SlideShare a Scribd company logo
1 of 35
Download to read offline
ESTABLISHING STRATEGIC LEVEL ANALYSIS
Cameron Brown
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
The views and opinions expressed in this presentation
are solely those of the presenter and do not represent
any official policy or position of past or present
employers of the presenter.
The material in the following slides is for informational purposes only
and should in no way be construed as advice of any kind.
Disclaimer
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
 Cyber Crime Defence Advisor
 Information Security Strategist
 International Legal Practitioner
 Published Author
Cameron Brown
MIntSecSt, MPICT
LL.B, B.A (Behavioural Science)
Grad.Cert (Computer Crime Investigation)
Cyber Related Industry Experience
Legal Practice: Australian Attorney
Policing: State and Federal Law Enforcement
United Nations: Office on Drugs and Crime
Transparency International: Anti-Corruption
Academic Institutions: Australian National
University, Oxford, Max Planck, Korean
Institute of Criminology
Ernst and Young
• Information Security: Forensic Investigator,
Incident Responder, Trusted Advisor
• Risk Advisory: Strategic Cybersecurity
Introduction
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
75
Billion
By 2020
Source: Cisco
Connected IoT Devices
Smart Phones
1.9
Billion
By 2020
Source: IDC
Internet Population
4
Billion
By 2020
Source: ITU/UNESCO
44
ZettaBytes
By 2020
Source: IDC
Data Universe
Digital transformation and managing complexity
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Threat intelligence and Incident Response
Market for cyber insurance
Cloud security opening new growth
avenues
Increasing security needs across critical infrastructure, and
utilities
Insider threats
Criminal activity within the Deep Web
Pervasiveness of online and digital data
Exponential growth of social media and business
disruptors
Increasing severity of evolving threats to cyber security Tougher government regulations and penalties
Market Drivers
Market drivers for as robust strategic approach to cybersecurity
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Unsophisticated attackers
(script kiddies)
You are attacked because you are on the
internet and have a vulnerability – you
represent a challenge
Sophisticated attackers
(hackers)
You are attacked because you are on the
internet and have information of value – or
they have a reason for disrupting your business
Corporate espionage
(malicious insiders)
Your current or former employee seeks
financial gain from stealing/selling your IP – or
they want to cause disruption for other reasons
State sponsored attacks
Advanced Persistent Threat (APT)
You are targeted because of who you are, what
you do, or the value of your intellectual
property
Risk
Attacker resources and sophistication
Revenge
Personal gain
Stock price
manipulation
Organised crime
(criminal networks)
You are attacked because you have information
of value – for them to sell, to use as blackmail
or hold to ransom
script
kiddieshackers
malicious
insiders
criminal
networks
APT
Amusement/
Experimentation/
Nuisance/
Notoriety
State sponsored espionage
Market manipulation
Competitive advantage
Military/political objectives
Any information of
potential value to sell
or use for extortion/
ransom:
Cash
Credit cards
Identities
Inside information
IP
Manipulation of
systems
Industrial espionage
and competitive
advantageMoney
Embarrassment
Political/social/
environmental causes
2016
► BrainBoot/Morris Worm
► Polymorphic viruses
► Michelangelo
1980s/1990s
► Anna Kournikova
► Sircam
► Code Red and Nimda
► Zeus
► Koobface
► Conficker
► Aurora
► Poison Ivy
► agent.btz
► Stuxnet
► WikiLeaks
► Anonymous
► MyDoom
► NetSky
► Sasser
► Concept Macro Virus
► Melissa
► ‘I Love You’
► SQL Slammer
► Blaster
► Fizzer
► SpyEye
► Flame
► CryptoLocker
Most companies have adequate cybersecurity
controls in place to stop these threats……
….But the reality is these types of attacks are now more and
more frequent and companies are not equipped to cope
Evolving threat landscape
Source: EY
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Threat actors, intelligence and motivation
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Kaspersky
Highly organised and persistent
► Support for operations run by cyber-criminals has evolved into a global enterprise
encompassing managed software deployments and scheduled updates, roadmaps
for platform development, and even helpdesks to service needs of clients and users
► Innovative and agile illicit businesses harnessing expertise of specialists across
various domains of online criminality.
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Check Point
Dark clouds and Malware-as-a-Service
► The Nuclear operation accumulated revenue of $100,000 a month
► Attackers renting Nuclear servers to view and manage a malware campaign
► ‘Customers’ able to disseminate any malware via the console, but not permitted to target endpoints in
Azerbaijan, Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan, Moldova, Russia, Tajikistan, Uzbekistan
and Ukraine (Eastern Partnership)
► Developer may have resided within one of these jurisdictions and keen to avoid extradition
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
► Just as threat perpetrator motivations and capabilities vary from
group to group, so does OPSEC tradecraft
► Different actors have different requirements for privacy and anonymity
► Example: cyber crime forum operators must balance need to stay off
the radar of law enforcement with need to sell and market their
products
OPSEC and online criminality
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Disrupt
Contain
Minimise
Redefining OPSEC for participants in the underground economy
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
► Participants in the underground economy are mindful of the threat
posed by law enforcement and intelligence agencies
► Transnational criminal enterprises actively track developments in the
media and academia, and pay off insiders to gain visibility into the
activities of policing organisations
► As quick adopters, technological developments make criminal
enterprises more agile and effective in meeting their operational
security objectives which are focussed on anonymity, disinformation,
disruption, secrecy, and containing exposure
► Yet, cybercriminals still face the conundrum of establishing trusted
relationships among criminal co-conspirators
► The human factor is the weakest link for security in both the legitimate
and underground economy
Threats, monitoring, early adopters, trust and the human factor
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Uncovering
zero-day
vulnerabilities
Credential harvesting and target profiling
Developing
botnets and
malware
Scanning
systems for
items of value
to sell or exploit
Exploring
new
technologies
to leverage
and exploit
Following
media, blogs
and forums to
harvest open
intelligence
and react to
activities of
LEA
Research, development, and refining modus operandi
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Digital Shadows
Bulletproof hosting
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Digital Shadows
Avoiding detection and obfuscation
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Digital Shadows
Mentoring among cybercriminals
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Use of codes / aliases for
communication
Dead dropping
Cryptography
Steganography
Compromised intermediaries
Spoofing
Hiding in safe jurisdictions
Anonymity networks and
proxy services
5
3
1
2
4
6
7
8
► “The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is
tailing you - and then periodically erasing your footprints” (Tor)
Evasive techniques employed by miscreants
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Ransomware evolving
Source: Symantec
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
► Malware is already becoming more situationally aware
so as to avoid detection and resist static analysis by
security researchers
► Nefarious code will evolve from the reactive
polymorphic modes of today to a more proactive
mission orientated design
► Like trained dogs sniffing for drugs at airports or
concealed explosive devices in warzones, it is
conceivable that cognitive computing will be used by
criminals to autonomously hunt and capture valuable
information from business networks and applications
► 16% of malware can recognise and exploit a virtual
machine environment - vulnerabilities such as VENOM
could allow attackers to escape a compromised virtual
machine and attack others on the same system, or
even attack the host hypervisor
Malware becoming more situationally aware
Source: Symantec
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Symantec
NEWER NASTY VARIANTS
STAMPADO
ENCRYPTING
THE ENCRYPTED
JIGSAW
COUNT DOWN
PUNITIVE DELETION
PHILADELPHIA
COUNT DOWN
RUSSIAN ROULETTE
► Miscreants are moving at a
much faster pace than
security countermeasures
► We can expect more targeted
and destructive attacks, but
also ransom demands that
vary based on the attacker’s
estimation of the value of the
data being held hostage
and/or the ability of the victim
to pay some approximation of
what it might be worth
► Increasingly attacks will target
data intensive organisations
like medical practices and law
and architectural firms
Crypto-ransomware
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Bleeping Computer
Forcing capitulation
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Source: Bleeping Computer
Forcing capitulation
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Digital idealism
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
Digital realism
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
► Collaboration and information sharing
► Regional outposts as a visibility and compliance challenge
► Third-party vulnerabilities
► Understanding the shifting geopolitical landscape and impact on
worker demography
► Preparing for crisis management (security fire drills)
► Seeking to do more with less via automation, correlation, and threat
telemetry without due consideration around ‘care and feeding’
needed to drive these systems
► Organisations still seeing security as an IT issue
Security pain points for enterprises
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
► Misaligned reporting and governance structures can quickly lead to
dangerous blind spots
► Many organisations have a lack of clarity around security roles and
accountabilities
► Where silos exist and there is a disconnect between operational
teams and middle management, an impasse occurs
► Functions inside an enterprise can quickly go dark and become
starved of resources
► Effective communication channels between leadership and hands-on
technical roles are integral to inform decision making, and the budget
allocation
► Critically, the C-Suite needs to be aware of where valuable
information is disbursed across their enterprise and how a
compromise of that information will impact profitability, branding, and
reputation
Silos
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
► Organic and inorganic business growth changes the attack surface
and risk profile for an organisation
► As information systems converge and disparate networks are linked
together, new security vulnerabilities emerge
► Architects of secure environments carefully tailor their systems to
meet challenges within a specific context
► When the context shifts, so too will the stressors that impact these
systems
► For continuous security improvement to occur, change management
must be a key part of enterprise growth and contraction
Growth and change management
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
► For organisations that forward deploy their technology and human
assets into the businesses of their clients, these unfamiliar
environments will present new dangers
► This may be caused by differences in the way a business treats
physical security or cultural peculiarities impacting the behaviour of
the workforce in terms of how data is handled
► It's useful to consider this as analogous to taking an animal out of one
habitat and placing it into another
► Changes in climate and terrain impact the ecosystems and ultimately
alter the natural order of things
► Predators can quickly become prey
Forward deployment
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
1
2
3
4
Negative Social Media
Debilitating
operational pressure
Staff lockout from
system
Forensic investigation
and remediation costs
5Negative local and
international press
6Customer
notification costs
7
Costs for contractual
breach, litigation, and
fines from regulators
8Loss of customers
and loss of sales
9 Loss of jobs and
business failure
Breach tree
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
1. Notice the worry
NO YES
3. Ask: Can I do
something about it?
Let worry go Action plan
Change focus of
attention
What? When?
How?
NOW LATER
Do it!
Let worry go
Change focus of
attention
Let worry go
Change focus of
attention
Schedule it
Source: Adapted from Butler and Hope 2007
2. Ask: What am I
worrying about?
Worry tree
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
VFAC Review
No. 12 July & August 2016
https://eng.kic.re.kr/..
Considerations for defenders (open access)
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
IJCC
Vol. 9 January – June 2015
http://www.cybercrimejournal.com/..
Considerations for incident responders (open access)
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
UNODC
2013
https://www.unodc.org/..
Considerations for governments (open access)
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
United Nations - Comprehensive Study on Cybercrime
Source: UNODC
TRANSLATION LINKS
Spanish:
https://www.unodc.org/documents/organized-
crime/cybercrime/Cybercrime_Study_Spanish.pdf
Arabic:
https://www.unodc.org/documents/organized-
crime/cybercrime/Cybercrime_Study_Arabic.pdf
Chinese:
https://www.unodc.org/documents/organized-
crime/cybercrime/Cybercrime_Study_Chinese.pdf
English:
https://www.unodc.org/documents/organized-
crime/cybercrime/CYBERCRIME_STUDY_210213
.pdf
French:
https://www.unodc.org/documents/organized-
crime/cybercrime/Cybercrime_Study_French.pdf
Russian:
https://www.unodc.org/documents/organized-
crime/cybercrime/Cybercrime_Study_Russian.pdf
CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber
cameron.brown@legalforensic.com
c
Questions

More Related Content

What's hot

Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzFitCEO, Inc. (FCI)
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising AttacksBee_Ware
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?NormShield
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal ArticleTaylre Janak
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzFitCEO, Inc. (FCI)
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesPaubox, Inc.
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attackMark Mair
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachCBIZ Risk & Advisory Services
 

What's hot (20)

Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attack
 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan BreachAny Information Can be Valuable and Other Lessons from the JP Morgan Breach
Any Information Can be Valuable and Other Lessons from the JP Morgan Breach
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 

Viewers also liked

Informatica Online Training
Informatica Online TrainingInformatica Online Training
Informatica Online TrainingRao Rao
 
Mechanical testing capability
Mechanical testing capabilityMechanical testing capability
Mechanical testing capabilityMajid Saghiri
 
unidades de concentraciones fisicas y quimicas
unidades de concentraciones fisicas y quimicasunidades de concentraciones fisicas y quimicas
unidades de concentraciones fisicas y quimicaslopezayala12
 
Energy natural science 4th of primary
Energy natural science 4th of primaryEnergy natural science 4th of primary
Energy natural science 4th of primaryMARIAMC_TEACHER
 
Openclass Inesdi - Monitorización - Eva Romeu
Openclass Inesdi - Monitorización - Eva RomeuOpenclass Inesdi - Monitorización - Eva Romeu
Openclass Inesdi - Monitorización - Eva RomeuEva Romeu
 
Introduzione al Metodo Kanban 2 di 5 - Visualizza
Introduzione al Metodo Kanban 2 di 5 - VisualizzaIntroduzione al Metodo Kanban 2 di 5 - Visualizza
Introduzione al Metodo Kanban 2 di 5 - VisualizzaMassimo Sarti
 
Reproduccion vegetal sexual y asexual
Reproduccion vegetal sexual y asexualReproduccion vegetal sexual y asexual
Reproduccion vegetal sexual y asexualHannah Villalobos
 
Cual es el rol del auditor de sistemas
Cual es el rol del auditor de sistemasCual es el rol del auditor de sistemas
Cual es el rol del auditor de sistemasViviana Marcela Yz
 
Universidad de Ciencias Comerciales__
Universidad de Ciencias Comerciales__Universidad de Ciencias Comerciales__
Universidad de Ciencias Comerciales__Ivet Rodríguez
 

Viewers also liked (17)

Informatica Online Training
Informatica Online TrainingInformatica Online Training
Informatica Online Training
 
Mechanical testing capability
Mechanical testing capabilityMechanical testing capability
Mechanical testing capability
 
UNESCO
UNESCOUNESCO
UNESCO
 
Desarrollo humano
Desarrollo humanoDesarrollo humano
Desarrollo humano
 
O citoplasma
O citoplasmaO citoplasma
O citoplasma
 
Compuertas Logicas
Compuertas Logicas Compuertas Logicas
Compuertas Logicas
 
unidades de concentraciones fisicas y quimicas
unidades de concentraciones fisicas y quimicasunidades de concentraciones fisicas y quimicas
unidades de concentraciones fisicas y quimicas
 
Soluciones y concentraciones 11°
Soluciones y concentraciones  11°Soluciones y concentraciones  11°
Soluciones y concentraciones 11°
 
Energy natural science 4th of primary
Energy natural science 4th of primaryEnergy natural science 4th of primary
Energy natural science 4th of primary
 
Openclass Inesdi - Monitorización - Eva Romeu
Openclass Inesdi - Monitorización - Eva RomeuOpenclass Inesdi - Monitorización - Eva Romeu
Openclass Inesdi - Monitorización - Eva Romeu
 
El internet como aula abierta
El internet como aula abiertaEl internet como aula abierta
El internet como aula abierta
 
Estudio de mercado
Estudio de mercado Estudio de mercado
Estudio de mercado
 
Introduzione al Metodo Kanban 2 di 5 - Visualizza
Introduzione al Metodo Kanban 2 di 5 - VisualizzaIntroduzione al Metodo Kanban 2 di 5 - Visualizza
Introduzione al Metodo Kanban 2 di 5 - Visualizza
 
Ciclo del agua
Ciclo del aguaCiclo del agua
Ciclo del agua
 
Reproduccion vegetal sexual y asexual
Reproduccion vegetal sexual y asexualReproduccion vegetal sexual y asexual
Reproduccion vegetal sexual y asexual
 
Cual es el rol del auditor de sistemas
Cual es el rol del auditor de sistemasCual es el rol del auditor de sistemas
Cual es el rol del auditor de sistemas
 
Universidad de Ciencias Comerciales__
Universidad de Ciencias Comerciales__Universidad de Ciencias Comerciales__
Universidad de Ciencias Comerciales__
 

Similar to Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016

cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Information Security from Risk Management and Design
Information Security from Risk Management and DesignInformation Security from Risk Management and Design
Information Security from Risk Management and DesignAlbert Hui
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskSurfWatch Labs
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 
ECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy WorkshopECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy WorkshopAbdul-Hakeem Ajijola
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onSplunk
 
Preventing Corporate and Governmental Fraud
Preventing Corporate and Governmental FraudPreventing Corporate and Governmental Fraud
Preventing Corporate and Governmental FraudCompliance Global Inc
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesEthisphere
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsVeriato
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 

Similar to Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016 (20)

CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Information Security from Risk Management and Design
Information Security from Risk Management and DesignInformation Security from Risk Management and Design
Information Security from Risk Management and Design
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
ECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy WorkshopECOWAS Cybersecurity Strategy Workshop
ECOWAS Cybersecurity Strategy Workshop
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Preventing Corporate and Governmental Fraud
Preventing Corporate and Governmental FraudPreventing Corporate and Governmental Fraud
Preventing Corporate and Governmental Fraud
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 

Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016

  • 1. ESTABLISHING STRATEGIC LEVEL ANALYSIS Cameron Brown
  • 2. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com The views and opinions expressed in this presentation are solely those of the presenter and do not represent any official policy or position of past or present employers of the presenter. The material in the following slides is for informational purposes only and should in no way be construed as advice of any kind. Disclaimer
  • 3. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com  Cyber Crime Defence Advisor  Information Security Strategist  International Legal Practitioner  Published Author Cameron Brown MIntSecSt, MPICT LL.B, B.A (Behavioural Science) Grad.Cert (Computer Crime Investigation) Cyber Related Industry Experience Legal Practice: Australian Attorney Policing: State and Federal Law Enforcement United Nations: Office on Drugs and Crime Transparency International: Anti-Corruption Academic Institutions: Australian National University, Oxford, Max Planck, Korean Institute of Criminology Ernst and Young • Information Security: Forensic Investigator, Incident Responder, Trusted Advisor • Risk Advisory: Strategic Cybersecurity Introduction
  • 4. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com 75 Billion By 2020 Source: Cisco Connected IoT Devices Smart Phones 1.9 Billion By 2020 Source: IDC Internet Population 4 Billion By 2020 Source: ITU/UNESCO 44 ZettaBytes By 2020 Source: IDC Data Universe Digital transformation and managing complexity
  • 5. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Threat intelligence and Incident Response Market for cyber insurance Cloud security opening new growth avenues Increasing security needs across critical infrastructure, and utilities Insider threats Criminal activity within the Deep Web Pervasiveness of online and digital data Exponential growth of social media and business disruptors Increasing severity of evolving threats to cyber security Tougher government regulations and penalties Market Drivers Market drivers for as robust strategic approach to cybersecurity
  • 6. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Unsophisticated attackers (script kiddies) You are attacked because you are on the internet and have a vulnerability – you represent a challenge Sophisticated attackers (hackers) You are attacked because you are on the internet and have information of value – or they have a reason for disrupting your business Corporate espionage (malicious insiders) Your current or former employee seeks financial gain from stealing/selling your IP – or they want to cause disruption for other reasons State sponsored attacks Advanced Persistent Threat (APT) You are targeted because of who you are, what you do, or the value of your intellectual property Risk Attacker resources and sophistication Revenge Personal gain Stock price manipulation Organised crime (criminal networks) You are attacked because you have information of value – for them to sell, to use as blackmail or hold to ransom script kiddieshackers malicious insiders criminal networks APT Amusement/ Experimentation/ Nuisance/ Notoriety State sponsored espionage Market manipulation Competitive advantage Military/political objectives Any information of potential value to sell or use for extortion/ ransom: Cash Credit cards Identities Inside information IP Manipulation of systems Industrial espionage and competitive advantageMoney Embarrassment Political/social/ environmental causes 2016 ► BrainBoot/Morris Worm ► Polymorphic viruses ► Michelangelo 1980s/1990s ► Anna Kournikova ► Sircam ► Code Red and Nimda ► Zeus ► Koobface ► Conficker ► Aurora ► Poison Ivy ► agent.btz ► Stuxnet ► WikiLeaks ► Anonymous ► MyDoom ► NetSky ► Sasser ► Concept Macro Virus ► Melissa ► ‘I Love You’ ► SQL Slammer ► Blaster ► Fizzer ► SpyEye ► Flame ► CryptoLocker Most companies have adequate cybersecurity controls in place to stop these threats…… ….But the reality is these types of attacks are now more and more frequent and companies are not equipped to cope Evolving threat landscape Source: EY
  • 7. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Threat actors, intelligence and motivation
  • 8. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Kaspersky Highly organised and persistent ► Support for operations run by cyber-criminals has evolved into a global enterprise encompassing managed software deployments and scheduled updates, roadmaps for platform development, and even helpdesks to service needs of clients and users ► Innovative and agile illicit businesses harnessing expertise of specialists across various domains of online criminality.
  • 9. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Check Point Dark clouds and Malware-as-a-Service ► The Nuclear operation accumulated revenue of $100,000 a month ► Attackers renting Nuclear servers to view and manage a malware campaign ► ‘Customers’ able to disseminate any malware via the console, but not permitted to target endpoints in Azerbaijan, Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan, Moldova, Russia, Tajikistan, Uzbekistan and Ukraine (Eastern Partnership) ► Developer may have resided within one of these jurisdictions and keen to avoid extradition
  • 10. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com ► Just as threat perpetrator motivations and capabilities vary from group to group, so does OPSEC tradecraft ► Different actors have different requirements for privacy and anonymity ► Example: cyber crime forum operators must balance need to stay off the radar of law enforcement with need to sell and market their products OPSEC and online criminality
  • 11. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Disrupt Contain Minimise Redefining OPSEC for participants in the underground economy
  • 12. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com ► Participants in the underground economy are mindful of the threat posed by law enforcement and intelligence agencies ► Transnational criminal enterprises actively track developments in the media and academia, and pay off insiders to gain visibility into the activities of policing organisations ► As quick adopters, technological developments make criminal enterprises more agile and effective in meeting their operational security objectives which are focussed on anonymity, disinformation, disruption, secrecy, and containing exposure ► Yet, cybercriminals still face the conundrum of establishing trusted relationships among criminal co-conspirators ► The human factor is the weakest link for security in both the legitimate and underground economy Threats, monitoring, early adopters, trust and the human factor
  • 13. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Uncovering zero-day vulnerabilities Credential harvesting and target profiling Developing botnets and malware Scanning systems for items of value to sell or exploit Exploring new technologies to leverage and exploit Following media, blogs and forums to harvest open intelligence and react to activities of LEA Research, development, and refining modus operandi
  • 14. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Digital Shadows Bulletproof hosting
  • 15. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Digital Shadows Avoiding detection and obfuscation
  • 16. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Digital Shadows Mentoring among cybercriminals
  • 17. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Use of codes / aliases for communication Dead dropping Cryptography Steganography Compromised intermediaries Spoofing Hiding in safe jurisdictions Anonymity networks and proxy services 5 3 1 2 4 6 7 8 ► “The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you - and then periodically erasing your footprints” (Tor) Evasive techniques employed by miscreants
  • 18. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Ransomware evolving Source: Symantec
  • 19. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com ► Malware is already becoming more situationally aware so as to avoid detection and resist static analysis by security researchers ► Nefarious code will evolve from the reactive polymorphic modes of today to a more proactive mission orientated design ► Like trained dogs sniffing for drugs at airports or concealed explosive devices in warzones, it is conceivable that cognitive computing will be used by criminals to autonomously hunt and capture valuable information from business networks and applications ► 16% of malware can recognise and exploit a virtual machine environment - vulnerabilities such as VENOM could allow attackers to escape a compromised virtual machine and attack others on the same system, or even attack the host hypervisor Malware becoming more situationally aware Source: Symantec
  • 20. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Symantec NEWER NASTY VARIANTS STAMPADO ENCRYPTING THE ENCRYPTED JIGSAW COUNT DOWN PUNITIVE DELETION PHILADELPHIA COUNT DOWN RUSSIAN ROULETTE ► Miscreants are moving at a much faster pace than security countermeasures ► We can expect more targeted and destructive attacks, but also ransom demands that vary based on the attacker’s estimation of the value of the data being held hostage and/or the ability of the victim to pay some approximation of what it might be worth ► Increasingly attacks will target data intensive organisations like medical practices and law and architectural firms Crypto-ransomware
  • 21. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Bleeping Computer Forcing capitulation
  • 22. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Source: Bleeping Computer Forcing capitulation
  • 23. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Digital idealism
  • 24. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com Digital realism
  • 25. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com ► Collaboration and information sharing ► Regional outposts as a visibility and compliance challenge ► Third-party vulnerabilities ► Understanding the shifting geopolitical landscape and impact on worker demography ► Preparing for crisis management (security fire drills) ► Seeking to do more with less via automation, correlation, and threat telemetry without due consideration around ‘care and feeding’ needed to drive these systems ► Organisations still seeing security as an IT issue Security pain points for enterprises
  • 26. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com ► Misaligned reporting and governance structures can quickly lead to dangerous blind spots ► Many organisations have a lack of clarity around security roles and accountabilities ► Where silos exist and there is a disconnect between operational teams and middle management, an impasse occurs ► Functions inside an enterprise can quickly go dark and become starved of resources ► Effective communication channels between leadership and hands-on technical roles are integral to inform decision making, and the budget allocation ► Critically, the C-Suite needs to be aware of where valuable information is disbursed across their enterprise and how a compromise of that information will impact profitability, branding, and reputation Silos
  • 27. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com ► Organic and inorganic business growth changes the attack surface and risk profile for an organisation ► As information systems converge and disparate networks are linked together, new security vulnerabilities emerge ► Architects of secure environments carefully tailor their systems to meet challenges within a specific context ► When the context shifts, so too will the stressors that impact these systems ► For continuous security improvement to occur, change management must be a key part of enterprise growth and contraction Growth and change management
  • 28. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com ► For organisations that forward deploy their technology and human assets into the businesses of their clients, these unfamiliar environments will present new dangers ► This may be caused by differences in the way a business treats physical security or cultural peculiarities impacting the behaviour of the workforce in terms of how data is handled ► It's useful to consider this as analogous to taking an animal out of one habitat and placing it into another ► Changes in climate and terrain impact the ecosystems and ultimately alter the natural order of things ► Predators can quickly become prey Forward deployment
  • 29. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com 1 2 3 4 Negative Social Media Debilitating operational pressure Staff lockout from system Forensic investigation and remediation costs 5Negative local and international press 6Customer notification costs 7 Costs for contractual breach, litigation, and fines from regulators 8Loss of customers and loss of sales 9 Loss of jobs and business failure Breach tree
  • 30. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com 1. Notice the worry NO YES 3. Ask: Can I do something about it? Let worry go Action plan Change focus of attention What? When? How? NOW LATER Do it! Let worry go Change focus of attention Let worry go Change focus of attention Schedule it Source: Adapted from Butler and Hope 2007 2. Ask: What am I worrying about? Worry tree
  • 31. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com VFAC Review No. 12 July & August 2016 https://eng.kic.re.kr/.. Considerations for defenders (open access)
  • 32. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com IJCC Vol. 9 January – June 2015 http://www.cybercrimejournal.com/.. Considerations for incident responders (open access)
  • 33. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com UNODC 2013 https://www.unodc.org/.. Considerations for governments (open access)
  • 34. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com United Nations - Comprehensive Study on Cybercrime Source: UNODC TRANSLATION LINKS Spanish: https://www.unodc.org/documents/organized- crime/cybercrime/Cybercrime_Study_Spanish.pdf Arabic: https://www.unodc.org/documents/organized- crime/cybercrime/Cybercrime_Study_Arabic.pdf Chinese: https://www.unodc.org/documents/organized- crime/cybercrime/Cybercrime_Study_Chinese.pdf English: https://www.unodc.org/documents/organized- crime/cybercrime/CYBERCRIME_STUDY_210213 .pdf French: https://www.unodc.org/documents/organized- crime/cybercrime/Cybercrime_Study_French.pdf Russian: https://www.unodc.org/documents/organized- crime/cybercrime/Cybercrime_Study_Russian.pdf
  • 35. CAMERON BROWN – Establishing strategic level analysis@AnalyticalCyber cameron.brown@legalforensic.com c Questions