SlideShare a Scribd company logo
1 of 13
Social Engineering, Insider and Cyber Threat
Mike Gillespie – MD Advent IM Ltd
The UKs Leading Independent, Holistic Security Consultancy
coming up
 what we mean by Social Engineering and Insider Threat
 what this means to Cyber Threat
 buildings and technology, combined with people, offer cyber terrorists
and criminals not only more targets, but more tools
 serious cyber crime can start before anyone logs onto anything
 people are our weakest link and cross security disciplines
 our attitude to security and security awareness training needs to evolve
 joining the dots and the holistic approach
preparation is everything – even in
cyberspace
Social Engineering & Insider Threat
some images courtesy of freedigitalphotos.net
Social Engineering & Insider Threat
some images courtesy of freedigitalphotos.net
what does this mean for cyber threat
and crime?
Intelligence
gathering
Greater chance
of cyber
success
what does this mean for cyber threat
and crime?
Followed
target into
building or
pose as
contractor
Watched
building to
select
target
‘Bumped
into’ target
and engaged
in
conversation
– trust gained
‘Borrowed’
their mobile
device
Researched
target and
‘friends’ via
social
networks
…and/or
their pass
card
Gained
access to
server
The cyber attack technically starts here…
Joining the dots and the holistic approach
• Realistic holistic Threat and Risk Assessments that don’t isolate
‘cyber’
• Realistic appropriate action and policies
• C-level commitment and leadership
• Top down security culture health
• Holistic Security Awareness Training for all staff
• Regular refreshers as part of the virtuous security cycle
security evolution
Joining the dots…27001 in words…
• Continuous improvement (PDCA)
• Ensure and Assure
• Confidentiality, Integrity, Availability
• Risk based
• Proportionate
• Governance
• Compliance
the standard…
• Asset management
• HR
• Physical security
• Communications and Operations
• Access Control
• System Development
• DR, BCM and Incident Management
• Compliance
Establish
the ISMS
Maintain &
improve the
ISMS
Monitor &
review the
ISMS
Implement
& operate
the ISMS
Development,
maintenance
&
improvement
cycle
plan
act
check
do
Informationsecurity
requirementsandexpectations
ManagedInformationsecurity
ISO27001 in pictures…
And so…
 people are our weakest link and cross security disciplines
 buildings and technology, combined with people, offer cyber terrorists
and criminals not only more targets, but more tools
 serious cyber crime can start before anyone logs onto anything
 our attitude to security and security awareness training needs to evolve
thank you
Social Engineering, Insider and Cyber Threat
www.advent-im.co.uk
www.adventim.wordpress.com
@Advent_IM
www.linkedin.com/company/advent-im
0121 559 6699
0207 100 1124

More Related Content

What's hot

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterVeriato
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber securityavinashkumar1912
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )TechnoHacks_Infosystem
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityShiva Bissessar
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationPECB
 

What's hot (20)

Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Extending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office PerimeterExtending CyberSecurity Beyond The Office Perimeter
Extending CyberSecurity Beyond The Office Perimeter
 
Career guide on cyber security
Career guide on cyber securityCareer guide on cyber security
Career guide on cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cybersecurity services
Cybersecurity servicesCybersecurity services
Cybersecurity services
 
Cyber Security Companies
Cyber Security CompaniesCyber Security Companies
Cyber Security Companies
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurityImpressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
Impressions from Caribbean ICT Stakeholder Meeting, CyberSecurity
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 

Viewers also liked

Rapid Threat Modeling : case study
Rapid Threat Modeling : case studyRapid Threat Modeling : case study
Rapid Threat Modeling : case studyAntonio Fontes
 
Improve Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These IdeasImprove Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These IdeasRecorded Future
 
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...☁️Seyfallah Tagrerout☁ [MVP]
 
Countering the Cyber Threat
Countering the Cyber ThreatCountering the Cyber Threat
Countering the Cyber ThreatOllie Whitehouse
 
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?Anthony Melfi
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesRecorded Future
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
Top 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsTop 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsRecorded Future
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatIBM Government
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Antonio Fontes
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 

Viewers also liked (20)

The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 
Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Cyber Threat Detection and Interpretation
Cyber Threat Detection and InterpretationCyber Threat Detection and Interpretation
Cyber Threat Detection and Interpretation
 
Rapid Threat Modeling : case study
Rapid Threat Modeling : case studyRapid Threat Modeling : case study
Rapid Threat Modeling : case study
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Improve Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These IdeasImprove Your Threat Intelligence Strategy With These Ideas
Improve Your Threat Intelligence Strategy With These Ideas
 
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...Présentation Microsoft Advanced Threat Analytics  | Deep-Dive - MSCloud Summi...
Présentation Microsoft Advanced Threat Analytics | Deep-Dive - MSCloud Summi...
 
Countering the Cyber Threat
Countering the Cyber ThreatCountering the Cyber Threat
Countering the Cyber Threat
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor Types
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
Top 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPsTop 6 Sources for Identifying Threat Actor TTPs
Top 6 Sources for Identifying Threat Actor TTPs
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Cyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the ThreatCyber defense: Understanding and Combating the Threat
Cyber defense: Understanding and Combating the Threat
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 

Similar to Social Engineering, Insider Threats and Cyber Risks

Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...advancedtrainingaus
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.The Whole World News
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfTHECIOWORLD
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Explore Advanced Cybersecurity Training Programs
Explore Advanced Cybersecurity Training ProgramsExplore Advanced Cybersecurity Training Programs
Explore Advanced Cybersecurity Training ProgramsThinkcyberindia
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?InfoSec4TC
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitycajiwol341
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxRiyaNair19
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew RosenquistMatthew Rosenquist
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
Cybersecurity Software Development Services.
Cybersecurity Software Development Services.Cybersecurity Software Development Services.
Cybersecurity Software Development Services.Webtrills1
 
Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfAltius IT
 
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdfMost Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdfInsightsSuccess4
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontierwilliamshakes1
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxbakhtinasiriav
 

Similar to Social Engineering, Insider Threats and Cyber Risks (20)

Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdf
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Explore Advanced Cybersecurity Training Programs
Explore Advanced Cybersecurity Training ProgramsExplore Advanced Cybersecurity Training Programs
Explore Advanced Cybersecurity Training Programs
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-security
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)
 
Cybersecurity Software Development Services.
Cybersecurity Software Development Services.Cybersecurity Software Development Services.
Cybersecurity Software Development Services.
 
Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdf
 
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdfMost Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
Most Influential Thought Cybersecurity Leaders To Follow In 2024.pdf
 
CIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital FrontierCIOs and Cybersecurity Safeguarding the Digital Frontier
CIOs and Cybersecurity Safeguarding the Digital Frontier
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 

More from Advent IM Ltd

The Human Threat in Data protection
The Human Threat in Data protection The Human Threat in Data protection
The Human Threat in Data protection Advent IM Ltd
 
SMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing ThreatSMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing ThreatAdvent IM Ltd
 
Data theft visual v1.0 advent im
Data theft visual v1.0 advent imData theft visual v1.0 advent im
Data theft visual v1.0 advent imAdvent IM Ltd
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updatedAdvent IM Ltd
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Advent IM Ltd
 
Technical Skills Gap visual
Technical Skills Gap visualTechnical Skills Gap visual
Technical Skills Gap visualAdvent IM Ltd
 
Data Breach and Hacking
Data Breach and HackingData Breach and Hacking
Data Breach and HackingAdvent IM Ltd
 
The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate Advent IM Ltd
 
Waldrons march 2013 v1.0
Waldrons march 2013 v1.0Waldrons march 2013 v1.0
Waldrons march 2013 v1.0Advent IM Ltd
 

More from Advent IM Ltd (10)

The Human Threat in Data protection
The Human Threat in Data protection The Human Threat in Data protection
The Human Threat in Data protection
 
The IT Cyber Battle
The IT Cyber BattleThe IT Cyber Battle
The IT Cyber Battle
 
SMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing ThreatSMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing Threat
 
Data theft visual v1.0 advent im
Data theft visual v1.0 advent imData theft visual v1.0 advent im
Data theft visual v1.0 advent im
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updated
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
Technical Skills Gap visual
Technical Skills Gap visualTechnical Skills Gap visual
Technical Skills Gap visual
 
Data Breach and Hacking
Data Breach and HackingData Breach and Hacking
Data Breach and Hacking
 
The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate
 
Waldrons march 2013 v1.0
Waldrons march 2013 v1.0Waldrons march 2013 v1.0
Waldrons march 2013 v1.0
 

Recently uploaded

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 

Recently uploaded (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 

Social Engineering, Insider Threats and Cyber Risks

  • 1. Social Engineering, Insider and Cyber Threat Mike Gillespie – MD Advent IM Ltd The UKs Leading Independent, Holistic Security Consultancy
  • 2. coming up  what we mean by Social Engineering and Insider Threat  what this means to Cyber Threat  buildings and technology, combined with people, offer cyber terrorists and criminals not only more targets, but more tools  serious cyber crime can start before anyone logs onto anything  people are our weakest link and cross security disciplines  our attitude to security and security awareness training needs to evolve  joining the dots and the holistic approach
  • 3. preparation is everything – even in cyberspace
  • 4. Social Engineering & Insider Threat some images courtesy of freedigitalphotos.net
  • 5. Social Engineering & Insider Threat some images courtesy of freedigitalphotos.net
  • 6. what does this mean for cyber threat and crime? Intelligence gathering Greater chance of cyber success
  • 7. what does this mean for cyber threat and crime? Followed target into building or pose as contractor Watched building to select target ‘Bumped into’ target and engaged in conversation – trust gained ‘Borrowed’ their mobile device Researched target and ‘friends’ via social networks …and/or their pass card Gained access to server The cyber attack technically starts here…
  • 8. Joining the dots and the holistic approach • Realistic holistic Threat and Risk Assessments that don’t isolate ‘cyber’ • Realistic appropriate action and policies • C-level commitment and leadership • Top down security culture health • Holistic Security Awareness Training for all staff • Regular refreshers as part of the virtuous security cycle security evolution
  • 9. Joining the dots…27001 in words… • Continuous improvement (PDCA) • Ensure and Assure • Confidentiality, Integrity, Availability • Risk based • Proportionate • Governance • Compliance
  • 10. the standard… • Asset management • HR • Physical security • Communications and Operations • Access Control • System Development • DR, BCM and Incident Management • Compliance
  • 11. Establish the ISMS Maintain & improve the ISMS Monitor & review the ISMS Implement & operate the ISMS Development, maintenance & improvement cycle plan act check do Informationsecurity requirementsandexpectations ManagedInformationsecurity ISO27001 in pictures…
  • 12. And so…  people are our weakest link and cross security disciplines  buildings and technology, combined with people, offer cyber terrorists and criminals not only more targets, but more tools  serious cyber crime can start before anyone logs onto anything  our attitude to security and security awareness training needs to evolve
  • 13. thank you Social Engineering, Insider and Cyber Threat www.advent-im.co.uk www.adventim.wordpress.com @Advent_IM www.linkedin.com/company/advent-im 0121 559 6699 0207 100 1124

Editor's Notes

  1. An attack on an organisation can potentially start in unexpected ways that basically have nothing to do with the cyber world. Hackers on a mission for specific information (as opposed to those just trying to cause disruption) will carry out intelligence gathering prior to a targetted attack. This can take many forms. Basically we are saying that the threat is holistic and the targets in the key intelligence gathering phase may never have had any security awareness training whatsoever or perhaps had some IT security training but the dots are not being joined. It may take days, weeks or months for it to come to light that an attack has taken place. It the threat is holistic then the solution and training has to be too.
  2. So hackers hack people as well as networks and devices. In targeted attacks there is a lot of preparation and when carrying out threat assessment, rolling up the trousers in the style of the social engineer before diving into cyber threat is vital.
  3. There is a myriad of potential weak areas for a social engineer to capitalise upon or for the threat from insiders ( however benign) to be realised. Tailgating into a building to get access Charm offensive on reception or other staff members to get information (pretending to be a legitimate visitor who is lost or pretending to be an IT engineer who needs access to the server, or chatting someone up in order to get the inside track on who goes where or whatever else it is you want) Pretending to be an angry visitor/boss – this may be shouting at receptionist in attempt to be let in or shouting on the phone – pretending you are too busy and important to be bothered by stupid security measure and you are a director of the business anyway – get out of my way! In actual fact any decent director would be delighted if reception shows backbone and demands ID etc) Surveillance – do staff notice someone hanging around watching the comings and goings – do they challenge such behaviour? They could be watching who comes in when or any number of key factors. Gaining access to networks by swiping the passwords people leave lying around on post – it notes….nuff said Stealing ID cards which have become so vital to many businesses, giving car park access, building access, meeting room access, restaurant and lunch access (you can use Bacardi example but don’t mention them by name) chef’s list etc. Remember all of these could be carried out by a regular contractor who has been coerced into it or perhaps became a contractor with this express intention. People gossiping in the office around strangers – all sorts of info available People hanging out together at the great level playing field that is the smoking area. Again you get access to C- level potentially. What people post on social media sites without thinking about their jobs, colleagues or workplace, rich pickings for the social engineer. A bit like going through the bins…. Theft of mobile devices All or any combination may be used in the intelligence gathering phase/ trouser rolling up phase of the attack If none of these things have been scoped into security policies because “IT does security” then the bomb is just waiting to go off for some organisations.
  4. There is a myriad of potential weak areas for a social engineer to capitalise upon or for the threat from insiders ( however benign) to be realised. Tailgating into a building to get access Charm offensive on reception or other staff members to get information (pretending to be a legitimate visitor who is lost or pretending to be an IT engineer who needs access to the server, or chatting someone up in order to get the inside track on who goes where or whatever else it is you want) Pretending to be an angry visitor/boss – this may be shouting at receptionist in attempt to be let in or shouting on the phone – pretending you are too busy and important to be bothered by stupid security measure and you are a director of the business anyway – get out of my way! In actual fact any decent director would be delighted if reception shows backbone and demands ID etc) Surveillance – do staff notice someone hanging around watching the comings and goings – do they challenge such behaviour? They could be watching who comes in when or any number of key factors. Gaining access to networks by swiping the passwords people leave lying around on post – it notes….nuff said Stealing ID cards which have become so vital to many businesses, giving car park access, building access, meeting room access, restaurant and lunch access (you can use Bacardi example but don’t mention them by name) chef’s list etc. Remember all of these could be carried out by a regular contractor who has been coerced into it or perhaps became a contractor with this express intention. People gossiping in the office around strangers – all sorts of info available People hanging out together at the great level playing field that is the smoking area. Again you get access to C- level potentially. What people post on social media sites without thinking about their jobs, colleagues or workplace, rich pickings for the social engineer. A bit like going through the bins…. Theft of mobile devices All or any combination may be used in the intelligence gathering phase/ trouser rolling up phase of the attack If none of these things have been scoped into security policies because “IT does security” then the bomb is just waiting to go off for some organisations.
  5. So the greater the level of intelligence gathered by these means, the greater chance of a successful cyber attack. It could mean physical access to server rooms or it may be information about who comes in when and what their habits are to enable the theft of an ID card. It may mean regular visits from someone who befriends reception such as a delivery guy. Stealing a company device left lying around. Pulling all of the intelligence together may mean not only can the cyber attack progress, but that all the weakest points are known and potentially the period of discovery time can be extended. It may mean it can be carried out more effectively and that greater levels of information can be found/stolen/ruined. Bottom line, never assume the attack has merely started from the moment the system was breached.
  6. An attack on an organisation can potentially start in unexpected ways that basically have nothing to do with the cyber world. Hackers on a mission for specific information (as opposed to those just trying to cause disruption) will carry out intelligence gathering prior to a targeted attack. This can take many forms. Basically we are saying that the threat is holistic and the targets in the key intelligence gathering phase may never have had any security awareness training whatsoever or perhaps had some IT security training but the dots are not being joined. It may take days, weeks or months for it to come to light that an attack has taken place. It the threat is holistic then the solution and training has to be too.