SlideShare a Scribd company logo
1 of 21
Company Confidential | www.SalientCommercial.com | 1
Hackers, Attackers and Criminals
The never ending, dynamic and evolving threat
Company Confidential | www.SalientCommercial.com | 2
“The further backward you look, the further forward you can see.”
Sir Winston S. Churchill
2/25/2015
Company Confidential | www.SalientCommercial.com | 3
Carlos Fernandes, CISSP
• Leads Salient’s Cyber Security Center of Excellence
• Responsible for developing and implementing Salient’s
Cyber Security Strategy of expanding market distinctions
and innovation
• Certified Information Systems Security Professional with
over 20 years of industry experience
• Founder and Managing Principal/CEO of Agile
Cybersecurity Solutions LLC (ACS)
• United States Air Force veteran, Intelligence Analysis and
Applications Officer
• BS Electrical Engineering from Virginia Military Institute
(VMI)
2/25/2015
Company Confidential | www.SalientCommercial.com | 4
Hackers, Attackers and Criminals
• Objectives
–Highlight the evolving threat.
–Why should we care?
–What we can’t do.
–What can we all do?
• Disclaimer: Warning - The content of this
presentation might scare the Hell out of you.
2/25/2015
Company Confidential | www.SalientCommercial.com | 52/25/2015
The Evolving Threat
Company Confidential | www.SalientCommercial.com | 6
The Evolving Threat
“The threat is much worse than any of us can
imagine.”
- Admiral “Mike” McConnell, Vice Chairman, Director of
the National Security Agency from 1992 to 1996.
2/25/2015
Company Confidential | www.SalientCommercial.com | 7
Typical Threats To Security
2/25/2015
Company Confidential | www.SalientCommercial.com | 8
Advanced Persistent Threat (APT)
An adversary that —
Possesses significant levels of expertise / resources.
Creates opportunities to achieve its objectives by using
multiple attack vectors (e.g., cyber, physical, deception).
Establishes footholds within IT infrastructure of targeted
organizations:
 To exfiltrate information.
 Undermine / impede critical aspects of a mission, program, or organization.
 Position itself to carry out these objectives in the future.
2/25/2015
Company Confidential | www.SalientCommercial.com | 92/25/2015
Why You Should Care
Company Confidential | www.SalientCommercial.com | 10
Why should we care?
“The stakes are enormous. If a cyber incident
disrupted our financial and accounting transactions,
our equities and bond markets or our retail commerce
… or created confusion about the legitimacy of those
transactions … chaos would result.”
“Our power grids, air and ground transportation,
telecommunications and water filtration systems are
in jeopardy as well.”
- Admiral “Mike” McConnell, Director of the National Security
Agency from 1992 to 1996.
2/25/2015
Company Confidential | www.SalientCommercial.com | 112/25/2015
What We Can’t Do
Company Confidential | www.SalientCommercial.com | 12
What we can’t do
• Authority limitations – Legally, we cannot respond
to an international cyber incident.
• Attribution – There are technical limitations with
regards to knowing for certain where the cyber
incident originated.
• It is not possible to be 100% secure in
cyberspace.
2/25/2015
Company Confidential | www.SalientCommercial.com | 132/25/2015
What Can We All Do?
Company Confidential | www.SalientCommercial.com | 14
What can we all do?
• More cross-industry collaboration
• Sharing of threat information & mitigation
strategies
• Agree to a voluntary set of standards/best
practices that address liability, privacy and
security with rewards for compliance
• Identify, retain and train cyber security
professionals
2/25/2015
Company Confidential | www.SalientCommercial.com | 152/25/2015
Security Best Practices
Company Confidential | www.SalientCommercial.com | 16
Where to begin
• Develop a security and risk assessment strategy
• Implement the strategy
• Establish a security baseline, based on best
practices
• Identify security gaps
• Prioritize findings
• Develop and implement a mitigation strategy
• Continuously monitor
• Constantly remind yourself and others that cyber
security is a journey not a destination
2/25/2015
Company Confidential | www.SalientCommercial.com | 172/25/2015
Company Confidential | www.SalientCommercial.com | 18
Key Standards and Guidelines
 FIPS Publication 199 (Security Categorization)
 FIPS Publication 200 (Minimum Security Controls)
 NIST Special Publication 800-18 (Security Planning)
 NIST Special Publication 800-30 (Risk Assessment)
 NIST Special Publication 800-37 (Risk Management Framework)
 NIST Special Publication 800-39 (Enterprise Risk Management)
 NIST Special Publication 800-53 (Recommended Security Controls)
 NIST Special Publication 800-53A (Security Control Assessment)
 NIST Special Publication 800-59 (National Security Systems)
 NIST Special Publication 800-60 (Security Category Mapping)
2/25/2015
Company Confidential | www.SalientCommercial.com | 192/25/2015
Company Confidential | www.SalientCommercial.com | 20
“A leader never walks by a mistake”
General Norman Schwarzkopf
Commander of Operations for Desert Shield & Desert Storm
2/25/2015
Company Confidential | www.SalientCommercial.com | 212/25/2015
Q & A

More Related Content

What's hot

New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesCitrin Cooperman
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldKevin Duffey
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessYork Risk
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19Citrin Cooperman
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls Dyan Cornacchio
 
Flipping the Economics of Attacks
Flipping the Economics of AttacksFlipping the Economics of Attacks
Flipping the Economics of AttacksPaloAltoNetworks
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015TierPoint
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident DetectionTripwire
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetCSI Solutions
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsPECB
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_enMonica Verma
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeCraig McGill
 
Inforgraphic: Risk Management Recommendations for Covid-19 by CISA
Inforgraphic: Risk Management Recommendations for Covid-19 by CISAInforgraphic: Risk Management Recommendations for Covid-19 by CISA
Inforgraphic: Risk Management Recommendations for Covid-19 by CISAWebServes
 
FERMA presentation at Parima conference
FERMA presentation at Parima conferenceFERMA presentation at Parima conference
FERMA presentation at Parima conferenceFERMA
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceCollege Development Network
 

What's hot (20)

New York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services CompaniesNew York Cybersecurity Requirements for Financial Services Companies
New York Cybersecurity Requirements for Financial Services Companies
 
Cyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's worldCyber Heroes of tomorrow's world
Cyber Heroes of tomorrow's world
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls
 
Flipping the Economics of Attacks
Flipping the Economics of AttacksFlipping the Economics of Attacks
Flipping the Economics of Attacks
 
IGPC Data Breach Planning braindump
IGPC Data Breach Planning braindumpIGPC Data Breach Planning braindump
IGPC Data Breach Planning braindump
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
Collateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisationsCollateral Damage: Cyberwar and its affect on organisations
Collateral Damage: Cyberwar and its affect on organisations
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
Inforgraphic: Risk Management Recommendations for Covid-19 by CISA
Inforgraphic: Risk Management Recommendations for Covid-19 by CISAInforgraphic: Risk Management Recommendations for Covid-19 by CISA
Inforgraphic: Risk Management Recommendations for Covid-19 by CISA
 
FERMA presentation at Parima conference
FERMA presentation at Parima conferenceFERMA presentation at Parima conference
FERMA presentation at Parima conference
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
 

Similar to HackersAttackersCriminals_2014

How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008ValueMentor Consulting
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferenceBill Despo
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Cytegic presentation 02 12
Cytegic presentation 02 12Cytegic presentation 02 12
Cytegic presentation 02 12Cytegic
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security frameworkYann Lecourt
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksVincent Bellamy
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk ManagementTudor Damian
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 

Similar to HackersAttackersCriminals_2014 (20)

How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Strategic Cybersecurity
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 Conference
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Cytegic presentation 02 12
Cytegic presentation 02 12Cytegic presentation 02 12
Cytegic presentation 02 12
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security framework
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Cisco Advanced Services
Cisco Advanced ServicesCisco Advanced Services
Cisco Advanced Services
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 

HackersAttackersCriminals_2014

  • 1. Company Confidential | www.SalientCommercial.com | 1 Hackers, Attackers and Criminals The never ending, dynamic and evolving threat
  • 2. Company Confidential | www.SalientCommercial.com | 2 “The further backward you look, the further forward you can see.” Sir Winston S. Churchill 2/25/2015
  • 3. Company Confidential | www.SalientCommercial.com | 3 Carlos Fernandes, CISSP • Leads Salient’s Cyber Security Center of Excellence • Responsible for developing and implementing Salient’s Cyber Security Strategy of expanding market distinctions and innovation • Certified Information Systems Security Professional with over 20 years of industry experience • Founder and Managing Principal/CEO of Agile Cybersecurity Solutions LLC (ACS) • United States Air Force veteran, Intelligence Analysis and Applications Officer • BS Electrical Engineering from Virginia Military Institute (VMI) 2/25/2015
  • 4. Company Confidential | www.SalientCommercial.com | 4 Hackers, Attackers and Criminals • Objectives –Highlight the evolving threat. –Why should we care? –What we can’t do. –What can we all do? • Disclaimer: Warning - The content of this presentation might scare the Hell out of you. 2/25/2015
  • 5. Company Confidential | www.SalientCommercial.com | 52/25/2015 The Evolving Threat
  • 6. Company Confidential | www.SalientCommercial.com | 6 The Evolving Threat “The threat is much worse than any of us can imagine.” - Admiral “Mike” McConnell, Vice Chairman, Director of the National Security Agency from 1992 to 1996. 2/25/2015
  • 7. Company Confidential | www.SalientCommercial.com | 7 Typical Threats To Security 2/25/2015
  • 8. Company Confidential | www.SalientCommercial.com | 8 Advanced Persistent Threat (APT) An adversary that — Possesses significant levels of expertise / resources. Creates opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, deception). Establishes footholds within IT infrastructure of targeted organizations:  To exfiltrate information.  Undermine / impede critical aspects of a mission, program, or organization.  Position itself to carry out these objectives in the future. 2/25/2015
  • 9. Company Confidential | www.SalientCommercial.com | 92/25/2015 Why You Should Care
  • 10. Company Confidential | www.SalientCommercial.com | 10 Why should we care? “The stakes are enormous. If a cyber incident disrupted our financial and accounting transactions, our equities and bond markets or our retail commerce … or created confusion about the legitimacy of those transactions … chaos would result.” “Our power grids, air and ground transportation, telecommunications and water filtration systems are in jeopardy as well.” - Admiral “Mike” McConnell, Director of the National Security Agency from 1992 to 1996. 2/25/2015
  • 11. Company Confidential | www.SalientCommercial.com | 112/25/2015 What We Can’t Do
  • 12. Company Confidential | www.SalientCommercial.com | 12 What we can’t do • Authority limitations – Legally, we cannot respond to an international cyber incident. • Attribution – There are technical limitations with regards to knowing for certain where the cyber incident originated. • It is not possible to be 100% secure in cyberspace. 2/25/2015
  • 13. Company Confidential | www.SalientCommercial.com | 132/25/2015 What Can We All Do?
  • 14. Company Confidential | www.SalientCommercial.com | 14 What can we all do? • More cross-industry collaboration • Sharing of threat information & mitigation strategies • Agree to a voluntary set of standards/best practices that address liability, privacy and security with rewards for compliance • Identify, retain and train cyber security professionals 2/25/2015
  • 15. Company Confidential | www.SalientCommercial.com | 152/25/2015 Security Best Practices
  • 16. Company Confidential | www.SalientCommercial.com | 16 Where to begin • Develop a security and risk assessment strategy • Implement the strategy • Establish a security baseline, based on best practices • Identify security gaps • Prioritize findings • Develop and implement a mitigation strategy • Continuously monitor • Constantly remind yourself and others that cyber security is a journey not a destination 2/25/2015
  • 17. Company Confidential | www.SalientCommercial.com | 172/25/2015
  • 18. Company Confidential | www.SalientCommercial.com | 18 Key Standards and Guidelines  FIPS Publication 199 (Security Categorization)  FIPS Publication 200 (Minimum Security Controls)  NIST Special Publication 800-18 (Security Planning)  NIST Special Publication 800-30 (Risk Assessment)  NIST Special Publication 800-37 (Risk Management Framework)  NIST Special Publication 800-39 (Enterprise Risk Management)  NIST Special Publication 800-53 (Recommended Security Controls)  NIST Special Publication 800-53A (Security Control Assessment)  NIST Special Publication 800-59 (National Security Systems)  NIST Special Publication 800-60 (Security Category Mapping) 2/25/2015
  • 19. Company Confidential | www.SalientCommercial.com | 192/25/2015
  • 20. Company Confidential | www.SalientCommercial.com | 20 “A leader never walks by a mistake” General Norman Schwarzkopf Commander of Operations for Desert Shield & Desert Storm 2/25/2015
  • 21. Company Confidential | www.SalientCommercial.com | 212/25/2015 Q & A

Editor's Notes

  1. The attached video clip provides some insight into the idea behind our “Precognitive Capabilities”   http://www.imdb.com/video/imdb/vi355440921/
  2. Hackers, cyber crime, and a new kind of war (3:53) – “Salient” point of our discussion http://www.youtube.com/watch?v=PrP0WZFrTYg
  3. Cybercrime continues to increase, with 92% of Forbes Global 2000 companies reporting data breaches within the last 12 months. US, by policy, does not engage in economic espionage. By contrast, most other nations do. It is estimated that over 200 nations have an Intelligence capability. Cyber tools, used for exploitation, can also be used for cyber attacks. These capabilities are being built by the 1,000s. The result is that most us corporations have been penetrated. The Magnitude of Cyber Threats – Mike McConnell (4:24) http://www.youtube.com/watch?v=K04SMZAkh34&list=PL5nWsySehsd2i4Yoy2cKfIzOg4f1V3JAU Description of the Cyber Attack – Mike McConnel (1:50 - 8:45) http://www.youtube.com/watch?v=8UARznPdjaM Can Cyber Attacks Prompt the Next Financial Crisis? – Howard Schmidt, FMR. Whitehouse Cybersecurity Coordinator (4:14) http://www.youtube.com/watch?v=vi2M1sSVtPY
  4. Critical infrastructure is at risk (power, water, nuclear, communications, etc). Like the nuclear threat, mutually assured destruction is a deterrent for nation states. Terrorists are not deterred. Economic espionage is common practice by most nations. New technologies, e.g. wearable devices such as Google Glass, add to the complexity of the problem.
  5. Exfiltrate definition – In cyberspace, exfiltrate is defined as the removal of information (digital data) by stealth, deception, surprise, or clandestine means. Other terms used to conduct these types of operations: Computer Network Operations (CNO), Computer Network Exploitation (CNE). The advanced persistent threat has matured from disruption (DDoS) to destruction, where either a malicious insider or outsider will launch a cyber attack with the intent to destroy data and/or hardware assets. APT – a dedicated and motivated adversary.
  6. Show the following youtube clip to bring home the point: Cyber Warfare – from disruption to destruction (3:53) http://www.youtube.com/watch?v=DSMOs7CF1Eo&feature=related Threats have grown from disruption to destruction, as exemplified by the recent cyber incident at Saudi Aramco (Saudi Arabian Oil Co.), the world’s largest state-owned crude oil exporter. The cyber incident destroyed 55,000 computers.
  7. Organizations do not have a legal framework to effectively address and deal with international cyber incidents. Special interests hinder progress. 100% secure is not possible. The fact is that we, as a nation, are becoming increasingly more dependent on cyberspace. In order to stay ahead of the growing problem, we must engage in strategic dialogue. It will take collaboration and the forming of partnerships between public, private and international communities.
  8. Apply industry best practices
  9. Incentivize compliance Market based incentives vs. government mandates Robert Bigman, former Chief of Information Assurance at the CIA, has publically stated that industry best practices are not being followed. We know what to do but we are not doing it.
  10. Federal Information Processing Standards (FIPS) – Publically announced standards developed by the Federal Government National Institute of Standards and Technology (NIST) – Agency of the US Department of Commerce
  11. Precognitive Capabilities, focused on using artificial intelligence and human capital to predict and prevent attacks before they happen.
  12. As leaders, I encourage all of you to stay alert and do all you can to promote cyber security awareness.