SlideShare a Scribd company logo
1 of 11
Download to read offline
Building the ‘Bob Semple Cyber
Tank’ – NZ SME Security
Group outputs from Wednesday 24th October 2018
“instead of sitting down and moaning we felt we ought to do something to
manufacture weapons that would help to defend our country and our people…
That tank was an honest-to-God effort to do something with the material at
our disposal when raider were at our back door”
Bob Semple, Minister of Public Works, WWII
Summary
New Zealand is a country of small businesses. 97% of enterprises – almost half a
million according to MBIE data - have fewer than 20 employees but contribute more
than a quarter of the country’s GDP.
Almost a quarter of New Zealand small businesses have been hit by cyber crime
according to Symantec’s latest SMB Cyber Security Survey with the average financial
loss sitting at $16,000.
Many of these small businesses will be operating on the proverbial “smell of an oily
rag” with cyber security far down the list of priorities for owners focused on keeping
the lights on and the cash flowing.
It’s in this environment that many small businesses will find themselves operating
below the ‘security poverty line’, the point below which a company cannot effectively
protect itself from cyber security threats.
Many small companies believe that IT security is too expensive and that they lack the
knowledge on how to combat common cyber threats. At the October (ISC)2 Auckland
Chapter event, 25 individuals took part in group exercises designed to identify
pragmatic security investments that offer the ‘most bang for the buck’.
Activity 1: Identify your preferred cyber security investments for a
typical NZ SME
Attendees split into four groups (Green, Blue, Gold and Red) and were presented with
example cyber security guidance targeted at small businesses including:
• CERT-NZ’s Ten Critical Controls 2018
https://www.cert.govt.nz/assets/Uploads/documents/CERT-NZ-Critical-Controls-2018.pdf
• CIS Controls Implementation Guide for Small-and Medium-Sized Enterprises (SMEs)
https://www.cisecurity.org/wp-content/uploads/2017/09/CIS-Controls-Guide-for-SMEs.pdf
• The ASD/ACSC Essential Eight
https://acsc.gov.au/publications/protect/Essential_Eight_Explained.pdf
• NCSC-UK’s Small Business Guide
https://www.ncsc.gov.uk/smallbusiness
• Global Cyber Alliance Solutions (DMARC, Quad9, McScrapy)
https://www.globalcyberalliance.org/what-we-do/
Other material also made available included the Cyber Essentials Scheme Questionnaire and NIST’s Small Business Information
Security: The Fundamentals
Activity 1:
The four groups selected the following prioritised controls. Consistent choices
across all four groups were an emphasis on:
• Backing up data and testing recovery
• Implementing DNS and email security through Quad9 and DMARC
• Multi-Factor Authentication
• Focusing on credential management and enforcing least privilege
• Three groups identified Security Awareness Training and Endpoint/Malware Protection
Green Team Blue Team Gold Team Red Team
MFA Web + Email Security (Quad9) Data Protection (CIS 13) DMARC + Quad9
Backup & Testing Backups Password Management & MFA Data Recovery Capability (CIS 10) Password Management
Patching Patching Continuous Vulnerability Mgmt (CIS 4) Backup Data/Test Data
Malware Protection Backups Enforce Least Privilege Malware Protection
Upgrade Legacy Systems Application Software Security Security Awareness Training (CIS 17) Awareness Training
Quad9 Endpoint Protection (AV, FW, etc.) Default Credentials Keeping your smartphone safe
DMARC Least Privilege MFA Change default credentials
Cyber Insurance Boundary Defence MFA
Training & Awareness Endpoint Protection
DMARC
Activity 2: Identify your preferred cyber security investments for the
following real world small business scenario
‘Greenfields’ 5 person tech start-up - $5K budget for security, cloud focus
This tech start-up is using mostly IaaS, PaaS, and SaaS services from the cloud - Salesforce,
Office 365, website builder software and mostly open source software (and some licensed
software), using online libraries for publishing and releasing code, working on app
development for health service providers.
They have a remote presence in the cloud with AWS, remote management, running of
servers and processes etc. All of them have laptops primarily Macs. No policies, less time to
market is always better for them. Agile workforce and everybody does everything.
They are based in Auckland, have a growing customer base in NZ and in Australia and are
thinking of talking to customers in the US and Europe in the near future by hiring a sales
and marketing person.
The 3 founders say that since we are a technology company so we don’t need IT support,
we get what we need for IT and we get it fast. Website is hosted by the start-up itself.
Activity 2:
The four groups selected the following prioritised controls. Consistent choices
across the groups were an emphasis on:
• Implementing DNS and email security through Quad9 and DMARC (4 groups)
• Multi-Factor Authentication and VPN security for network mobility (3 groups)
• Endpoint Protection (2 groups)
Green Team - Case Study 1 Blue Team - Case Study 1 Gold Team - Case Study 1 Red Team - Case Study 1
MFA + Cloud Secure App Development MFA MFA/ VPN
Free Security Add-on Data Security VPN Backups
Quad9 Training Endpoint Protection DMARC
DMARC Free Tools Quad9 Encryption
Insurance Risk Assessment DMARC Endpoint Protection
Firewall/Compliance Blade
Activity 3: Identify your preferred cyber security investments
for the following real world small business scenario
15 person SME, no budget allocated for security but could be up to $10K if made
aware and pushed hard – threats are BEC, ransomware, etc.
This well known company is based in Auckland and have a list of almost static
customers throughout NZ.
Using most of the IT services from the in-house servers. Customised ERP software
(9 years old) with a few updates, running SQL Server 2008.
They have been hit by ransomware twice and some teething IT issues but had
cyber-insurance so the CEO is not very concerned. No fulltime IT staff. Most of the
employees have laptops/desktops with some form of anti-virus software and fibre
as means to connect and phones with email.
Not many of the staff like to put passwords on their phones and they tend to use
easy passwords on their laptops as well. Very cost-conscious and not IT savvy.
Activity 3:
The four groups selected the following prioritised controls. Consistent choices
across the groups were an emphasis on:
• Implementing DNS and email security through Quad9 and DMARC (4 groups)
• Endpoint Protection (4 groups)
• Security Awareness Training (3 groups)
Green Team - Case Study 2 Blue Team - Case Study 2 Gold Team - Case Study 2 Red Team - Case Study 2
Quad9 & DMARC Web & Email Security Boundary Defence Awareness
Endpoint Protection Endpoint Protection DMARC Ring fence legacy systems
Backups Boundary Security Access Control - least privilege Move to cloud if can't ring
fence
MFA/Office365 Training Endpoint Protection DMARC & Quad9
Free Security Awareness Training Vuln + Risk Management Disable Unused services Endpoint protection
More Insurance (high premium) Data Protection
Conclusion
Common cyber security threats: ransomware, intellectual property theft (internal and external),
Business Email Compromise, phishing and malware infections.
The following inputs from the participants ran consistently through this session:
• Identify valuable data, back it up and test your ability to recover and restore.
• Defend against common attack vectors by implementing DNS and email security through the
free Quad9 and DMARC tools.
• Phishing and credential harvesting are the most common cyber security incidents recorded in
New Zealand. To defend against these threats, use Multi-Factor Authentication where you
can, secure passwords in a vault and apply least privilege to prevent escalation and traversal
through your business.
• Invest in modern endpoint protection software that provides anti-malware capabilities,
phishing prevention and firewall capabilities.
• Develop a security culture by boosting your ‘human firewall’ by offering security awareness
training tailored to staff.
Conclusion
We suggest a customised scalable solution for tackling common cyber security threats like
ransomware, intellectual property theft (internal and external), Business Email Compromise,
phishing and malware infections:
• Backup offsite daily (preferably in cloud) – use inexpensive solutions like Microsoft OneDrive
or Google Drive. For iPhones and Macs, use iCloud. Be ready.
• Implementing DNS and email security through the free Quad9 and DMARC tools. Be
defensive.
• Use Multi-Factor Authentication where you can, secure passwords in inexpensive (but
secure) mobile password vaults like LastPass or Dashlane. Be safe.
• Invest in modern endpoint protection software that provides anti-malware, phishing
prevention, DLP and firewall capabilities. Be cautious.
• Use free training/planning tools from ConnectSmart, Cybrary or Federal Communication
Commission. Be aware.
If New Zealand business owners are seeking pragmatic and cost effective guidance focused on
protecting their digital assets, they could review the outcomes of this ISC2 Auckland Chapter
session for practical guidance.

More Related Content

What's hot

Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015ITSM Academy, Inc.
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceCollege Development Network
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWithum
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board informationAprio
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityShiva Bissessar
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 

What's hot (20)

Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board information
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
CERT Certification
CERT CertificationCERT Certification
CERT Certification
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 

Similar to Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'

Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsJumpCloud
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.pptssusera76ea9
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy clubGet up to Speed
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuNixu Corporation
 

Similar to Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank' (20)

Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
bishu pdf1
bishu pdf1bishu pdf1
bishu pdf1
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Keeping your business safe online cosy club
Keeping your business safe online cosy clubKeeping your business safe online cosy club
Keeping your business safe online cosy club
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web
 

Recently uploaded

EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSESEXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSESMotiveflikr Media
 
Supply Chain Location Decision and Management
Supply Chain Location Decision and ManagementSupply Chain Location Decision and Management
Supply Chain Location Decision and Managementirahtarando
 
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCCARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCFikrie Omar
 
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIESPEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIESpearlint172
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxDiversity In Toys
 
How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i templateFerruccio Martinelli
 
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024Fikrie Omar
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfSmartinfologiks
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...ZurliaSoop
 
Amethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdfAmethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdfHimalya Quartz
 
Expanding Horizons: Hiring Remote Employees across State Lines
Expanding Horizons: Hiring Remote Employees across State LinesExpanding Horizons: Hiring Remote Employees across State Lines
Expanding Horizons: Hiring Remote Employees across State Linesaryashreyasi27
 
Embracing the Virtual Workforce: Remote Companies Hiring Now
Embracing the Virtual Workforce: Remote Companies Hiring NowEmbracing the Virtual Workforce: Remote Companies Hiring Now
Embracing the Virtual Workforce: Remote Companies Hiring Nowaryashreyasi27
 

Recently uploaded (12)

EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSESEXPERIENCE  THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
EXPERIENCE THE FUTURE OF WORK FOR FUTURE OF BUSINESSES
 
Supply Chain Location Decision and Management
Supply Chain Location Decision and ManagementSupply Chain Location Decision and Management
Supply Chain Location Decision and Management
 
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDCCARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
CARA BINA PENDAPATAN PASIF HARIAN RM9000 BERMODALKAN RM30 DI TDC
 
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIESPEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
PEARL KITCHEN SINKS(R.A ENGINEERING INDUSTRIES
 
How Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptxHow Multicultural Toys Helps in Child Development.pptx
How Multicultural Toys Helps in Child Development.pptx
 
How to structure your pitch - B4i template
How to structure your pitch - B4i templateHow to structure your pitch - B4i template
How to structure your pitch - B4i template
 
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
MARKETING PLAN RESMI TDC IMUNO INDONESIA 2024
 
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdfEnabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
Enabling Business Users to Interpret Data Through Self-Service Analytics (2).pdf
 
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
Jual Obat Aborsi Bojonegoro ( Asli No.1 ) 085657271886 Obat Penggugur Kandung...
 
Amethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdfAmethyst Benifits and Healing Properties.pdf
Amethyst Benifits and Healing Properties.pdf
 
Expanding Horizons: Hiring Remote Employees across State Lines
Expanding Horizons: Hiring Remote Employees across State LinesExpanding Horizons: Hiring Remote Employees across State Lines
Expanding Horizons: Hiring Remote Employees across State Lines
 
Embracing the Virtual Workforce: Remote Companies Hiring Now
Embracing the Virtual Workforce: Remote Companies Hiring NowEmbracing the Virtual Workforce: Remote Companies Hiring Now
Embracing the Virtual Workforce: Remote Companies Hiring Now
 

Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'

  • 1. Building the ‘Bob Semple Cyber Tank’ – NZ SME Security Group outputs from Wednesday 24th October 2018
  • 2. “instead of sitting down and moaning we felt we ought to do something to manufacture weapons that would help to defend our country and our people… That tank was an honest-to-God effort to do something with the material at our disposal when raider were at our back door” Bob Semple, Minister of Public Works, WWII
  • 3. Summary New Zealand is a country of small businesses. 97% of enterprises – almost half a million according to MBIE data - have fewer than 20 employees but contribute more than a quarter of the country’s GDP. Almost a quarter of New Zealand small businesses have been hit by cyber crime according to Symantec’s latest SMB Cyber Security Survey with the average financial loss sitting at $16,000. Many of these small businesses will be operating on the proverbial “smell of an oily rag” with cyber security far down the list of priorities for owners focused on keeping the lights on and the cash flowing. It’s in this environment that many small businesses will find themselves operating below the ‘security poverty line’, the point below which a company cannot effectively protect itself from cyber security threats. Many small companies believe that IT security is too expensive and that they lack the knowledge on how to combat common cyber threats. At the October (ISC)2 Auckland Chapter event, 25 individuals took part in group exercises designed to identify pragmatic security investments that offer the ‘most bang for the buck’.
  • 4. Activity 1: Identify your preferred cyber security investments for a typical NZ SME Attendees split into four groups (Green, Blue, Gold and Red) and were presented with example cyber security guidance targeted at small businesses including: • CERT-NZ’s Ten Critical Controls 2018 https://www.cert.govt.nz/assets/Uploads/documents/CERT-NZ-Critical-Controls-2018.pdf • CIS Controls Implementation Guide for Small-and Medium-Sized Enterprises (SMEs) https://www.cisecurity.org/wp-content/uploads/2017/09/CIS-Controls-Guide-for-SMEs.pdf • The ASD/ACSC Essential Eight https://acsc.gov.au/publications/protect/Essential_Eight_Explained.pdf • NCSC-UK’s Small Business Guide https://www.ncsc.gov.uk/smallbusiness • Global Cyber Alliance Solutions (DMARC, Quad9, McScrapy) https://www.globalcyberalliance.org/what-we-do/ Other material also made available included the Cyber Essentials Scheme Questionnaire and NIST’s Small Business Information Security: The Fundamentals
  • 5. Activity 1: The four groups selected the following prioritised controls. Consistent choices across all four groups were an emphasis on: • Backing up data and testing recovery • Implementing DNS and email security through Quad9 and DMARC • Multi-Factor Authentication • Focusing on credential management and enforcing least privilege • Three groups identified Security Awareness Training and Endpoint/Malware Protection Green Team Blue Team Gold Team Red Team MFA Web + Email Security (Quad9) Data Protection (CIS 13) DMARC + Quad9 Backup & Testing Backups Password Management & MFA Data Recovery Capability (CIS 10) Password Management Patching Patching Continuous Vulnerability Mgmt (CIS 4) Backup Data/Test Data Malware Protection Backups Enforce Least Privilege Malware Protection Upgrade Legacy Systems Application Software Security Security Awareness Training (CIS 17) Awareness Training Quad9 Endpoint Protection (AV, FW, etc.) Default Credentials Keeping your smartphone safe DMARC Least Privilege MFA Change default credentials Cyber Insurance Boundary Defence MFA Training & Awareness Endpoint Protection DMARC
  • 6. Activity 2: Identify your preferred cyber security investments for the following real world small business scenario ‘Greenfields’ 5 person tech start-up - $5K budget for security, cloud focus This tech start-up is using mostly IaaS, PaaS, and SaaS services from the cloud - Salesforce, Office 365, website builder software and mostly open source software (and some licensed software), using online libraries for publishing and releasing code, working on app development for health service providers. They have a remote presence in the cloud with AWS, remote management, running of servers and processes etc. All of them have laptops primarily Macs. No policies, less time to market is always better for them. Agile workforce and everybody does everything. They are based in Auckland, have a growing customer base in NZ and in Australia and are thinking of talking to customers in the US and Europe in the near future by hiring a sales and marketing person. The 3 founders say that since we are a technology company so we don’t need IT support, we get what we need for IT and we get it fast. Website is hosted by the start-up itself.
  • 7. Activity 2: The four groups selected the following prioritised controls. Consistent choices across the groups were an emphasis on: • Implementing DNS and email security through Quad9 and DMARC (4 groups) • Multi-Factor Authentication and VPN security for network mobility (3 groups) • Endpoint Protection (2 groups) Green Team - Case Study 1 Blue Team - Case Study 1 Gold Team - Case Study 1 Red Team - Case Study 1 MFA + Cloud Secure App Development MFA MFA/ VPN Free Security Add-on Data Security VPN Backups Quad9 Training Endpoint Protection DMARC DMARC Free Tools Quad9 Encryption Insurance Risk Assessment DMARC Endpoint Protection Firewall/Compliance Blade
  • 8. Activity 3: Identify your preferred cyber security investments for the following real world small business scenario 15 person SME, no budget allocated for security but could be up to $10K if made aware and pushed hard – threats are BEC, ransomware, etc. This well known company is based in Auckland and have a list of almost static customers throughout NZ. Using most of the IT services from the in-house servers. Customised ERP software (9 years old) with a few updates, running SQL Server 2008. They have been hit by ransomware twice and some teething IT issues but had cyber-insurance so the CEO is not very concerned. No fulltime IT staff. Most of the employees have laptops/desktops with some form of anti-virus software and fibre as means to connect and phones with email. Not many of the staff like to put passwords on their phones and they tend to use easy passwords on their laptops as well. Very cost-conscious and not IT savvy.
  • 9. Activity 3: The four groups selected the following prioritised controls. Consistent choices across the groups were an emphasis on: • Implementing DNS and email security through Quad9 and DMARC (4 groups) • Endpoint Protection (4 groups) • Security Awareness Training (3 groups) Green Team - Case Study 2 Blue Team - Case Study 2 Gold Team - Case Study 2 Red Team - Case Study 2 Quad9 & DMARC Web & Email Security Boundary Defence Awareness Endpoint Protection Endpoint Protection DMARC Ring fence legacy systems Backups Boundary Security Access Control - least privilege Move to cloud if can't ring fence MFA/Office365 Training Endpoint Protection DMARC & Quad9 Free Security Awareness Training Vuln + Risk Management Disable Unused services Endpoint protection More Insurance (high premium) Data Protection
  • 10. Conclusion Common cyber security threats: ransomware, intellectual property theft (internal and external), Business Email Compromise, phishing and malware infections. The following inputs from the participants ran consistently through this session: • Identify valuable data, back it up and test your ability to recover and restore. • Defend against common attack vectors by implementing DNS and email security through the free Quad9 and DMARC tools. • Phishing and credential harvesting are the most common cyber security incidents recorded in New Zealand. To defend against these threats, use Multi-Factor Authentication where you can, secure passwords in a vault and apply least privilege to prevent escalation and traversal through your business. • Invest in modern endpoint protection software that provides anti-malware capabilities, phishing prevention and firewall capabilities. • Develop a security culture by boosting your ‘human firewall’ by offering security awareness training tailored to staff.
  • 11. Conclusion We suggest a customised scalable solution for tackling common cyber security threats like ransomware, intellectual property theft (internal and external), Business Email Compromise, phishing and malware infections: • Backup offsite daily (preferably in cloud) – use inexpensive solutions like Microsoft OneDrive or Google Drive. For iPhones and Macs, use iCloud. Be ready. • Implementing DNS and email security through the free Quad9 and DMARC tools. Be defensive. • Use Multi-Factor Authentication where you can, secure passwords in inexpensive (but secure) mobile password vaults like LastPass or Dashlane. Be safe. • Invest in modern endpoint protection software that provides anti-malware, phishing prevention, DLP and firewall capabilities. Be cautious. • Use free training/planning tools from ConnectSmart, Cybrary or Federal Communication Commission. Be aware. If New Zealand business owners are seeking pragmatic and cost effective guidance focused on protecting their digital assets, they could review the outcomes of this ISC2 Auckland Chapter session for practical guidance.