SlideShare a Scribd company logo
10 Security issues facing
NZ Enterprises
Agenda
● Introduction
● Ten Issues
● Questions
Introduction
● This presentation is a rapid (15-20 minute) summary of security issues
facing NZ enterprises
● The list of issues has been created from both research (such as the
Verizon Data Breach Investigation Report/DBIR) as well as my own
personal experience
● For each issue, I will explain:
○ The core concept of the issue
○ Ways that the issue can be mitigated
10 Security issues facing
NZ Enterprises
Phishing & Whaling Ransomware
3rd Parties / Suppliers Customer Data Privacy
Theft of your customer Advanced Persistent Threats
Mobile Workforce Application Layer Attacks
Incident Response Internet of Things (IoT)
Issue#1:
Phishing & Whaling
“Phishing” is a problem that nearly all New Zealand businesses face.
Despite good awareness - it’s still successful!
“Whaling” is a specifc type of spear-phishing that is targeted at the
executive level. The aim of the attack is often to get funds transferred
“urgently” or to get confidential data.
Ways to mitigate
- Raise awareness of both its frequency and motivation
- Don’t rely on electronic requests (phone/talk to people when concerned)
- Enable Multi-factor authentication
Issue#2: Ransomware
Ransomware is becoming increasingly common in New Zealand.
It is becoming increasingly popular because of it’s success (ie
people are paying up), with the currency requested being Bitcoins
because they are difficult to trace.
Ways to mitigate
Patch OS & applications
Backup regularly - and test backups!
Minimize privileges (avoids escalation or horizontal movement)
Deploy Host Intrusion Detection services
Issue#3: 3rd Parties / Suppliers
Systems in 2016 are often made up of services from 3rd parties.
This means that an organisations “attack surface” is greater than
when all components of a system were “in-house”.
Ways to mitigate
* Establish multiple layers of protection to minimize risk
* Understand what systems make up your systems/solutions
* Establish a 3rd party vendor assessment questionnaire
* Create a Service Level Agreement (SLA) with a minimum
requirement that the 3rd party adheres to your security policies
Issue#4: Customer Data Privacy
With the large number of customer data breaches in the news,
Customers are demanding high levels of privacy around their
data.
Ways to mitigate
* Only collect data that you actually need
* Keep data only as long as you need it
* Ensure you keep data secure in all locations (even internally)
* Encrypt data in MOTION and at REST
Issue#5: Theft of your customer
It’s not just the customer data you need to be concerned about.
Often it’s your actual customer that the attacker is after - and your site
(which could even be a marketing site) is the way to that customer. Your
site’s popularity - and the clientele that it attracts - might just be what the
attacker is looking for!
Ways to mitigate
* Establish minimum security standards across all websites
* Monitor the reputation of your domains
* Scan your systems (Dynamic/DAST, Vulnerability, Anti-Malware) and then
mitigate or remediate issues. YOU CANNOT SCAN YOURSELF SAFE
Issue#6: Advanced Persistent Threats
Advanced Persistent Threats (APT’s) have moved from something you
see in the movies (or in a US election) to a very real threat.
Why? Simple. It’s easier & safer than traditional crimes.
Ways to mitigate
* Log everything - and monitor the logs
* Look (and ALERT) for key activities such as account creation or
privilege escalation
* Install “Learning” Host Intrusion Detection Systems
* Limit cached credentials (which enables “pass the hash” attacks)
Issue#7: Mobile workforce
Modern business does not require staff to be tethered to their office desk.
But with this increased freedom comes additional risk.
Ways to mitigate
* Enable disk encryption
* Require 2/Multi-Factor authentication
* Provide security tools (anti-virus/malware) for both work + personal
equipment
* Enable device policies where possible
* Educate employees of risks, including physical theft when travelling
Issue#8: Application Layer Attacks
The 2016 Verizon Data Breach Investigation Report (DBIR) reports that
more than 50% of all attacks now target the application layer.
Yet according to SANS, fewer than 10% of enterprises test all of their
business-critical applications. We need to change where we look.
Ways to mitigate
* Use Dynamic Analysis scanning tools (WhiteHat, Veracode)
* Use Static Analysis scanning tools
* Use application penetration testing to identify business logic issues
Issue#9: Incident Response
While preventative steps to avoid a security incident are important, it’s
also critical that enterprises have a documented incident response
plan.
For the plan to be effective, an organisation must regularly update the
plan as well as have “fire drills”.
Ways to mitigate
* Develop an incident response plan (before it’s too late)
* Conduct “Table Top” exercises, using likely breach scenarios
* Use the exercises to identify gaps and update the plan
Issue#10: Internet of Things (IoT)
Recent attacks such as the Mirai IoT botnet showed the world that
insecure devices can be used in evil ways.
The devices were used to create a Distributed Denial of Service
(DDoS) attack on a primary DNS service, resulting in the outage of
several major services on the internet.
Ways to mitigate
* Include all devices in your scope for patching (not just servers!)
* Change default passwords
* Re-flash firmware before putting devices into production (even
new devices)
10 Security issues facing
NZ Enterprises
Phishing & Whaling Ransomware
3rd Parties / Suppliers Customer Data Privacy
Theft of your customer Advanced Persistent Threats
Mobile Workforce Application Layer Attacks
Incident Response Internet of Things (IoT)
Questions?
?
Please send questions to nigel @ cybersecurity.nz

More Related Content

What's hot

Wl security-solutions
Wl security-solutionsWl security-solutions
Wl security-solutions
DefCom Technology
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
Ivanti
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Dalia Reda
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
Marie Elisabeth Gaup Moe
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Ivanti
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
Legal Services National Technology Assistance Project (LSNTAP)
 
Security Basics
Security BasicsSecurity Basics
Security Basics
Rishi Prasath
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
SupriyaGaikwad28
 
Select idps
Select idpsSelect idps
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
Major Hayden
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
Saazan Shrestha
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
Donald E. Hester
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
MLG College of Learning, Inc
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
James Cash
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 

What's hot (20)

Wl security-solutions
Wl security-solutionsWl security-solutions
Wl security-solutions
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
Select idps
Select idpsSelect idps
Select idps
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 

Similar to 10 Security issues facing NZ Enterprises

Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Accellis Technology Group
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
mapletronics
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
AppSense
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
Acend Corporate Learning
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
TechSoup
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
Bret Piatt
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesJerry Harding
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
EyesOpen Association
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
GFI Software
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
Tony Richardson CISSP
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
mccormicknadine86
 

Similar to 10 Security issues facing NZ Enterprises (20)

Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
An Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security PracticesAn Introduction to zOS Real-time Infrastructure and Security Practices
An Introduction to zOS Real-time Infrastructure and Security Practices
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUEScompTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
compTIA guide to get the CERTIFICATION EMERSON EDUARDO RODRIGUES
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

10 Security issues facing NZ Enterprises

  • 1. 10 Security issues facing NZ Enterprises
  • 2. Agenda ● Introduction ● Ten Issues ● Questions
  • 3. Introduction ● This presentation is a rapid (15-20 minute) summary of security issues facing NZ enterprises ● The list of issues has been created from both research (such as the Verizon Data Breach Investigation Report/DBIR) as well as my own personal experience ● For each issue, I will explain: ○ The core concept of the issue ○ Ways that the issue can be mitigated
  • 4. 10 Security issues facing NZ Enterprises Phishing & Whaling Ransomware 3rd Parties / Suppliers Customer Data Privacy Theft of your customer Advanced Persistent Threats Mobile Workforce Application Layer Attacks Incident Response Internet of Things (IoT)
  • 5. Issue#1: Phishing & Whaling “Phishing” is a problem that nearly all New Zealand businesses face. Despite good awareness - it’s still successful! “Whaling” is a specifc type of spear-phishing that is targeted at the executive level. The aim of the attack is often to get funds transferred “urgently” or to get confidential data. Ways to mitigate - Raise awareness of both its frequency and motivation - Don’t rely on electronic requests (phone/talk to people when concerned) - Enable Multi-factor authentication
  • 6. Issue#2: Ransomware Ransomware is becoming increasingly common in New Zealand. It is becoming increasingly popular because of it’s success (ie people are paying up), with the currency requested being Bitcoins because they are difficult to trace. Ways to mitigate Patch OS & applications Backup regularly - and test backups! Minimize privileges (avoids escalation or horizontal movement) Deploy Host Intrusion Detection services
  • 7. Issue#3: 3rd Parties / Suppliers Systems in 2016 are often made up of services from 3rd parties. This means that an organisations “attack surface” is greater than when all components of a system were “in-house”. Ways to mitigate * Establish multiple layers of protection to minimize risk * Understand what systems make up your systems/solutions * Establish a 3rd party vendor assessment questionnaire * Create a Service Level Agreement (SLA) with a minimum requirement that the 3rd party adheres to your security policies
  • 8. Issue#4: Customer Data Privacy With the large number of customer data breaches in the news, Customers are demanding high levels of privacy around their data. Ways to mitigate * Only collect data that you actually need * Keep data only as long as you need it * Ensure you keep data secure in all locations (even internally) * Encrypt data in MOTION and at REST
  • 9. Issue#5: Theft of your customer It’s not just the customer data you need to be concerned about. Often it’s your actual customer that the attacker is after - and your site (which could even be a marketing site) is the way to that customer. Your site’s popularity - and the clientele that it attracts - might just be what the attacker is looking for! Ways to mitigate * Establish minimum security standards across all websites * Monitor the reputation of your domains * Scan your systems (Dynamic/DAST, Vulnerability, Anti-Malware) and then mitigate or remediate issues. YOU CANNOT SCAN YOURSELF SAFE
  • 10. Issue#6: Advanced Persistent Threats Advanced Persistent Threats (APT’s) have moved from something you see in the movies (or in a US election) to a very real threat. Why? Simple. It’s easier & safer than traditional crimes. Ways to mitigate * Log everything - and monitor the logs * Look (and ALERT) for key activities such as account creation or privilege escalation * Install “Learning” Host Intrusion Detection Systems * Limit cached credentials (which enables “pass the hash” attacks)
  • 11. Issue#7: Mobile workforce Modern business does not require staff to be tethered to their office desk. But with this increased freedom comes additional risk. Ways to mitigate * Enable disk encryption * Require 2/Multi-Factor authentication * Provide security tools (anti-virus/malware) for both work + personal equipment * Enable device policies where possible * Educate employees of risks, including physical theft when travelling
  • 12. Issue#8: Application Layer Attacks The 2016 Verizon Data Breach Investigation Report (DBIR) reports that more than 50% of all attacks now target the application layer. Yet according to SANS, fewer than 10% of enterprises test all of their business-critical applications. We need to change where we look. Ways to mitigate * Use Dynamic Analysis scanning tools (WhiteHat, Veracode) * Use Static Analysis scanning tools * Use application penetration testing to identify business logic issues
  • 13. Issue#9: Incident Response While preventative steps to avoid a security incident are important, it’s also critical that enterprises have a documented incident response plan. For the plan to be effective, an organisation must regularly update the plan as well as have “fire drills”. Ways to mitigate * Develop an incident response plan (before it’s too late) * Conduct “Table Top” exercises, using likely breach scenarios * Use the exercises to identify gaps and update the plan
  • 14. Issue#10: Internet of Things (IoT) Recent attacks such as the Mirai IoT botnet showed the world that insecure devices can be used in evil ways. The devices were used to create a Distributed Denial of Service (DDoS) attack on a primary DNS service, resulting in the outage of several major services on the internet. Ways to mitigate * Include all devices in your scope for patching (not just servers!) * Change default passwords * Re-flash firmware before putting devices into production (even new devices)
  • 15. 10 Security issues facing NZ Enterprises Phishing & Whaling Ransomware 3rd Parties / Suppliers Customer Data Privacy Theft of your customer Advanced Persistent Threats Mobile Workforce Application Layer Attacks Incident Response Internet of Things (IoT)
  • 16. Questions? ? Please send questions to nigel @ cybersecurity.nz