1. Você está pronto para enfrentar os criminosos cibernéticos?
Fernando Romero, CISSP
Cybersecurity Specialist LATAM
fernando.romero@bt.com
2. 2
aiming to
divert custom.
Hacktivists
seeking to
avenge a
perceived wrong.
those who
use hacking to
get their
message across.
those aiming
to exploit for
financial gain.
amateurs
vandalising
‘just because’.
Employees Competitors EntrepreneurHackers
Como podemos categorizar os criminosos cibernéticos?
3. 3
1. Security challenges.
Digital crime is
driven by a
criminal dark market –
with organised, well
resourced and
profitable attacks.
Beyond the ‘four walls’, remote working, BYOD
and complex supply chains increase vulnerability –
leaving security teams struggling to keep up
with digital thieves.
The net cast by criminal entrepreneurs is widening.
Every second new malware is created and
distributed and new phishing campaigns are launched.
Unpatched, legacy
IT can be
a weak point in
digital defences.
Phishing tactics are
constantly evolving
and new trends emerge
towards email ‘CEO fraud’.
Attacks go beyond
distributing malware –
organised crime groups
exploit, blackmail employees
and place people on
the inside.
7. 77
4. Taking the fight to the attacker.
Keep criminals away from
your information. Your first
line of defence is to keep
criminals out of your
information systems. Criminal
entrepreneurs are after your
data, and without access to
this, they can’t make any
money.
Make it harder for attackers
to exploit your data. Should
you suffer a breach, the next
step is to make it harder for
criminals to actually use your
data. Encryption is a key
element in achieving this —
and banks offer a good
example to follow.
Stop criminals spending their
ill-gotten gains. To truly cut off
criminal entrepreneurs’ ability
to capitalise on their crimes,
you have to stop them using
their profits. This means being
part of a collaborative
worldwide effort to prevent
money laundering and access
to black markets. ’.
8. 88
5. Um pouco do Portfolio da BT Security.
BT Assure DDoS Mitigation
makes sure hackers cannot
prevent customers from
reaching your ‘storefront’.
BT Assure Threat Defence
guarantees real-time
response to any critical
alerts or targeted
malware detected within
your network.
BT Assure Threat Monitoring
provides a unique security
information and event
management (SIEM) service
that collects and analyses
security information 24x7
across your organisation.
9. 9
The Geo-mapping shows the source and destination of
attacks in real time or based on historical data
The search function allows you to quickly find
information within messages
Failures
Anomalies
Potential
Threats
Attack
6. Assure analytics - Map View
Cada um com as suas ferramentas e motivadores. Vou focar um pouco mais nos empreendedores.
Small-time hackers have begun using DDoS attacks.
There was a recent case in the news of a twelve year old Canadian boy who pleaded guilty to causing $60,000 worth of damage to government websites; security flaws were exploited, websites were flooded and access was gained to confidential databases. This stolen data was then traded with international hacker network Anonymous in return for, would you believe it, video games.
This goes to show that while not every attacker has malicious intent, there are always people waiting in the wings to make the most of any kind of security breach.
The recent technological advances, easier usage and the unprecedented increase in the use of mobile devices have combined to pose an ever-growing threat when it comes to DDoS attacks and your organisation.
Digital crime is rising at an astonishing rate but while businesses are aware of a sharp increase in risk that awareness has not translated into effective action. The vast majority of businesses have experienced some kind of attack but only a minority feel fully prepared to face the growing threat.
Ruthless criminal entrepreneurs are seizing the opportunity to exploit vulnerable systems. Their attacks are supported by a vast, well resourced and hugely profitable dark market.
Digital crime currently costs the world in the region of $400 billion every year* (http://www.mcafee.com/uk/resources/reports/rp-economic-impact-digitalcrime2.pdf)
We live in a world where technology is all-pervasive and as businesses roll out ever more sophisticated and ambitious digital strategies, ruthless criminal entrepreneurs are seizing the opportunity to exploit and monetise vulnerable systems. Their attacks are supported by a vast, well-resourced and hugely profitable dark market in which constantly evolving attack tools can be easily bought and hired.
Encryption is a vital security tool, protecting personal and corporate data from the prying eyes of intruders, but in the hands of criminals it can also be used as an attack weapon. Ransomware is currently used by criminal entrepreneurs to extort ransom payments from companies and individuals. Typically, this is achieved by infecting a computer with malware that encrypts files. Once the data has been rendered inaccessible, the victim receives a ransom demand.
The increasing sophistication and tenacity of cyber criminals mean that no organisation can be 100% assured that its systems are secure. But businesses can take steps to make successful attacks more difficult, more costly and ultimately much less profitable.
Taking the fight to the attacker – Action points:§ Build partnerships with law enforcement – this will ensure that if the worst happens you have the trusted contacts you need to respond quickly. This might mean creating the headroom for your team to participate in forums designed to respond to managed cybercrime.§ Share information with your peers. Cybercrime isn’t a competitive issue – it hurts the whole community and you are all being targeted. Online and physical forums exist to allow this to happen in a trusted and confidential environment. Identify and join the most relevant of those forums. § Look at how you can limit the ability of criminals to exploit your data if they are successful in stealing it. Ask yourself if you can detect and block misuse, or respond quickly to a breach? In answering these questions, model the most likely scenarios that could lead to exploitation of data. Foster collaboration with outside organisations (banks, law enforcement agencies, suppliers) who may be the recipients of attempts to exploit the data.
The increasing sophistication and tenacity of cyber criminals mean that no organisation can be 100% assured that its systems are secure. But businesses can take steps to make successful attacks more difficult, more costly and ultimately much less profitable.
Taking the fight to the attacker – Action points:§ Build partnerships with law enforcement – this will ensure that if the worst happens you have the trusted contacts you need to respond quickly. This might mean creating the headroom for your team to participate in forums designed to respond to managed cybercrime.§ Share information with your peers. Cybercrime isn’t a competitive issue – it hurts the whole community and you are all being targeted. Online and physical forums exist to allow this to happen in a trusted and confidential environment. Identify and join the most relevant of those forums. § Look at how you can limit the ability of criminals to exploit your data if they are successful in stealing it. Ask yourself if you can detect and block misuse, or respond quickly to a breach? In answering these questions, model the most likely scenarios that could lead to exploitation of data. Foster collaboration with outside organisations (banks, law enforcement agencies, suppliers) who may be the recipients of attempts to exploit the data.
Finalizo aqui, convidando vocês a irem ao nosso stand para conhecer as nossas soluçoes e conhecer mais o relatório aqui apresentado.