SlideShare a Scribd company logo
1 of 11
Lipstick on a Pig
Professor John Walker MFSoc CRISC CISM ITPC CITP SIRM FBCS FRSA
Director of CSIRT & Cyber Forensics
INTEGRAL SECURITY XSSURANCE Ltd

24 Lime Street | London | EC3M 7HS
Mobile: +44 (0) 7881 625140
Office: +44 (0) 2032 894449
History
Based on case histories, media reports, and statements from the Met Police Computer Crime Unit, there is
strong evidence to suggest Cyber Criminality [in all forms] are winning.
At the First Digital/Cyber Forensics event hosted by the Forensic
Science Society – York, on 03/02/14, the expert panel observed:
a. Most companies subjected to Security/Pen Testing have
Multiples of significant [repeated] vulnerabilities!
b. The Black Hats are Winning [Proven by case histories]
c. Criminality excesisise high degrees of innovation & imagination
http://itsecurityguru.org/water-water-everywhere-byte-eat/#.UwHtII2PNhE
Tick Boxes Lead to Compliance – NOT always Security

On the 13th February 2014, I participated in a Webinar for info security.
A question was posed:
Q: What does Tick Box Security NOT Tell You?
The Answer
A: What the Successful Attacker Knows!
http://www.infosecurity-magazine.com/webinar/443/testing-your-businesss-ability-to-defend-its-digital-and-physical-workplace-/view.aspx
Mediocrity will NOT Suffice
It was the BofE who were the main orchestrators of
Waking Shark II – Yet they have a number of significant
security exposures, and vulnerabilities, of which they
have been informed under respectful, Channelled
Disclosure Notification – With no response, or action.
If we are to lead the riotous path to evolve security
and to protect the public, then it must surly follow
a route to secure our infrastructures, and not just
Ignore the open states of potential compromise!
We must take the Threat serious – or there is no point.

In fact
we are already here!

See article in Digital Forensics Magazine – [If you want a cope just drop me a line].

Waking Shark II – Security , or PR http://www.informationsecuritybuzz.com/waking-shark-2/
DDoS
DDoS has ben growing in popularity year, on year, with the throughput of adverse traffic increasing - & it requires
zero skill to join in:
The Statistics you Know – and those you may NOT!
Play Safe
WiFi everywhere – but still not being used security, or sensibly –
An example:
Intelligent Postures & Response
Know your Critical assets
Find out what you ‘Don’t Know’
Consider the element of Data Leakage – Conduct a Triage
Conduct Intelligent Testing
Know your Business Exposure
Employ Situational Awareness Practices
Evolve an Incident Response Process, and Capability [Not just Lights on stuff]
Don’t do ‘Lip-Service’ do ‘Security’
The CSIRT Framework
LAB
[ISO/IEC 17025]

CSIRT Document
Registers

An example of a CSIRT[1] Framework, encompassing:

GRC &
Case Management

Document Registers – with Version Control
LAB
GRC & Case Management
ISO 27001 – Statement of Applicability [SOA]
Run-Books [Storey Boards]
Policies & Processes

CSIRT Incident
TOR/Processes

CSIRT Incident
Response Policy

ISO/IEC 27001
Segment SOA

CSIRT Procedures

Tools & Apps

CSIRT Run-Books

Investigations
[PAS 555]

Acquisition

DoS/DDoS

Abusive Images
[COPIN/SAP]

•
•
•
•
•
•

Image Extraction

Abusive Images

Phishing

Malware
[Virus – Trojan]

Legislation
[e.g. DPA/ITA]

[1] Computer Security Incident Response Team
Five Simple Conclusions
• Possibly there is need to instil more ethics in those organisations who have failed to meet their
obligations.
• Maybe it’s a case of Less ‘Tick Box’ Compliance, and More Operational Security.
• Could it be that we have reached the time where the levels of Insecurity and Security Braches are
implying we need to get Back-to-Basics.
• Above all, has the time arrived which dictates that we need to rethink what security is, how it can be
best accomplished, and how we can serve our public better, without the need for such
government, or EU enforcement?
• However, it really is about understanding, and appreciating what Cyber Risk really is 2014 >>, and
the associated ramifications of what uninformed exposure could mean to the business.
Donald Rumsfeld - There are known unknowns; that is to say, there are things that we now know we don't know. . . . . .
The ULTIMATE Conclusion
We must recognise the onslaught, and success of Cyber Crime in all forms – and it is time to address it
Full on – with commitment – and above all, we must not , by implication, or suggestion of complacency
become a part of the problem.
To quote GCHQ/CESG from the mid eighties: We see the computer virus as a nuisance, & a passing threat!
To quote CPNI from 6 years ago: The Cyber Threat is over hyped!

More Related Content

What's hot

The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Phpnw 2013 cyber-security
Phpnw 2013 cyber-securityPhpnw 2013 cyber-security
Phpnw 2013 cyber-securitycfing99
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19Citrin Cooperman
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterWilliam Grieve
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber StrategyIan Kelly
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Chris Hails
 
Biz miz io2 contenuti modulo 4_it
Biz miz io2 contenuti modulo 4_itBiz miz io2 contenuti modulo 4_it
Biz miz io2 contenuti modulo 4_itEmanuelePristera
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobilegrugq
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challengesDNIF
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Chris Hails
 
Protect your Business from Crime
Protect your Business from CrimeProtect your Business from Crime
Protect your Business from CrimeTag Guard
 

What's hot (16)

The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Phpnw 2013 cyber-security
Phpnw 2013 cyber-securityPhpnw 2013 cyber-security
Phpnw 2013 cyber-security
 
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info sec 12 v1 2
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
 
Biz miz io2 contenuti modulo 4_it
Biz miz io2 contenuti modulo 4_itBiz miz io2 contenuti modulo 4_it
Biz miz io2 contenuti modulo 4_it
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
A closer look at CTF challenges
A closer look at CTF challengesA closer look at CTF challenges
A closer look at CTF challenges
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Protect your Business from Crime
Protect your Business from CrimeProtect your Business from Crime
Protect your Business from Crime
 

Viewers also liked

Startup Promo in Social Media
Startup Promo in Social MediaStartup Promo in Social Media
Startup Promo in Social MediaMaxon Pugovsky
 
Electrostatic history
Electrostatic historyElectrostatic history
Electrostatic historyyoprst
 
MMMMX - Vyuzitie SMS/MMS v marketingu
MMMMX - Vyuzitie SMS/MMS v marketinguMMMMX - Vyuzitie SMS/MMS v marketingu
MMMMX - Vyuzitie SMS/MMS v marketinguStrategieSK
 
cyberworx Technology Website Designing Company Brochure
cyberworx Technology Website Designing Company Brochurecyberworx Technology Website Designing Company Brochure
cyberworx Technology Website Designing Company BrochureCyberworx Technologies
 
Librito carnaval
Librito carnavalLibrito carnaval
Librito carnavalAndres Toro
 
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond finalId101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond finalSaurabh Calla
 
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...Marc Chang Sing Pang
 
Presentation of work around VLE Minimum Standards at the North West ALT SIG (...
Presentation of work around VLE Minimum Standards at the North West ALT SIG (...Presentation of work around VLE Minimum Standards at the North West ALT SIG (...
Presentation of work around VLE Minimum Standards at the North West ALT SIG (...Peter Reed
 
A (não) política de habitação e o imi (conclusão)
A (não) política de habitação e o imi (conclusão)A (não) política de habitação e o imi (conclusão)
A (não) política de habitação e o imi (conclusão)GRAZIA TANTA
 
30 years in 30 minutes: Tips for starting your advertising career.
30 years in 30 minutes:  Tips for starting your advertising career.30 years in 30 minutes:  Tips for starting your advertising career.
30 years in 30 minutes: Tips for starting your advertising career.David Murphy
 

Viewers also liked (20)

Akavita. Internet advert Efficiency
Akavita. Internet advert EfficiencyAkavita. Internet advert Efficiency
Akavita. Internet advert Efficiency
 
Pomelo Case Study Ru
Pomelo Case Study RuPomelo Case Study Ru
Pomelo Case Study Ru
 
Sychev
SychevSychev
Sychev
 
Startup Promo in Social Media
Startup Promo in Social MediaStartup Promo in Social Media
Startup Promo in Social Media
 
Unesco
UnescoUnesco
Unesco
 
Electrostatic history
Electrostatic historyElectrostatic history
Electrostatic history
 
RST2014_Khabarovsk_GarmViS
RST2014_Khabarovsk_GarmViSRST2014_Khabarovsk_GarmViS
RST2014_Khabarovsk_GarmViS
 
MMMMX - Vyuzitie SMS/MMS v marketingu
MMMMX - Vyuzitie SMS/MMS v marketinguMMMMX - Vyuzitie SMS/MMS v marketingu
MMMMX - Vyuzitie SMS/MMS v marketingu
 
cyberworx Technology Website Designing Company Brochure
cyberworx Technology Website Designing Company Brochurecyberworx Technology Website Designing Company Brochure
cyberworx Technology Website Designing Company Brochure
 
Librito carnaval
Librito carnavalLibrito carnaval
Librito carnaval
 
UAPR - 2007-2008
UAPR - 2007-2008UAPR - 2007-2008
UAPR - 2007-2008
 
Pdu villa de álvarez
Pdu villa de álvarezPdu villa de álvarez
Pdu villa de álvarez
 
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond finalId101 what's new in ibm lotus® domino® 8.5.3 and beyond final
Id101 what's new in ibm lotus® domino® 8.5.3 and beyond final
 
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
2008 Butler Group Enterprise Architecture Master class "Bridging the gap betw...
 
Presentation of work around VLE Minimum Standards at the North West ALT SIG (...
Presentation of work around VLE Minimum Standards at the North West ALT SIG (...Presentation of work around VLE Minimum Standards at the North West ALT SIG (...
Presentation of work around VLE Minimum Standards at the North West ALT SIG (...
 
A (não) política de habitação e o imi (conclusão)
A (não) política de habitação e o imi (conclusão)A (não) política de habitação e o imi (conclusão)
A (não) política de habitação e o imi (conclusão)
 
Giga1
Giga1Giga1
Giga1
 
Modcities international
Modcities international Modcities international
Modcities international
 
Road Safety
Road SafetyRoad Safety
Road Safety
 
30 years in 30 minutes: Tips for starting your advertising career.
30 years in 30 minutes:  Tips for starting your advertising career.30 years in 30 minutes:  Tips for starting your advertising career.
30 years in 30 minutes: Tips for starting your advertising career.
 

Similar to Lipstick on a pig

Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
5 Universal SOC Challenges- COMTACT
5 Universal SOC Challenges- COMTACT5 Universal SOC Challenges- COMTACT
5 Universal SOC Challenges- COMTACTAlbertLancaster
 
Gunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo UK
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 

Similar to Lipstick on a pig (20)

White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
White hat march15 v2.2
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Bt tower v1.1
Bt tower v1.1Bt tower v1.1
Bt tower v1.1
 
Take Down
Take DownTake Down
Take Down
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 
5 Universal SOC Challenges- COMTACT
5 Universal SOC Challenges- COMTACT5 Universal SOC Challenges- COMTACT
5 Universal SOC Challenges- COMTACT
 
Global 2-2016-en
Global 2-2016-enGlobal 2-2016-en
Global 2-2016-en
 
Gunnebo Global Customer Magazine
Gunnebo Global Customer MagazineGunnebo Global Customer Magazine
Gunnebo Global Customer Magazine
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 

More from Prof John Walker FRSA Purveyor Dark Intelligence (8)

Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
DarkWeb
DarkWebDarkWeb
DarkWeb
 
Wax Switch
Wax SwitchWax Switch
Wax Switch
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
APT Event - New York
APT Event - New YorkAPT Event - New York
APT Event - New York
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Ctf110213 public
Ctf110213 publicCtf110213 public
Ctf110213 public
 

Lipstick on a pig

  • 1. Lipstick on a Pig Professor John Walker MFSoc CRISC CISM ITPC CITP SIRM FBCS FRSA Director of CSIRT & Cyber Forensics INTEGRAL SECURITY XSSURANCE Ltd 24 Lime Street | London | EC3M 7HS Mobile: +44 (0) 7881 625140 Office: +44 (0) 2032 894449
  • 2. History Based on case histories, media reports, and statements from the Met Police Computer Crime Unit, there is strong evidence to suggest Cyber Criminality [in all forms] are winning. At the First Digital/Cyber Forensics event hosted by the Forensic Science Society – York, on 03/02/14, the expert panel observed: a. Most companies subjected to Security/Pen Testing have Multiples of significant [repeated] vulnerabilities! b. The Black Hats are Winning [Proven by case histories] c. Criminality excesisise high degrees of innovation & imagination http://itsecurityguru.org/water-water-everywhere-byte-eat/#.UwHtII2PNhE
  • 3. Tick Boxes Lead to Compliance – NOT always Security On the 13th February 2014, I participated in a Webinar for info security. A question was posed: Q: What does Tick Box Security NOT Tell You? The Answer A: What the Successful Attacker Knows! http://www.infosecurity-magazine.com/webinar/443/testing-your-businesss-ability-to-defend-its-digital-and-physical-workplace-/view.aspx
  • 4. Mediocrity will NOT Suffice It was the BofE who were the main orchestrators of Waking Shark II – Yet they have a number of significant security exposures, and vulnerabilities, of which they have been informed under respectful, Channelled Disclosure Notification – With no response, or action. If we are to lead the riotous path to evolve security and to protect the public, then it must surly follow a route to secure our infrastructures, and not just Ignore the open states of potential compromise! We must take the Threat serious – or there is no point. In fact we are already here! See article in Digital Forensics Magazine – [If you want a cope just drop me a line]. Waking Shark II – Security , or PR http://www.informationsecuritybuzz.com/waking-shark-2/
  • 5. DDoS DDoS has ben growing in popularity year, on year, with the throughput of adverse traffic increasing - & it requires zero skill to join in:
  • 6. The Statistics you Know – and those you may NOT!
  • 7. Play Safe WiFi everywhere – but still not being used security, or sensibly – An example:
  • 8. Intelligent Postures & Response Know your Critical assets Find out what you ‘Don’t Know’ Consider the element of Data Leakage – Conduct a Triage Conduct Intelligent Testing Know your Business Exposure Employ Situational Awareness Practices Evolve an Incident Response Process, and Capability [Not just Lights on stuff] Don’t do ‘Lip-Service’ do ‘Security’
  • 9. The CSIRT Framework LAB [ISO/IEC 17025] CSIRT Document Registers An example of a CSIRT[1] Framework, encompassing: GRC & Case Management Document Registers – with Version Control LAB GRC & Case Management ISO 27001 – Statement of Applicability [SOA] Run-Books [Storey Boards] Policies & Processes CSIRT Incident TOR/Processes CSIRT Incident Response Policy ISO/IEC 27001 Segment SOA CSIRT Procedures Tools & Apps CSIRT Run-Books Investigations [PAS 555] Acquisition DoS/DDoS Abusive Images [COPIN/SAP] • • • • • • Image Extraction Abusive Images Phishing Malware [Virus – Trojan] Legislation [e.g. DPA/ITA] [1] Computer Security Incident Response Team
  • 10. Five Simple Conclusions • Possibly there is need to instil more ethics in those organisations who have failed to meet their obligations. • Maybe it’s a case of Less ‘Tick Box’ Compliance, and More Operational Security. • Could it be that we have reached the time where the levels of Insecurity and Security Braches are implying we need to get Back-to-Basics. • Above all, has the time arrived which dictates that we need to rethink what security is, how it can be best accomplished, and how we can serve our public better, without the need for such government, or EU enforcement? • However, it really is about understanding, and appreciating what Cyber Risk really is 2014 >>, and the associated ramifications of what uninformed exposure could mean to the business. Donald Rumsfeld - There are known unknowns; that is to say, there are things that we now know we don't know. . . . . .
  • 11. The ULTIMATE Conclusion We must recognise the onslaught, and success of Cyber Crime in all forms – and it is time to address it Full on – with commitment – and above all, we must not , by implication, or suggestion of complacency become a part of the problem. To quote GCHQ/CESG from the mid eighties: We see the computer virus as a nuisance, & a passing threat! To quote CPNI from 6 years ago: The Cyber Threat is over hyped!