This document provides a summary of a presentation on cybersecurity evolution and awareness. It discusses emerging technology trends like the internet of things, big data, and predictive analytics. It also covers social media risks and security services to reduce risk through a five step approach of identifying, protecting, detecting, responding to, and recovering from cyber attacks. The presentation aims to prepare organizations for future cybersecurity challenges through education and implementing best practices.
The rise of a generation of new hackers has propelled a boom in successful cyberattacks and data breaches over the last decade. This generation of "modern adversaries" has caused billions of dollars in damages in the last few years, and both the pace and danger of their attacks continue to grow.
This presentation analyzes modern hacker adversaries: who are they, how are they circumventing traditional security systems, and what can the information security industry do to detect and stop these new threats.
Why is cyber security a disruption in the digital economyMark Albala
As we enter the digital economy, companies will quickly realize that the differentiator in the digital economy is information and information being a valuable resource is subject to theft, hacking, phishing and a host of other issues which compromise a company’s ability to participate in the digital economy. Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the digital economy. It is up to every company to ensure that the information shared with them is protected to the best of their ability and proactively notify persons and organizations who entrust their information necessary to transact business (any personal identity information including but not limited to addresses, credit card information, social security numbers, account information, credit information, medical records, etc.) with any potential compromises which can yield harm to them by that information either being used maliciously or shared with others.
The digital economy is different than other versions of commerce because in the digital economy, information is the lifeblood of digital commerce that passes through the hands of many platforms involved in a digital event. Each of these platforms are an opportunity to wreak havoc on your well-intended but incomplete intents to protect the information contained within the network you control. In the digital economy, it is not only the network you control, but the platforms that touch the personal data entrusted to you as a means of enabling digital commerce, and several techniques have begun to emerge to protect personal information contained within your information domain and the domain of platforms participating in digital commerce.
Because the life blood of the digital economy is information, information hacked in the digital economy is akin to shrinkage in the legacy economy. Both are means to directly attack your bottom line, whether it is redirecting customers elsewhere because they don’t trust your privacy program, ransomware which makes your site or one of your partner platform sites dangerous to use or some other reason which challenges your ability to participate in the digital economy. Shrinking the potential market share because of information safety and security challenges is a disruption, making cyber-security a disruptive activity, particularly if it is not dealt with swiftly.
If your cyber-security program is focused entirely on protecting the information housed in your four walls, you have exposed yourself to problems you will have difficulty in identifying both the source and the entry point of these issues.
The rise of a generation of new hackers has propelled a boom in successful cyberattacks and data breaches over the last decade. This generation of "modern adversaries" has caused billions of dollars in damages in the last few years, and both the pace and danger of their attacks continue to grow.
This presentation analyzes modern hacker adversaries: who are they, how are they circumventing traditional security systems, and what can the information security industry do to detect and stop these new threats.
Why is cyber security a disruption in the digital economyMark Albala
As we enter the digital economy, companies will quickly realize that the differentiator in the digital economy is information and information being a valuable resource is subject to theft, hacking, phishing and a host of other issues which compromise a company’s ability to participate in the digital economy. Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the digital economy. It is up to every company to ensure that the information shared with them is protected to the best of their ability and proactively notify persons and organizations who entrust their information necessary to transact business (any personal identity information including but not limited to addresses, credit card information, social security numbers, account information, credit information, medical records, etc.) with any potential compromises which can yield harm to them by that information either being used maliciously or shared with others.
The digital economy is different than other versions of commerce because in the digital economy, information is the lifeblood of digital commerce that passes through the hands of many platforms involved in a digital event. Each of these platforms are an opportunity to wreak havoc on your well-intended but incomplete intents to protect the information contained within the network you control. In the digital economy, it is not only the network you control, but the platforms that touch the personal data entrusted to you as a means of enabling digital commerce, and several techniques have begun to emerge to protect personal information contained within your information domain and the domain of platforms participating in digital commerce.
Because the life blood of the digital economy is information, information hacked in the digital economy is akin to shrinkage in the legacy economy. Both are means to directly attack your bottom line, whether it is redirecting customers elsewhere because they don’t trust your privacy program, ransomware which makes your site or one of your partner platform sites dangerous to use or some other reason which challenges your ability to participate in the digital economy. Shrinking the potential market share because of information safety and security challenges is a disruption, making cyber-security a disruptive activity, particularly if it is not dealt with swiftly.
If your cyber-security program is focused entirely on protecting the information housed in your four walls, you have exposed yourself to problems you will have difficulty in identifying both the source and the entry point of these issues.
Digital businesses are difficult to launch and run even without the challenge of security. And yet, digital business strategies are also being used by hackers to systematically go after lucrative targets. Following up on our release of the 2015 NTT Group Global Threat Intelligence Report, this executive summary highlights key findings from the report that affect today’s digital businesses.
Public Relations Campaign for SecureWorks for IMC 618: PR Concepts & Strategy. Campaign is focused on increasing brand awareness among both big and small businesses as well as potential investors.
Preparing today for tomorrow’s threats.
When companies hear the word “security,” what concepts come to mind
— safety, protection or perhaps comfort? To the average IT administrator,
security conjures up images of locked-down networks and virus-free devices.
An attacker, state-sponsored agent or hactivist, meanwhile, may view security
as a way to demonstrate expertise by infiltrating and bringing down corporate
or government networks for profit, military goals, political gain — or even fun.
We live in a world in which cybercrime is on the rise. A quick scan of the
timeline of major incidents (See Figure 1, Page 9) shows the increasing
frequency and severity of security breaches — a pattern that is likely
to continue for years to come. Few if any organizations are safe from
cybercriminals, to say nothing of national security. In fact, experts even
exposed authentication and encryption vulnerabilities in the U.S. Federal
Aviation Administration’s new state-of-the-art multibillion-dollar air
traffic control system
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
Loss of critical documents and data, via the back-door, is the the biggest threat to many organisations today, big and small, yet has been almost entirley neglected until now".
Barry James, the UK’s leading expert in the emerging field of mobile applications and endpoint security, will explore the emerging threat and explain the remedies available.
Two large corporations have been crippled by recent information security breaches. It may not be hard to quantify the losses in terms of lost revenue and profits but what will be hard to quantify are the losses to reputation. Cited as two of the most damaging cyber-attacks on corporate America, this presentation looks at what went wrong and what could have been done to prevent these situations.
If last year’s presentation on the SANS 20 felt like more of a rant than a practical application of elite IT knowledge, Ian Trump’s technical track presentation is going to unleash GFI MAX as a security dashboard like nothing you have seen.
The Octopi team has leveraged network scanning and event log checks, and Ian takes the GFI MAX dashboard to a whole new level. MSP’s can take his code and research and immediately apply it to their practices to secure their customers from cyber threats. Dehydrated from the summer information security conferences, Ian will give you the threat intel you need to be on the lookout for in the months ahead.
Besides all the GFI MAX goodness, being part of a live demo to find APT, and seeing Ian link Human Rights, Market Research, Ice, Law, Iggy Azalea, War Ferrets, Christian Studies, Event Auditing, Security Tools, Taylor Swift and How we can all fix the cyber problem into one epic presentation – well, you don’t want to miss this.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Who is the next target proactive approaches to data securityUlf Mattsson
The landscape of threats to sensitive data is changing. New technologies bring with them new vulnerabilities, and organizations like Target are failing to react properly to the shifts around them. What's needed is an approach equal to the persistent, advanced attacks companies face every day. The sooner we start adopting the same proactive thinking hackers are using to get at our data, the better we will be able to protect it.
Symantec's Internet Security Threat Report for the Government SectorSymantec
Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight Threat Management System, Symantec Managed Security Services, Norton consumer products, and other third-party data sources.
In addition, Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 60,000 recorded vulnerabilities (spanning more than two decades) from over 19,000 vendors representing over 54,000 products.
Spam, phishing, and malware data is captured through a variety of sources including the Symantec Probe Network, a system of more than 5 million decoy accounts, Symantec.cloud, and a number of other Symantec security technologies. Skeptic, the Symantec.cloud proprietary heuristic technology, is able to detect new and sophisticated targeted threats before they reach customers’ networks. Over 8.4 billion email messages are processed each month and more than 1.7 billion web requests filtered each day across 14 data centers. Symantec also gathers phishing information through an extensive anti-fraud community of enterprises, security vendors, and more than 50 million consumers.
Symantec Trust Services provides 100 percent availability and processes over 6 billion Online Certificate Status Protocol (OCSP) look-ups per day, which are used for obtaining the revocation status of X.509 digital certificates around the world. These resources give Symantec analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report, which gives enterprises, small businesses, and consumers essential information to secure their system effectively now and into the future.
Digital businesses are difficult to launch and run even without the challenge of security. And yet, digital business strategies are also being used by hackers to systematically go after lucrative targets. Following up on our release of the 2015 NTT Group Global Threat Intelligence Report, this executive summary highlights key findings from the report that affect today’s digital businesses.
Public Relations Campaign for SecureWorks for IMC 618: PR Concepts & Strategy. Campaign is focused on increasing brand awareness among both big and small businesses as well as potential investors.
Preparing today for tomorrow’s threats.
When companies hear the word “security,” what concepts come to mind
— safety, protection or perhaps comfort? To the average IT administrator,
security conjures up images of locked-down networks and virus-free devices.
An attacker, state-sponsored agent or hactivist, meanwhile, may view security
as a way to demonstrate expertise by infiltrating and bringing down corporate
or government networks for profit, military goals, political gain — or even fun.
We live in a world in which cybercrime is on the rise. A quick scan of the
timeline of major incidents (See Figure 1, Page 9) shows the increasing
frequency and severity of security breaches — a pattern that is likely
to continue for years to come. Few if any organizations are safe from
cybercriminals, to say nothing of national security. In fact, experts even
exposed authentication and encryption vulnerabilities in the U.S. Federal
Aviation Administration’s new state-of-the-art multibillion-dollar air
traffic control system
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
Loss of critical documents and data, via the back-door, is the the biggest threat to many organisations today, big and small, yet has been almost entirley neglected until now".
Barry James, the UK’s leading expert in the emerging field of mobile applications and endpoint security, will explore the emerging threat and explain the remedies available.
Two large corporations have been crippled by recent information security breaches. It may not be hard to quantify the losses in terms of lost revenue and profits but what will be hard to quantify are the losses to reputation. Cited as two of the most damaging cyber-attacks on corporate America, this presentation looks at what went wrong and what could have been done to prevent these situations.
If last year’s presentation on the SANS 20 felt like more of a rant than a practical application of elite IT knowledge, Ian Trump’s technical track presentation is going to unleash GFI MAX as a security dashboard like nothing you have seen.
The Octopi team has leveraged network scanning and event log checks, and Ian takes the GFI MAX dashboard to a whole new level. MSP’s can take his code and research and immediately apply it to their practices to secure their customers from cyber threats. Dehydrated from the summer information security conferences, Ian will give you the threat intel you need to be on the lookout for in the months ahead.
Besides all the GFI MAX goodness, being part of a live demo to find APT, and seeing Ian link Human Rights, Market Research, Ice, Law, Iggy Azalea, War Ferrets, Christian Studies, Event Auditing, Security Tools, Taylor Swift and How we can all fix the cyber problem into one epic presentation – well, you don’t want to miss this.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Who is the next target proactive approaches to data securityUlf Mattsson
The landscape of threats to sensitive data is changing. New technologies bring with them new vulnerabilities, and organizations like Target are failing to react properly to the shifts around them. What's needed is an approach equal to the persistent, advanced attacks companies face every day. The sooner we start adopting the same proactive thinking hackers are using to get at our data, the better we will be able to protect it.
Symantec's Internet Security Threat Report for the Government SectorSymantec
Symantec has established the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight Threat Management System, Symantec Managed Security Services, Norton consumer products, and other third-party data sources.
In addition, Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 60,000 recorded vulnerabilities (spanning more than two decades) from over 19,000 vendors representing over 54,000 products.
Spam, phishing, and malware data is captured through a variety of sources including the Symantec Probe Network, a system of more than 5 million decoy accounts, Symantec.cloud, and a number of other Symantec security technologies. Skeptic, the Symantec.cloud proprietary heuristic technology, is able to detect new and sophisticated targeted threats before they reach customers’ networks. Over 8.4 billion email messages are processed each month and more than 1.7 billion web requests filtered each day across 14 data centers. Symantec also gathers phishing information through an extensive anti-fraud community of enterprises, security vendors, and more than 50 million consumers.
Symantec Trust Services provides 100 percent availability and processes over 6 billion Online Certificate Status Protocol (OCSP) look-ups per day, which are used for obtaining the revocation status of X.509 digital certificates around the world. These resources give Symantec analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report, which gives enterprises, small businesses, and consumers essential information to secure their system effectively now and into the future.
Attacks evenly split across network and application layers
Web-based attacks remain the single most common attack vector
1 in every 4 are HTTPS
Increase reflective attacks cause UDP attacks to increase
From 7% in 2013 to 16% in 2014
Reflective attacks represent 2014’s single largest DDoS “headache”
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
Cyberattacks on government agencies at all levels can compromise private citizen information and leave the United States vulnerable to national security threats. Take these first steps toward stronger cybersecurity hygiene.
Insider's Guide to Cybersecurity for Government eBook: http://aka.ms/govcybersecurityguide
Cyber security is an essential part of our digital lives today. But do you know what cyber security actually constitutes and how secure you really are? In this presentation, we help you understand:
a. The impact of cyber security on our digital lives
b. How cyber security is essential for our families
c. Cyber security in the business context
d. What Quick Heal can do to help
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
Presentacion realizada en Argentina y Paraguay Durante Marzo 2014.
En Argentina por Faustino Sanchez. En Paraguay por Santiago Cavanna.
Trata sobre el problema de la presencia de vulnerabilidades en aplicaciones, el impacto que tiene en las organizaciones y la forma que se encuentra disponible para descubrirlas en forma temprana y facilitar su remediacion
Links disponibles en
http://www.santiagocavanna.com/segurinfo-2014-el-costo-oculto-de-las-aplicaciones-vulnerables/
Presentation by Larry Clinton, President of the Internet Security Alliance (ISA) to the 66th Annual Fowler Seminar on Oct 12 2012 titled Evolution of the Cyber Threat - A Unified Systems Approach.
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
Throughout history we've seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor. Imagine a football game – with no time limits – determined by your opponent’s first undefended scoring play. Game over. Hmmm…I wonder how that one ends?
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn't rely on humans and is 99%+ accurate regardless of Internet connectivity. We'll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don't have to.
This presentation discusses the massive increases in cyber threats and the best ways to keep your data safe. Through this presentation, you will learn the best practices for implementing and testing a data security program.
Digital Transformation and Data ProtectionSerter Ozturk
This expedited timeline has created vehicles with advanced capabilities but few protections!
Governments are very sensitive about car safety and cyber security issues. For 2017, connectivity is already prioritized on lawmakers’ agendas. It is obvious that the automotive industry’s growth trajectory does not leave much time for reflection.
Data privacy and cybersecurity will become a strong selling point for car buyers. The key will be providing a smooth communication in an easy to understand way despite such protective features.
This expedited period has created vehicles with advanced capabilities but few protections. Estimations transpires that 104 million cars will have some form of connectivity by 2025.
The considered issue is taking the first priority in agendas of all the leading manufacturers, associations and of the Governments' as well !
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
Most of us learned cybersecurity practices based on the application of controls that were part of a framework. Once the framework was implemented then the controls didn’t change often. It’s time to adjust our thinking and recognize that on-going adjustment of controls may be a better indicator of cyber-maturity than adherence to any framework.
(Source: RSA USA 2016-San Francisco)
We Are Instructor Led Online Training Hub.Get access to the world’s best learning experience at our online learning community where millions of learners learn cutting-edge skills to advance their careers, improve their lives, and pursue the work they love. We provide a diverse range of courses, tutorials, resume formats, projects based on real business challenges, and job support to help individuals get started with their professional career.
How to keep your IT environment secure using IAM while deploying BYOD and mobile
presentation delivered at the BYOD and Mobility Forum, London on 26 March 2014
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
Slides from the 2014 GRC Conference Presented by:
Jeff Spivey, CRISC, CPP
Vice President of Strategy, RiskIQ, Inc.
President, Security Risk Management, Inc
Adair Barton, CPA, CISA
Vice President of Internal Audit
Dycom Industries, Inc.
and
David A. Less, CISA, CISM
CIO & SVP
Sunteck, Inc.
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
There are many (small) risks and threats which are frequently overlooked in an organization. The presentation takes a look at where Risks & Threats (RaT) come from and at the "Biggies" in the RaT Lists. We look at a few Frequently Overlooked Threats and Risks (FORT) and Course Correction Options and finally a few Case Studies to highlight FORTs
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. According to industry estimates, machine-to-machine communications
alone will generate approximately US$900 billion in revenues by 2020.
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
https://www.brighttalk.com/webcast/14723/234829?utm_source=Compliance+Engineering&utm_medium=brighttalk&utm_campaign=234829 :
With cyber attacks on the rise, securing your data is more imperative than ever. In future, organizations will face severe penalties if their data isn’t robustly secured. This will have a far reaching impact for how businesses deal with security in terms of managing their cyber risk.
Join this presentation to learn the cyber security controls prescribed by regulation, how this impacts compliance, and how cyber risk management helps CISOs understand the degree these controls are in place and where to prioritize their cyber dollars and ensure they are not at risk for fines.
Viewers will learn:
- The latest cybercrime trends and targets
- Trends in board involvement in cybersecurity
- How to effectively manage the full range of enterprise risks
- How to protect against ransomware
- Visibility into third party risk
- Data security metrics
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
With 2015 cybersecurity themes and realities nearly in the rearview mirror, “Cybersecurity – Securing your 2016 Audit Plan” will shift our outlook to looking forward into what cybersecurity predictions are being made for 2016, and what key topics and themes will drive 2016 audit planning in the cybersecurity area.
Cyber Security.
Watch my videos on snack here: --> --> http://sck.io/x-B1f0Iy
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
Using Threat Intelligence to Address Your Growing Digital RiskSurfWatch Labs
Cyber threat intelligence can be used to help organizations to better manage their growing digital risk footprints and drive more effective risk decisions.
3. • Technology Trends
• Still Talking about Social Media…………. Why?
• Risk & Awareness
• Security Services – 5 steps to Reduce Risk
TOPICS
Intro - Topics
4. WHERE ARE WE HEADED
• It is estimated that 90 % of the worlds data has been created in the last two
years (starting point January 2013)
• IOT (Internet of Things) – (Medical / Lab Refrigerator) new end point to
protect
• Big Data – Predictive Analysis – mining data based on key algorithm factors
(step a + step b + step c = potential customer)
• Scalable predictive computing – from 7:42AM till 6:03PM spin up x amount of
servers
Source: http://e27.co/worlds-data-volume-to-grow-40-per-year-50-times-by-2020-aureus-20150115-2/
Technology Trends
5. SO WHAT?!?!
• Snapshot for Driving??
• Snapshot for Healthcare Insurance? IOT –
wearables- habits – Dr. can check your progress
By 2017, more than 20% of customer-facing analytic deployments will provide
product tracking information leveraging the IoT.
Fueled by the Nexus of Forces (mobile, social, cloud and information), customers
now demand a lot more information from their vendors. The rapid dissemination of
the IoT will create a new style of customer-facing analytics — product tracking —
where increasingly less expensive sensors will be embedded into all types of
products.
These sensors not only provide geospatial information (where the product is right
now) but also performance information (how well the product is functioning). My
new SUV is en route and currently in Arizona, or my new SUV is ready for its first oil
change. This creates an opportunity to improve transparency and strengthen
customer and partner relationships. It can become a key differentiator and a key
part of your business model.
Access the Global Pool of Information
The ability to transform the business to compete in an emerging digital economy
will be contingent on the organization’s ability to curate, manage and leverage
big data, IoT content, social media, local and federal government data, data
from partners, suppliers and customers, and other exogenous data sources that
are materializing.Source: http://www.forbes.com/sites/gartnergroup/2015/02/12/gartner-predicts-three-big-data-trends-for-business-
intelligence/2/
Technology Trends
7. IOT REAL WORLD
EXAMPLE
• Used 0 Day Threat to exploit Car
Software
• Cut engine power using diagnostic
software
• View current GPS Data as well as
old Data Points
• Smart Home Take Over – new opportunity
• Smart Insulin Pumps / Pacemakers –
new opportunity
• Source: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
• Source: http://www.wired.com/2015/11/medical-devices-that-are-vulnerable-
to-life-threatening-hacks/#slide-1
I WAS DRIVING 70 mph on the edge of downtown St. Louis when the exploit began to
take hold.
Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started
blasting cold air at the maximum setting, chilling the sweat on my back through the in-
seat climate control system. Next the radio switched to the local hip hop station and
began blaring Skee-lo at full volume. I spun the control knob left and hit the power
button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the
glass.
The result of their work was a hacking technique—what the security industry
calls a zero-day exploit—that can target Jeep Cherokees and give the attacker
wireless control, via the Internet, to any of thousands of vehicles. Their code is an
automaker’s nightmare: software that lets hackers send commands through the Jeep’s
entertainment system to its dashboard functions, steering, brakes, and transmission, all
from a laptop that may be across the country.
To better simulate the experience of driving a vehicle while it’s being hijacked by an
invisible, virtual force, Miller and Valasek refused to tell me ahead of time what kinds of
attacks they planned to launch from Miller’s laptop in his house 10 miles west. Instead,
they merely assured me that they wouldn’t do anything life-threatening. Then they told
me to drive the Jeep onto the highway. “Remember, Andy,” Miller had said through my
iPhone’s speaker just before I pulled onto the Interstate 64 on-ramp, “no matter what
happens, don’t panic.”1
Technology Trends
9. TOP 5 BUSINESS IMPACTS OF
SOCIAL MEDIA
• 1) Reaching Different Generational Demographics Early and Often
• 2) Market and Upsell Services and Products
• 3) Community Outreach and Recognition
• 4)Drive Organic Growth
• 5) Customer Service Outlet and Business Branding Opportunity (pros & cons)
Still…..Talking Social Media
10. STILL TALKING
SECURITY RIGHT?
• Ad Injection Economy
• Securing your Unique Identifiers
• Daisy chaining accounts
• Targeting your Ads – Hackers
• Dual Factor Authentication
Source: https://googleonlinesecurity.blogspot.com/2015/05/new-research-ad-injection-economy.html http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/
Setup ad to appear when google search =
“virus removal” “anti-virus software” and or “IT
help”
Crypto-Wall
Still…..Talking Social Media
11. REAL WORLD EXAMPLE
• How Apple and Amazon Security Flaws Led
to My Epic Hack
• By Mat Honan – Wired.com
• But what happened to me exposes vital security flaws in several customer
service systems, most notably Apple’s and Amazon’s. Apple tech support gave
the hackers access to my iCloud account. Amazon tech support gave them the
ability to see a piece of information — a partial credit card number — that Apple
used to release information. In short, the very four digits that Amazon considers
unimportant enough to display in the clear on the web are precisely the same
ones that Apple considers secure enough to perform identity verification. The
disconnect exposes flaws in data management policies endemic to the entire
technology industry, and points to a looming nightmare as we enter the era of
cloud computing and connected devices.
• In many ways, this was all my fault. My accounts were daisy-chained
together. Getting into Amazon let my hackers get into my Apple ID
account, which helped them get into Gmail, which gave them access to
Twitter. Had I used two-factor authentication for my Google account, it’s
possible that none of this would have happened, because their ultimate
goal was always to take over my Twitter account and wreak havoc.
Still…..Talking Social Media
12. RISK & AWARENESS
• What is Cybersecurity?
• What are ISAC Groups ? Information Sharing and Analysis Center
• The two targeted industries with the highest risk?
1) ______________ 2)________________
Risk & Awareness – Education & Risk Awareness Resources
13. CYBERSECURITY
• Cybersecurity is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from attack,
damage or unauthorized access. In a computing context, the term security
implies cybersecurity.
• According to a December 2010 analysis of U.S. spending plans, the federal
government has allotted over $13 billion annually to cybersecurity over the
next five years.
Source: http://whatis.techtarget.com/definition/cybersecurity Risk & Awareness – Education & Risk Awareness Resources
14. ISAC GROUPS
Real estate – Higher Education – State Sharing – water – electricity – oil & natural gas –
Retail - more….
Risk & Awareness – Education & Risk Awareness Resources
15. FS-ISAC & FFIEC
• Federal Financial Institutions
Examination Council (FFIEC)
• FFIEC Self assessment tool
released to educate financial
institutions of cybersecurity risks
• Voluntary Mandatory
Cooperation
• Financial Services
Information Sharing and Analysis
Center (FS-ISAC) Awareness
• Information shared based on
critical security threats and
industry best practices
Source: http://www.fsisac.com/about https://www.ffiec.gov/about.htm
Risk
Awareness
Risk & Awareness – Education & Risk Awareness Resources
16. PREPARING TODAY FOR TOMORROWS ATTACK?
• What solutions are there to help mitigate risk?
• How do I know if my organization is prepared?
• Identify – Protect – Detect – Respond – Recover
Security Services – 5 steps to reduce Risk
• Source: Excerpt from CSBS Cyber Security 101 “A resource guide for Bank Executives”
17. 1) IDENTIFY
• Study industry best practices
• Join ISAC Group or related peer sharing group related to cybersecurity
• Someone from inside the organization should fill out assessment tools if available
and reach out to appropriate 3rd party for answers they are unsure of.
• Findings should be shared with IT committee / Board of directors
• Examine what is critical data and where it resides and understand security
around data
• Request vendor packets from all 3rd party vendors hosting or with access to
critical data
• Make sure their security meets or exceeds the standard you are required to
implement
Security Services – 5 steps to reduce Risk
18. • Source: Excerpt from FFIEC Self Assessment Tool
Security Services – 5 steps to reduce Risk
20. 1) I have educated myself and staff to the best of our ability and identified our critical data
and possible threats against it. What’s Next?
Security Services – 5 steps to reduce Risk
21. 2) PROTECT
• Layered Security / Network Hygiene
• Layer 1 – Perimeter Security – Firewall, DLP, IDS/IPS, DMZ, Content Filtering…….
• Layer 2 – End Point Security – Anti-Virus, Patch Management, Log Review Monitoring
• Layer 3 – Policy Security – Permissions, GPO, Vulnerability Assessments,
• Internal understanding of risk / regulations and impact to business and customers
Source: Excerpt from FFIEC Self Assessment Tool
Security Services – 5 steps to reduce Risk
22. WHAT WOULD THAT LOOK LIKE?
Source: http://www.antiexecutable.com.au/LayeredSecurityDiagram.jpg http://www.northropgrumman.com/AboutUs/Contracts/ManagedServices/PublishingImages/Security_Services_lg.jpg
Security Services – 5 steps to reduce Risk
23. 1) I have educated myself and staff to the best of our ability and identified our
critical data and possible threats against it.
2) I have implemented security solutions to protect our organization and we
have a conceptual understanding of how they work. What’s Next?
Security Services – 5 steps to reduce Risk
24. 3) DETECT
• Layered Security / Monitored Solutions
• Review of Security Logs
• 24X7 Firewall Monitoring
• Log retention and reporting
• Anomaly and pattern investigation
• Automatization of reoccurring events
• Real-time updates for security solutions
• Understand 3rd party SLA’s and Response Times
• Manage – Monitor – Maintain
Source: http://ipfrontline.com/2015/09/dhs-st-announces-licensing-of-cyber-security-network-anomaly-detection-technology/
Security Services – 5 steps to reduce Risk
25. 1) I have educated myself and staff to the best of our ability and identified our
critical data and possible threats against it.
2) I have implemented security solutions to protect our organization and we
have a conceptual understanding of how they work.
3) Solutions in place have been configured to detect system intrusions, data
breaches and unauthorized access and notify the appropriate resources.
What's next?
Security Services – 5 steps to reduce Risk
26. 4) RESPOND
• Incident Response Plan
• No two organizations incident response plans
will be the same
• They should have clear steps outlining each step
and who is in charge of each step
• Sample Steps
• Employee Notices Network is slow and notifies IT
Personnel
• IT Personnel
• A) Examines source of issue – Log Review –
Detection – Analysis
• B) Notifies appropriate resource
• C) Involved Parties delegate responsibilities for
containment, eradication, and recovery
• D) Post Incident report with plan to improve
security if possible
Security Services – 5 steps to reduce Risk
27. 1) I have educated myself and staff to the best of our ability and identified our critical data
and possible threats against it.
2) I have implemented security solutions to protect our organization and we have a
conceptual understanding of how they work.
3) Solutions in place have been configured to detect system intrusions, data breaches and
unauthorized access and notify the appropriate resources. What's Next?
4) I have setup a response plan that outlines how we will respond if there is a cybersecurity
incident. Bring it on! What’s next?
Security Services – 5 steps to reduce Risk
28. 5) RECOVER
• Incident Response Plan / Change Controls
• Prepare post-incident response report and activities
• Outline in report how security solutions and or detection process will be
improved
• Improve response plan based upon success and failures of plan
Security Services – 5 steps to reduce Risk
29. 1) I have educated myself and staff to the best of our ability and identified our critical data
and possible threats against it.
2) I have implemented security solutions to protect our organization and we have a
conceptual understanding of how they work.
3) Solutions in place have been configured to detect system intrusions, data breaches and
unauthorized access and notify the appropriate resources. What's Next?
4) I have setup a response plan that outlines how we will respond if there is a cybersecurity
incident. Bring it on!
5) I know how we will recover from an incident and the process involved afterwards
Security Services – 5 steps to reduce Risk
30. IMPROVE / NETWORK HYGIENE
• High risk scenarios are discussed and
even practiced. Steps 1-5 are tested.
• Test breach / spearfish attack / social
engineering attacks / data loss
prevention test
• Simple learning exercise – breach
happened, activate incident response
plan, when we were attacked, how do
we know we were attacked, what data
was targeted, how to stop breach,
what did we learn
• If you fall into the Baseline level try to
make jump to evolving or intermediate
Security Services – 5 steps to reduce Risk