08 | NO 35
  • 2. on the pulse 2006 ITSource technology is founded. The same year, ITSource incorporates and memorializes Master Services Agreements (MSA) with banking giant Wells Fargo, world-leading biosciences company Becton Dickinson (BD), and world- leading defense contractor Northrop Grumman 2008 ITSource wins a multi-million dollar R&D contract to develop hardware and software for Medical Devices With Northrop Grumman, ITSource wins a multi-million dollar PO for IT Operations, cybersecurity, and application development on a $1 billion contract 2011 ITSource forms a partnership with the support of HP to work on the successful Go-live of $245 million CA Statewide Prison Case Management System. 2013 ITSource receives the 2013 Marin Count “Be the Dream” Award for community and diversity leadership in honor of Dr. Martin Luther King, Jr.’s vision for equality. ITSource is contracted to support Raley’s Grocery Chain, a multi-billion dollar top-ranked retailer for cybersecurity, IT Operations, development support 2014 ITSource is ranked #29 on the HispanicBusiness Fastest Growing 100 2015 CEO Brian Arellanes receives 2015 Hispanic IT Executive Council (HITEC)’s “HITEC 100” Award for being one of the top 100 most influential Hispanic leaders in technology Arellanes sits on several cybersecurity panels for the Hispanic IT Executive Council, the Mocana360 event, and for PG&E What role should the White House have in mediation and defense? Could a foreign gov- ernment attack the United States based on private enter- prise? Brian Arellanes, a cy- bersecurity expert, is hop- ing to help provide answers. The founder and CEO of IT- Source Technology works with high-profile companies and major government agen- cies, using encryption, pro- cesses, and other techniques to secure their environments. After 9/11, Arellanes con- sulted for the Department of Homeland Security for what became the largest hiring ef- fort in the country’s history. He was responsible for hiring and training security profes- sionals in the national rollout of explosive detection systems and technology. Arellanes says a lot has changed in the last few years. “We’re no longer scared of a hacker in his mom’s base- ment. The bigger threats are countries or nation states that are actually trying to attack private companies. These are scarier because countries with deep pockets and resources are now attacking us, which means our nation’s economy is at risk,” he explains. Historically, when na- tions engaged in cyber attacks against other nations, private citizens and companies had been able to trust their gov- ernment to intervene. But in this new reality, where na- tions rise against corpora- tions, the rules have yet to be written. The Obama admin- istration increased sanctions against North Korea for its role in the Sony Hack. Arellanes— who recently sat on an indus- try panel with the FBI’s squad leader for cybersecurity—says the United States will have to determine what’s considered an act of war and then draft guidelines and regulations to govern its response. This new breed of hacker has a specific motivation. “Not only can they get the person- ally identifiable information that we’re concerned about, but they could get trade secrets and intellectual property that could cripple our economy,” Arellanes says. Countries have attacked industrial and engineering companies in an effort to compete with Amer- ican companies or simply produce their own products to avoid purchasing them di- rectly. Additionally, accord- ing to Arellanes, some foreign governments sponsor indus- try. “Those governments stand to profit while weakening the US economy at the same time,” he explains. But while the gov- ernment has strong defenses in place, corporations general- ly haven’t yet had to withstand cyber attacks, and therefore do not have that level of security. The modern solutions IT- Source recommends to cor- porations at risk include tools that encrypt and protect data before a breach occurs so attackers walk away with fool’s gold instead of gold. A Través de los Años ITSource Technology from startup to Cybersecurity authority Brian Arellanes (right) joins (left to right) Bob West, Alberto Yepez, and Myrna Soto on a panel discussing the changing cyber threat landscape at the 2015 Q1 HITEC Executive Summit. SEPT | OCT 2015 HISPANICEXECUTIVE.COM
  • 3. on the pulse Cyber Threat Report 2015 Source: www.heimdalsecurity.com/enww $38.5 billion 170 days $12.7 million 600 thousand 1/10 users 176% increaseThe most expensive computer virus of all time Average time to detect a malicious or criminal attack Average annualized cost of cyber crime in the US Facebook accounts are compromised every single day of social media accounts say they’ve been hacked since 2010 in the number of cyber attacks with an average of 138 successful attacks per week SEPT | OCT 2015 HISPANICEXECUTIVE.COM
  • 4. The company has partnered with industry leaders like HP, whose Voltage security pro- cess randomizes information so hackers don’t realize they have false information. Because ITSource Tech- nology helps Fortune 100 lev- el clients, the company weaves security into everything it does including app develop- ment, taking every possible step to secure the way it con- ducts business. “The reality of the industry today is that we have to protect others and ourselves, both at work and at home,” Arellanes says, adding that he enrolled in ID protec- tion services after discover- ing his own information was compromised in the Anthem attack. While the Anthem attack and others have made head- lines, Arellanes knows that behind every newsworthy attack lie hundreds or even thousands of other attacks that fly under the radar. “In addition to detecting and pre- venting attacks for our cli- ents, we have to raise aware- ness around the importance of protecting data,” he says. While most companies are in- creasing IT budgets by 20 per- cent to address rising threats, Arellanes expects that number to jump as high as 40 percent in the next one to three years. With the potential increase, he’s using his experience and influence to encourage young Hispanics to consid- er the huge opportunities in While most companies are increasing IT budgets by 20 percent to address rising threats, Arellanes expects that number to jump as high as 40 percent in the next one to three years. In 2015, Brian Arellanes was named one of the Hispanic IT Executive Council’s “HITEC 100.” Arellanes (center) celebrates with HITEC chairman of the board Alberto Yepez (left) and HITEC president Andre Arbelaez (right). the talent-poor sector of IT Security. Although US companies are more protected than this time last year, there is a long way to go. The world is be- coming more connected as it moves towards the inevitable “Internet of things,” in which every device and every com- puter and every car and every gadget is in a network, con- nected online all the time. “That will open up huge holes,” Arellanes says, “and we’ve got to stay one step ahead.” SEPT | OCT 2015 HISPANICEXECUTIVE.COM