SlideShare a Scribd company logo
1 of 43
Save Yourself!
How the Cyber Self Defence Framework can help you prioritise and apply
defence in depth efforts using traditional Situational Crime Prevention strategies
The Problem
“$1 trillion
dollars!”
“more than half of
humanity is at risk of
falling victim to
cybercrime at any time”
“the primary key threat is
not state actors but
cybercriminals”
But why?
“cybercrime is safe and profitable,
occurs in an environment that is
constantly expanding and thrives in
vulnerable systems”
• Cybercrime pays and can be easy to commit
• Policing is (mostly) constrained to a pre-internet model
• Risk of detection, arrest, prosecution and jail time is low
• Connectivity is ubiquitous and more time is spent online
Stir in ingredients…
• Low interest rates
• Pandemic anxiety
• Isolation and loneliness
• Widespread loss of income
• Digital transformation to
WFA
Victorians had the highest reported losses - $49m, up 115% YoY
“likely attributable to the long lockdown periods the
population experienced in 2020, which created
opportunities for scammers as people were forced into
unusual economic and social situations that had the
potential to increase their susceptibility to scams”
Enforcement
Education
Wide
Focus
Narrow
Focus
NZ Police – Districts
- NZ jurisdiction
- Offshore limitations
NCSC
- CNI threats
- FVEY partnerships
NZ Police - NCCC
- Specialist
cybercrime unit
- Support
nationwide ops
Consumer Affairs
- Scamwatch owner
- Protection education
NetSafe
- Scamwatch triage
- HDCA education/response
DIA EMCU
- UEMA 2007 - Spam / 7726
- Txt, email, fax channels
IDCARE
- Identity theft and fraud
- Victim support across A/NZ
FMA
- Securities legislation
- Investment scams
Commerce Commission
- Fair Trading Act
Citizens Advice
- Advice and education
Domain Name Commission
- .nz domainspace
- Registry compliance
“the New Zealand landscape for
cybercrime is cluttered and
fragmented… unclear and
overlapping roles… multiple,
overlapping information sources
and entry points for members of
the public”
CERT NZ
- Cyber security focus
- COVID scams
OPC
- Data breaches (2020 Act)
Enforcement
Education
Wide
Focus
Narrow
Focus
NZ Police – Districts
- NZ jurisdiction
- Offshore limitations
NCSC
- CNI threats
- FVEY partnerships
NZ Police - NCCC
- Specialist
cybercrime unit
- Support
nationwide ops
Consumer Affairs
- Scamwatch owner
- Protection education
NetSafe
- Scamwatch triage
- HDCA education/response
DIA EMCU
- UEMA 2007 - Spam / 7726
- Txt, email, fax channels
IDCARE
- Identity theft and fraud
- Victim support across A/NZ
FMA
- Securities legislation
- Investment scams
Commerce Commission
- Fair Trading Act
Citizens Advice
- Advice and education
Domain Name Commission
- .nz domainspace
- Registry compliance
“the New Zealand landscape for
cybercrime is cluttered and
fragmented… unclear and
overlapping roles… multiple,
overlapping information sources
and entry points for members of
the public”
CERT NZ
- Cyber security focus
- COVID scams
OPC
- Data breaches (2020 Act)
2020:
$16.9m
4,740
reports
2020:
$19.23m
13,926
reports
NZ Police Stats
(NZCVS, 2019)
• Only 10% of fraud or cybercrime incidents reported to the Police
• The most common type of offence, more common than burglary
• Most commonly recognised by the victim as a crime
• Rated most ‘high seriousness’ (42%) but least reported
• Why such under-reporting?
32% reported to other authorities, 22% because “Police couldn’t
have done anything”
The Solution
Bruce Schneier
“Why are we trying to fix
the user instead of solving
the underlying security
problem?”
4 models of crime prevention
Type Intent Effectiveness
Law enforcement Criminal justice system deters
and punishes offenders and
delivers rehabilitation
Poor
Developmental Early intervention addresses
the causes of criminality in
youth
Poor
Social Strengthening
neighbourhoods to build
community relationships
Poor
Situational prevention Reducing the opportunities for
crime through 5 mechanisms
Good
What is SCP?
“a package of measures that:
(1) are directed at highly specific forms of crime
(2) involve the management, design or
manipulation of the immediate environment in
as systematic and permanent a way as possible
(3) so as to reduce the opportunities for crime and
increase the risks as perceived by a wide range
of offenders”
Situational Crime Prevention is…
5 mechanisms / 25 techniques
What is the Cyber Self
Defence Framework?
Internet users:
• Have limited ‘compliance budgets’
• Make time/benefit tradeoffs
• Struggle to understand and apply advice
• Lack ability to judge effectiveness
• Rates guidance based on cost, effort and
effectiveness
• States the action and the benefits
• Helps you navigate a sea of poorly
prioritised advice
The CSDF:
101 Unique Safeguards
Priority 1: 57 Priority 2: 35 Priority 3: 9
Holistic techniques
• Identify your digital crown jewels - data and devices
• Use unique complex passwords
• Use trusted anti-virus/anti-malware software
• Use a supported OS on all connected devices
• Use a firewall
• Use secure networks
• Use HTTPS everywhere
• Use secure DNS
• Back up critical data and devices and test restoration
• Do not pay ransoms
• Use privacy and security enhancing browser add-ons
• Review privacy and terms of service statements
• Use services with good privacy protecting defaults
• Use a webcam cover
• Protect personal and financial information
• Use privacy settings on all platforms to limit sharing
• Protect phone numbers
• Avoid oversharing online
• Avoid high risk online activities when impaired
• Keep your clothes on
Privacy
Security
Foundational practices
to deter, deflect and
defend against cybercrime:
• Set clear online boundaries
• Avoid oversharing online
• Undertake security awareness training
• Communicate how and when to report incidents
• Communicate online policies/rules
• Do not provoke trolls/doxers
• Do not respond to trolls/doxers
• Do not support bullying and doxing behaviours
• Report abuse to service providers
• Report to law enforcement
• Use services with good security practices
• Use services with good privacy protecting defaults
Next steps…
CSDF v2
• Performance Shaping Factors:
Personality, Age, etc.
• Profile baselines: ‘Crypto Investor’
• Quick Starts:
• Time bound - 5 / 15 / 30 minute
‘recipes’
• Budget bound - $50 / $100 / $250
‘recipes’
• Devices owned, risk appetite
Distribution channels?
• Crime prevention guidance with NZ
Police
• Neighbourhood Support groups
• Partnership with Personal Cyber cover
providers
• SaaS / App-based subscription service:
 Task based checklists
 Set your own ‘nudge’ cadence -
DuoLingo
 Maturity pathway - Gamification
 Continuous monitoring and
improvement
Questions/Feedback?

More Related Content

What's hot

Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board informationAprio
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015ITSM Academy, Inc.
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscapeJisc
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 

What's hot (20)

Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board information
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 

Similar to Save yourself with the CSDF - ISACA Auckland - 16 June 2021

Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Why Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdfWhy Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdfBytecode Security
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012Jacqueline Fick
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sectorfmi_igf
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Information Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and ConsumersInformation Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and Consumersvictoriamac2009
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UKNapier University
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 

Similar to Save yourself with the CSDF - ISACA Auckland - 16 June 2021 (20)

Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Why Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdfWhy Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdf
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Fraud in the Public Sector
Fraud in the Public SectorFraud in the Public Sector
Fraud in the Public Sector
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Information Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and ConsumersInformation Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and Consumers
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 

Recently uploaded

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 

Save yourself with the CSDF - ISACA Auckland - 16 June 2021

  • 1. Save Yourself! How the Cyber Self Defence Framework can help you prioritise and apply defence in depth efforts using traditional Situational Crime Prevention strategies
  • 4.
  • 5. “more than half of humanity is at risk of falling victim to cybercrime at any time”
  • 6. “the primary key threat is not state actors but cybercriminals”
  • 7.
  • 9. “cybercrime is safe and profitable, occurs in an environment that is constantly expanding and thrives in vulnerable systems” • Cybercrime pays and can be easy to commit • Policing is (mostly) constrained to a pre-internet model • Risk of detection, arrest, prosecution and jail time is low • Connectivity is ubiquitous and more time is spent online
  • 10. Stir in ingredients… • Low interest rates • Pandemic anxiety • Isolation and loneliness • Widespread loss of income • Digital transformation to WFA
  • 11.
  • 12. Victorians had the highest reported losses - $49m, up 115% YoY “likely attributable to the long lockdown periods the population experienced in 2020, which created opportunities for scammers as people were forced into unusual economic and social situations that had the potential to increase their susceptibility to scams”
  • 13. Enforcement Education Wide Focus Narrow Focus NZ Police – Districts - NZ jurisdiction - Offshore limitations NCSC - CNI threats - FVEY partnerships NZ Police - NCCC - Specialist cybercrime unit - Support nationwide ops Consumer Affairs - Scamwatch owner - Protection education NetSafe - Scamwatch triage - HDCA education/response DIA EMCU - UEMA 2007 - Spam / 7726 - Txt, email, fax channels IDCARE - Identity theft and fraud - Victim support across A/NZ FMA - Securities legislation - Investment scams Commerce Commission - Fair Trading Act Citizens Advice - Advice and education Domain Name Commission - .nz domainspace - Registry compliance “the New Zealand landscape for cybercrime is cluttered and fragmented… unclear and overlapping roles… multiple, overlapping information sources and entry points for members of the public” CERT NZ - Cyber security focus - COVID scams OPC - Data breaches (2020 Act)
  • 14. Enforcement Education Wide Focus Narrow Focus NZ Police – Districts - NZ jurisdiction - Offshore limitations NCSC - CNI threats - FVEY partnerships NZ Police - NCCC - Specialist cybercrime unit - Support nationwide ops Consumer Affairs - Scamwatch owner - Protection education NetSafe - Scamwatch triage - HDCA education/response DIA EMCU - UEMA 2007 - Spam / 7726 - Txt, email, fax channels IDCARE - Identity theft and fraud - Victim support across A/NZ FMA - Securities legislation - Investment scams Commerce Commission - Fair Trading Act Citizens Advice - Advice and education Domain Name Commission - .nz domainspace - Registry compliance “the New Zealand landscape for cybercrime is cluttered and fragmented… unclear and overlapping roles… multiple, overlapping information sources and entry points for members of the public” CERT NZ - Cyber security focus - COVID scams OPC - Data breaches (2020 Act) 2020: $16.9m 4,740 reports 2020: $19.23m 13,926 reports
  • 15.
  • 16.
  • 17. NZ Police Stats (NZCVS, 2019) • Only 10% of fraud or cybercrime incidents reported to the Police • The most common type of offence, more common than burglary • Most commonly recognised by the victim as a crime • Rated most ‘high seriousness’ (42%) but least reported • Why such under-reporting? 32% reported to other authorities, 22% because “Police couldn’t have done anything”
  • 19. Bruce Schneier “Why are we trying to fix the user instead of solving the underlying security problem?”
  • 20. 4 models of crime prevention Type Intent Effectiveness Law enforcement Criminal justice system deters and punishes offenders and delivers rehabilitation Poor Developmental Early intervention addresses the causes of criminality in youth Poor Social Strengthening neighbourhoods to build community relationships Poor Situational prevention Reducing the opportunities for crime through 5 mechanisms Good
  • 21.
  • 22.
  • 23.
  • 24.
  • 26. “a package of measures that: (1) are directed at highly specific forms of crime (2) involve the management, design or manipulation of the immediate environment in as systematic and permanent a way as possible (3) so as to reduce the opportunities for crime and increase the risks as perceived by a wide range of offenders” Situational Crime Prevention is…
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. 5 mechanisms / 25 techniques
  • 32.
  • 33. What is the Cyber Self Defence Framework?
  • 34.
  • 35.
  • 36. Internet users: • Have limited ‘compliance budgets’ • Make time/benefit tradeoffs • Struggle to understand and apply advice • Lack ability to judge effectiveness • Rates guidance based on cost, effort and effectiveness • States the action and the benefits • Helps you navigate a sea of poorly prioritised advice The CSDF:
  • 37. 101 Unique Safeguards Priority 1: 57 Priority 2: 35 Priority 3: 9
  • 38. Holistic techniques • Identify your digital crown jewels - data and devices • Use unique complex passwords • Use trusted anti-virus/anti-malware software • Use a supported OS on all connected devices • Use a firewall • Use secure networks • Use HTTPS everywhere • Use secure DNS • Back up critical data and devices and test restoration • Do not pay ransoms • Use privacy and security enhancing browser add-ons • Review privacy and terms of service statements • Use services with good privacy protecting defaults • Use a webcam cover • Protect personal and financial information • Use privacy settings on all platforms to limit sharing • Protect phone numbers • Avoid oversharing online • Avoid high risk online activities when impaired • Keep your clothes on Privacy Security
  • 39. Foundational practices to deter, deflect and defend against cybercrime: • Set clear online boundaries • Avoid oversharing online • Undertake security awareness training • Communicate how and when to report incidents • Communicate online policies/rules • Do not provoke trolls/doxers • Do not respond to trolls/doxers • Do not support bullying and doxing behaviours • Report abuse to service providers • Report to law enforcement • Use services with good security practices • Use services with good privacy protecting defaults
  • 41. CSDF v2 • Performance Shaping Factors: Personality, Age, etc. • Profile baselines: ‘Crypto Investor’ • Quick Starts: • Time bound - 5 / 15 / 30 minute ‘recipes’ • Budget bound - $50 / $100 / $250 ‘recipes’ • Devices owned, risk appetite
  • 42. Distribution channels? • Crime prevention guidance with NZ Police • Neighbourhood Support groups • Partnership with Personal Cyber cover providers • SaaS / App-based subscription service:  Task based checklists  Set your own ‘nudge’ cadence - DuoLingo  Maturity pathway - Gamification  Continuous monitoring and improvement

Editor's Notes

  1. Presenting to ISACA Auckland – Wednesday 16th June 2021 At the end of 2020, The Center for Strategic and International Studies (CSIS) declared cybercrime to be a "$1 trillion dollar drag on the global economy" that can harm public safety, undermine national security, and damage economies. Incidents of cybercrime have increased by anything from 40% to 400% in the fraught environment of a global pandemic and the true scale of the problem remains unknown in New Zealand with only 10% of fraud or cybercrime incidents reported to Police. Digital safety and security advice can be confusing or packed full of jargon that leaves the average internet user unsure on how to protect themselves and where best to start. The Cyber Self Defence Framework (CSDF) proposes a set of situational security measures – tailored to common cyber-enabled crimes including phishing, social engineering, malware and online scams and fraud – that can help you understand real-world threats to your identity, finances, data and devices and assist you in prioritising your security investments. Attendees at this session can help refine the framework and break the causal chains to prevent cybercrime from occurring.
  2. The Center for Strategic and International Studies (CSIS) declared cybercrime to be a "$1 trillion dollar drag on the global economy" that can harm public safety, undermine national security, and damage economies.
  3. Fourth biannual report estimates the monetary loss from cybercrime at approximately $945 billion, an increase of $345bn in just 2 years
  4. Jürgen Stock, INTERPOL Secretary General - Cybercrime is one of the most prolific forms of international crime, with damages set to cost the global economy USD 10+ trillion annually by 2025
  5. Lindy Cameron, NCSC UK CEO spoke this week (whilst the G7 event was taking place in the UK) about the real threat to UK individuals, businesses and CNI operators in light of events at Colonial Pipeline and the Irish health system.
  6. - Cybercrime pays and can be easy to commit - Policing is (mostly) constrained to a pre-internet model of sovereign nation states with jurisdictional boundaries - The risk of detection, arrest, prosecution and punishment is low - Connectivity is ubiquitous and more time is spent online
  7. Australians lost over $850 million to scams and made 444,164 scam reports in total to Scamwatch, ReportCyber, other government agencies, banks and payment platforms in 2020. Based on this combined data, the scams causing the most financial harm to Australians in 2020 were: - ƒ$328 million lost to investment scams - $131 million lost to romance scams - ƒƒ$128 million lost to business email compromise (payment redirection scams)
  8. “Australians lost over $851 million to scams in 2020, a record amount, as scammers took advantage of the pandemic to con unsuspecting people”- https://www.accc.gov.au/media-release/scammers-capitalise-on-pandemic-as-australians-lose-record-851-million-to-scams Startling metrics coming out of Oz where 444,000 incident reports from Scamwatch, ReportCyber, other government agencies and 10 banks and financial intermediaries have been aggregated. Great to see this level of cooperation between private and public sector. KEY FINDINGS: - “As people spent more time online during the COVID-19 pandemic lockdown, reports and losses for some scams also increased” - a 75% increase in phishing scams - “Investment scams accounted for the biggest losses, with $328 million, and made up more than a third of total losses. Romance scams were the next biggest category, costing Australians $131 million, while payment redirection scams resulted in $128 million” And despite the various reporting points pooling their data it’s believed these numbers will still not reflect the true picture due to under reporting.
  9. Neil Hallett from IDCARE indicates in NZ they have helped 1000 Kiwis losing around $10m ($10,000 each on average)
  10. This illustration aptly demonstrates the complexity of reporting and responding to cybercrime
  11. 8% of Kiwis were victims of cybercrime in 2019 but only 10% was reported to NZP – what is the true picture? New Zealand Crime and Victims Survey (NZCVS) – September 2019 - https://www.justice.govt.nz/assets/Documents/Publications/NZCVS-Y2-A5-KeyFindings-v2.0-.pdf Over 320,000 adults (7.9%) experienced 420,000 fraud or cybercrime incidents over last 12 months. (Fraud and cybercrime offences are grouped) The estimated number of fraud and cybercrime offences reported in the NZCVS over the last 12 months is 421,000, which equated to an incidence rate of 11 fraud and cybercrime offences per 100 adults. The estimated total number of adults who experienced one or more fraud and cybercrime offences over the last 12 months is 328,000, which equated to a prevalence rate of 8%. The groups significantly more likely than the NZ average to experience fraud and cybercrime offences were: • having low life satisfaction and a low feeling of safety • experiencing a moderate or high level of psychological distress • having high household income ($150,001 or more). The groups significantly less likely to experience fraud and cybercrime offences were: • older (aged 65 and over) • Asian (especially Chinese) • widowed • retired • having high life satisfaction and a high feeling of safety • having household income between $30,001 to $40,000.
  12. In the real world, crime prevention is a key part of tackling social harms The Cyber Self Defence Framework (CSDF) proposes a set of situational security measures – tailored to common cyber-enabled crimes including phishing, social engineering, malware and online scams and fraud – that can help you understand real-world threats to your identity, finances, data and devices and assist you in prioritising your security investments. Attendees at this session can help refine the framework and break the causal chains to prevent cybercrime from occurring.
  13. 10+ years to stand up CERT, 10 years to sign up to the Budapest Convention, Ministers committing to publishing flow charts – Govt action is not going to save you….
  14. SCP is designed to break the causal chains to prevent crime from occurring
  15. SHIELD is the inspiration…
  16. Deploy an Active Defense with MITRE Shield - https://medium.com/mitre-shield/three-simple-ways-to-deploy-an-active-defense-with-mitre-shield-95ae639a50b5
  17. ADVERSARY ATTRITION - What adversaries do deplete though is time and the resources associated with it and their personnel. Depleting an adversary’s resources, including their time to plan and achieve their objectives, is of critical importance to a defender. Passive Defenses help achieve this. The Sliding Scale of Cyber Security - Robert M. Lee The U.S. military has unofficially and commonly used the actions of “deny, disrupt, deceive, degrade, and destroy” to describe a cyber attack.29
  18. Rational choice, routine activity and crime pattern theories emphasise that crimes occur in specific situations and result from a nexus of a motivated offender, suitable target or victim, and the absence of a capable guardian (not focused on criminals and their motivations)
  19. Visual examples of SCP
  20. In NZ
  21. Links to CPTED and physical security controls
  22. Most obvious example is prevention for burglary
  23. SCP is a framework utilising 5 mechanisms and under each 5 techniques designed to modify the environment and deter the attackers (Ron Clarke)
  24. My efforts to apply this to cybercrime have identified a control set for the average internet users, informed by best practice at CERT, CIS and others
  25. CSDF will be the security ‘meal kit’ for the masses
  26. The masses who post pandemic understand layers of protection and the swiss cheese model
  27. Situational security measures tailored to common cyber-enabled crimes including phishing, social engineering, malware and online scams and fraud Help you understand real-world threats to your identity, finances, data and devices and assist you in prioritising your security investments Intent to address CRAVED items – in SCP world a hot product: Concealable, Removable, Available, Valuable, Enjoyable, and Disposable
  28. For more information see https://www.ubisec.nz/csdf/ - we welcome feedback!