Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Managing cyber security

203 views

Published on

Despite a security landscape now embracing: People; Companies; Governments; Devices; Networks; Services; Vehicles; Properties; LAND; SEA; AIR; SPACE; CYBER and INFORMATION, people and organisations still tend to see all this as someone else problem. In reality, it concerns all of us. Governments can no longer protect their citizens and nor can any company IT/Security Dept!

“In an ideal world: responses to Cyber and Terror would be automated and immediate”

The Dark Side has grown rich and powerful by investing in R&D and the latest technology; adopting distributed team working and a global market for talent and resources; and they are winning this war with an estimated $1.5Tn income in 2019. We have to adopt the same strategies to survive let alone win. Global sharing and cooperation are key along with people, staff, management, board, NED and Chairman education/training/involvement. At this time it is rare to find a ‘Cyber Seat’ on the main board of any organization, but it is a new and critical essential!

Published in: Leadership & Management

Managing cyber security

  1. 1. Managing Cyber Security p e t e r c o c h r a n e . c o m B e y o n d I T G e e k d o m s ! P e t e r C o c h r a n e O B E CyberCluster Sept 2019
  2. 2. B I G G E S T T H R E AT People: innocent, naive, careless “Most don’t see security as their problem or responsibility””
  3. 3. B i gg est D a n g e r C h a i r m a n , B o a rd a n d N E D s “Why do you need $$$ for security when we don’t have a problem ?” HR Finance Legal PR “No Security position on the board and a very poor grasp of technology”
  4. 4. technophobes I hate all this tech stuff ! “Unwilling to try to learn & understand the most basic of tools that children now consider to be the norm” A dying breed - but if they are in positions of power and control they can inflict serious damage! Silly, Naive, Foolish Reckless, Careless Innocent, Ignorant Arrogant, Negative Close Minded +++
  5. 5. M B A B U B B L ES C l o u d e d b y m a n y m y t h s • I know everything about business • I can manage/lead any kind of enterprise • I don’t need to understand the technology • All businesses are fundamentally the same • I don’t need detailed understanding of ‘X’ • The principles I know are sufficient • All problems are essentially simple • My job is one of control “Isn’t Hubris a Breakfast cereal ?”
  6. 6. W h y ( s e c u r i t y ) T h i n g s F a i l ! “Not understanding IT basics make people an ideal/soft target for all forms of social and tech based cyber attack” Putting an organisation at increased risk through wilful ignorance is on a par with no understanding the principles of the law!
  7. 7. I T D E P T I s o l a t i o n Time to change relationships & language “It is no use complaining that everyone ‘just doesn’t get IT’ - all support teams are duty bound to help staff/employees/contractors understand and learn by whatever means necessary”
  8. 8. c y b e r s e c u r i t y Abandon all the omnipotence “The problem is much bigger than you are and collaboration with all suppliers and other companies is now essential” No country or company is and island and no one can go-it-alone in this Cyber War - we have to collaborate and share to survive
  9. 9. ! N o A n t i c i p at i o n - n o p l a n Y o u w o u l d n o t r u n a b u s i n e s s t h i s w a y ! Talk to me people WTF is happening? “A r e a l l y u n c o m f o r t a b l e & f r i g h t e n i n g p l a c e t o b e ”
  10. 10. R o g u e S t a t e s C r i m i n a l s G r o u p s Hackers A m a t e u r s O p p o r t u n i s t s F u n d i n g R e s o u r c i n g N e t w o r k i n g P r o f i t a b i l i t y R & D / S h a r i n g M a r k e t P l a c e C o o r d i n a t i o n The big contrast Networking/organised Hackers C a p a b i l t y T h r e a t C u r v e Motivated by $$$$ without constraint or boundaries Well planned & fully resourced attacks focused o n m a x i m i s i n g the ROI
  11. 11. R o g u e S t a t e s C r i m i n a l s G r o u p s Hackers A m a t e u r s O p p o r t u n i s t s F u n d i n g R e s o u r c i n g N e t w o r k i n g P r o f i t a b i l i t y R & D / S h a r i n g M a r k e t P l a c e C o o r d i n a t i o n The big contrast Networking/organised Hackers C a p a b i l t y T h r e a t C u r v e Motivated by $$$$ without constraint or boundaries Well planned & fully resourced attacks focused o n m a x i m i s i n g the ROI Y O UN G ER M O RE SK ILLED BETTER O RG A N ISED FA R M O RE O F THEM THA N Y O UR TEA M
  12. 12. ! F o rt r ess M a n a g e m e n t T h e e n e m y c a n i n n o v a t e f a s t e r t h a n y o u ! “It only took the invention of one new weapon to put an end to this regime” “Most companies are engaged in repeating this history but in the ICT domain”
  13. 13. ! F o rt r ess M a n a g e m e n t T h e e n e m y c a n i n n o v a t e f a s t e r t h a n y o u ! “It only took the invention of one new weapon to put an end to this regime” “Most companies are engaged in repeating this history but in the ICT domain” Attackers Advantaged by surprise Exploit your weaknesses Unbounded in their actions Employ unanticipated techniques Choose the time and methodology Approach from unexpected directions Fundamentally without morals or ethics
  14. 14. ! G o o d d e f e n d e r s W e r e o n c e g o o d a t t a c k e r s “ T h i n k i n g l i k e t h e e n e m y a n d a n t i c i p a t i n g t h e i r n e x t m o v e i s e s s e n t i a l ” To b e e f f e c t i v e t h e y n e e d t o b e p a r t o f a g l o b a l t e a m … i n d i v i d u a l s & s t a n d a l o n e t e a m s h a v e l i t t l e o r n o c h a n c e ! “ C a p a b i l i t y i m p a c t e d b y m a n a g e m e n t s t y l e & f u n d i n g ”
  15. 15. “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk” P E R S P E C T I V E It is hard to understate the risk
  16. 16. T H E T H R E A T L a n d s c a p e T h e p ro - a c t i ve g ro u p s c o n s t i t u t i n g T h e D a r k S i d e Fun Fame Notoriety Vandalism Limited Skills Limited Resources Tend to be Sporadic Rogue States Criminals Hacker Groups Hacktivist Amateurs Money Sharing Organic Dispersed Unbounded Huge Effort Progressive Cooperatives Self Organising Vast Resources Massive Market Aggregated Skills Semi-Professional Substantial Networks Skilled Political Idealists Emotional Relentless Dedicated Cause Driven Vast Networks Varied Missions Targeted Attacks Evolving Community Drugs Fraud Global Extreme Extortion Business Unbounded Professional Well Managed Well Organised Ahead of the Curve Orchestrated Effort Extremely Profitable Syndicated Resources Massive Attack Surface Vast up-to-date Abilities Covert Money WarFare Influence Pervasive Disruption Espionage Professional Sophisticated Well Organised Extreme Creativity Orchestrated Effort Political Influencers ~Unlimited Resources Tech/Thought Leaders Regime Destabilisation Population Manipulation Military and Civil Domains “Most attacks/attack-types/info-corruption /security failures can be traced back to human fallibility”
  17. 17. P E R S P E C T I V E A growing people problem/crisis 2019 Security Survey and Report
  18. 18. P E R S P E C T I V E Technology only a partial solution 2019 Security Survey and Report https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
  19. 19. P E R S P E C T I V E No sector or organisation is safe 2019 Security Survey and Report https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
  20. 20. P E R S P E C T I V E Attack damage costs are rising 2019 Security Survey and Report Source Site: https://www.accenture.com/us-en/insights/security/cost-cybercrime-study
  21. 21. C Y B E R C R I M E G r o w i n g g l o b a l b u s i n e s s Crime Online Black/Grey Markets IP Theft Data Exchange/Trading CrimeWare RansomeWare Total Revenues Revenues $900 Bn $500 Bn $200 Bn $2.0 Bn $1.5 Bn >$1600 Dark Side Employee Earnings Hacker ~ $30k/job = $80 - 170 k/year Team Leader ~ $2M/year Data derived from numerous published reports including: https://www.thesslstore.com/blog/2018-cybercrime-statistics/ Networked global teams operating in an open market of sharing groups that invest in people R&D and highly adaptive/cooperative innovation
  22. 22. ! I g n o r a n c e & N o P l a n A l w a y s r e s u l t s i n a r a p i d e s c a l a t i o n “ E v e r y t h i n g h a p p e n i n g a n d f a i l i n g f a s t e r t h a n a n y h u m a n c a n t h i n k a n d / o r a c t ”
  23. 23. ! IF Panic ensues T h e n t h e g a m e i s o v e r “ I r r a t i o n a l i t y a n d b a d d e c i s i o n s e s c a l a t e t h e w h o l e s i t u a t i o n a n d t h e e n e m y h a s w o n ” “ U n c e r t a i n t y a n d i n d e c i s i o n o n l y s e r v e s t o a m p l i f y t h e r i s k a n d i n c r e a s e t h e c h a o s ”
  24. 24. W hat W e need to DO To win, we have to be much smarter !The Dark Side are 100% committed and see this war as total; and a much wider conflict than CYBER alone… We therefore have to be far more integrated & sharing - a networked & virtualised workforce driven by the greater good and loss/damage minimisation is needed… We need to be better informed and alert to the latest threat scenarios and solutions - and we have to rehearse our response to all known forms of attack We have to anticipate the innovations of the Dark Side: their technologies, tools, tactics, modes of attack, and we really have to start think as they do…
  25. 25. W hat W e need to DO Involve everyone in the organisation Board People Visitors Suppliers Managers Customers Contractors Create an eco-system of: capable & aware; networked & motivated; supportive and skilled people, groups, companies and organisation for the sharing of data, experiences, solutions, resources
  26. 26. ! W hat W e need to DO Add a Main Board ITC Cyber Security seat
  27. 27. W hat W e need to DO Make cyber security a part of the culture “Security should not be seen as an extra workload but more like ‘breathing’ - a necessary & subliminal function”
  28. 28. W hat W e need to DO Look for attack/event pre- cursors They are out there somewhere hidden in day-to-day data/behaviours!
  29. 29. Looking for statistical anomalies & exceptions from patterns of activity of people, machines & networks reveals many hidden attack modes… A new and developing field W hat W e need to DO Automate as much as possible Humans, nets & machines tend to be habitual All attacks have precursors
  30. 30. B e i n g b l i n d N o t a v i a b l e o p t i o n “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk”
  31. 31. B e i n g b l i n d N o t a v i a b l e o p t i o n “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk”
  32. 32. B e i n g b l i n d N o t a v i a b l e o p t i o n “Being continually exposed to threats, & subject to attack from any direction by any means at any time poses an unacceptable risk” S it u a t io n a l a w a r en es s is es s en t ia l in a ll fo r m s o f W a r fa r e S u r p r is e a t t a c k s a r e A lm o s t Im p o s s ib le t o c o u n t er
  33. 33. ! m i l i ta ry - W a r G a m es P l a y a l l d a y & o c c a s i o n a l l y f i g h t “ T h e r e i s n o t h i n g q u i t e l i k e b e i n g s h o t a t ” A s s u m i n g t h e r o l e o f t h e a t t a c k e ra n d t h e n d e f e n d e r i s a g a m e r i c h i n e x p e r i e n c e s
  34. 34. ! m i l i ta ry - W a r G a m es P l a y a l l d a y & o c c a s i o n a l l y f i g h t The m ilitary plaN and play all day occasionally they go to w ar Com panies are At w ar everyday but never plan or play
  35. 35. M O R E D E P T H The technical detail is extensive For a selection of overview and in depth presentations GOTO: https://www.slideshare.net/PeterCochrane/it-and-systems-security-the-bigger-picture https://www.slideshare.net/PeterCochrane/people-the-biggest-cyber-risk https://www.slideshare.net/PeterCochrane/how-to-build-a-truth-engine https://www.slideshare.net/PeterCochrane/sentient-cyber-security https://www.slideshare.net/PeterCochrane/holistic-security https://www.slideshare.net/PeterCochrane/the-iot-for-real
  36. 36. For a selection of overview and in depth presentations GOTO: Thank You https://petercochrane.com Is this the main event or a subterfuge? Is this the main event or a subterfuge? Text Is this the main event or a subterfuge?

×