SlideShare a Scribd company logo
1 of 73
Download to read offline
Державна кібербезпека ¹
Кібербезпека держави
Уроки #FRD
State Cybersecurity ≠ Cybersecurity of the State
Lessons of #FRD
Костянтин Корсун, Бережа Сек’юріті, директор та співзасновник
Kostiantyn Korsun, Berezha Security, Co-founder & CEO
NoNameCon, May 16, 2019, Kyiv, Ukraine
Structure
u What is Responsible Disclosure and history of FuckResponsibleDisclosure
(#FRD);
u #FRD Paradox: I’m not a doctor, I’m a pain.
u The Story in Pictures: first splashes of #FRD, #FRD reaction, #FRD
participants;
u Behavioral models during the #FRD: from a hate to a love;
u National Cybersecurity System: what we’ve got and how much we paid;
u #FRD efficiency: results of 23 Top Ukrainian Experts polling;
u Conclusions
Intro
Cybersecurity is important.
Do you agree?
Cybersecurity is a most important
thing? Do you agree?
There is no Cybersecurity System
in whole Ukraine.
Trust me.
What we actually have as a System?
#FRD Paradox
u There is No System, any evidences?
u In October 2017 group of activists set up something under hashtag
#FuckResponsibleDisclosure, (#FRD)
u Зневажаю_Відповідальне_Розкриття
u What those three words under the same # mean?
#FRD Paradox
u Responsible Disclosure: a vulnerability is
revealed to an owner, in a nonpublic way
Shortcoming: low efficiency
u Full Disclosure, Irresponsible Disclosure: a
vulnerability is revealed to everyone, in a
public way.
Shortcoming : exploitation possibility, in fact
assisting offender
Bruce Schneier: "Full disclosure – the practice of making the
details of security vulnerabilities public – is a damned good
idea. Public scrutiny is the only reliable way to improve
security, while secrecy only makes us less secure”
https://www.schneier.com/essays/archives/2007/01/schneier
_full_disclo.html
#FRD Paradox
u #FRD important difference (and
similarity):
- public vulnerability statement
BUT
- no exploitation possibilities, like
open disk share (exception: XSS);
u Motivation: improvement of
cybersecurity level at critical
infrastructure objects AND public
limelight through resonance;
u #FRD activists: no problems’
solving, no service ;
u #FRD activists: only point on
problems, laughing on officials’
ignorance and critical
infrastructure objects’ owners
incompetence;
u I’m not a doctor, I’m just a pain.
#FRD Paradox
How legal #FRD is?
How moral #FRD is?
The Story in Pictures
u When #FRD started: October 6, 2017 with
water supply company and energy company;
u CERT-UA
u Енергоатом (Energoatom, nuclear energy
company): open access to local network;
u Regional water supply company: : open
access to local network;
u КиївЕнерго (KyivEnergo, energy company):
open access to local network;
u Фінмоніторинг (Financial Monitoring
Authority): archaic web site containing
plenty of vulnerabilities
The Story in Pictures: KhOR
Херсонська обласна рада (Kherson
Regional Public Council): typical
example
Problem: open access to internal
network disk, without a password
Kübler-Ross model: five stages of a grief
The Story in Pictures: KhOR
Shock – Denial - Anger:
1) It’s just a provocation
2) We haven’t been hacked
3) The documents are not secret
4) We complained to the police
The Story in
Pictures: KhOR
Bargaining: is it true that….?
Kateryna Handziuk
The Story in Pictures: KhOR
Depression – Acceptance: ignoring and/or thank you
Typical #FRD
reaction:
other option
1) We haven’t been hacked
2) We don’t have any critical/secret information
3) We complained to the police
4) It was customized attack from our competitors
Typical #FRD reaction
Shame on you!
BUT
Probably the problem needs to be solved
Most prominent #FRD cases
43 most prominent cases
(from most important)
State and public authorities: 27
u Центральна виборча комісія
u Державний реєстр виборців
u Міністерство оборони України
u Генеральна прокуратура України
u РНБО
u Міністерство юстиції України
u Міністерство охорони здоров’я
u Міністерство внутрішніх справ України
u Міністерство енергетики та вугільної промисловості України
Most prominent #FRD cases
u Білоцерківський відділ поліції Національної поліції
u Державна регуляторна служба України
u Конституційна комісія при Президентові України
u Державна служба України з лікарських засобів та контролю за
наркотиками
u Державна служба статистики України
u НКРЕП (Національна комісія, що здійснює державне регулювання у сферах
енергетики та комунальних послуг
u Державна служба фінансового моніторингу України
Most prominent #FRD cases
u Судова влада України
u Волинська ОДА
u Донецька ОДА
u Чернігівська ОДА
u Херсонська обласна рада
u Черкаська обласна рада
u районні державні адміністрації Хмельницької та Харківської областей
Most
prominent
#FRD cases
Critical infrastructure objects:
u Енергоатом
u Південно-Українська АЕС
u Укрпошта
u Укренерго
u Укрзалізниця
u Київпастранс
u Водоканал «Дніпро-Кіровоград»
u Київенерго
u ПАО «Завод Маяк»
u Державна фірма “Укрінмаш» («Укроборонпром»)
u КБ «Південне»
u Комунальний концерн «Центр комунального
сервісу»
u Львівська залізниця
Most prominent #FRD cases
Приватні компанії:
u Метінвест
u Київстар
u велика аудиторська компанія
And more screenshots…
Most popular vulnerabilities:
u Open network disk, without
password
u XSS
u Outdated CMS
u Web-servers without updates +
plenty of vulnerabilities
u Old web sites’ versions on sub-
domains .gov.ua
u SQLi
u HTTP instead of HTTPS
Outstanding #FRD activists
Sean Brian Townsend
Дмитрий Орлов
Jeoffrey Dahmer
Yehor Papyshev
Andrii Pertsiukh
Kir Vaznitsky
Сергій Дяченко
Aleksandr Galushchenko
Андрей Перевезий
Дякую!
‘National Cybersecurity System’
Seven public authorities are responsible for National Cybersecurity System:
u РНБО, National Security and Defense Council. coordinator
u Держспецзв’язку, SSSCIP
u СБУ, Security Service of Ukraine
u Кіберполіція, CyberPolice
u НБУ, National Bank of Ukraine
u Міністерство оборони/ГШ ЗСУ, Ministry of Defense, General Staff
u Розвідувальні органи, Intelligence Agencies
Three of them are objects of #FRD
Other ones are potential objects
‘National Cybersecurity System’: money
u $125 million per year for SSSCIP
u SSU: $17 million
u CyberPolice: $700k
u NBU, MoD, Intel: N/A
Total: ? ? ? ? ? ?
On National Cybersecurity System in
details:
UISGCON14, Костянтин Корсун,
Система кібербезпеки України -
реальність чи міф?
https://www.youtube.com/watch?v
=HerX0DDEaFs&t=9s
#FRD consequences
Tactical effects:
Resonance in media
Discharges
Budgets for cybersecurity
Growing interest to cybersec industry
Increasing number of professional certificates
Better cooperation of Gov and Private sectors
Is it objective or subjective?
23 Ukrainian cybersecurity Top-experts have been inquired.
#FRD consequences
Who are those 23 experts?
u 5 work at Gov sector
u 14 work at Private sector
u 4 independent experts (freelance, journalist)
u 8 work at critical infrastructure objects
u 2 females, 21 males
u No one is #FRD activist
u No one from CyberPolice
#FRD consequences
u 1.Do you believe that since 2014
cybersecurity level in Ukraine
has been increased?
u 2. If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
u 3. What factors in your opinion
have influenced on current
cybersecurity level in Ukraine
the most?
#FRD consequences
Question 1: Do you believe that
since 2014 cybersecurity level in
Ukraine has been increased?
YES: 78,3%
NO: 4,3%
Other: 17,4%
#FRD consequences
Question 1: Do you believe that
since 2014 cybersecurity level in
Ukraine has been increased?
For commercial sector: Yes
For Governmental sector: don’t
think so
#FRD consequences
Question 1: Do you believe that
since 2014 cybersecurity level in
Ukraine has been increased?
Changes are insignificant,
in some organizations only
#FRD consequences
Question 1: Do you believe that
since 2014 cybersecurity level in
Ukraine has been increased?
Rather yes then no.
Cybersecurity level in
Governmental/state organization
has been increased unessentially
#FRD consequences
Question 2: If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
Yes: 34,7%
No: 13%
It influenced partially: 21,5%
Influence was
minor/moderate:12,9%
I haven’t heard on #FRD: 12,9%
I can’t say definitely: 5%
#FRD consequences
Question 2: If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
#FRD contribution was minor
#FRD consequences
Question 2: If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
Any initiative influences but I can’t
say how strong
#FRD consequences
Question 2: If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
I can’t be sure however probably
the initiative influenced on cyber
awareness
#FRD consequences
Question 2: If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
The initiative has an opposite side:
our country is in war any the
adversary could use revealed
vulnerabilities.
If an owner of vulnerable resources
doesn’t response it would be better
to let LEs know, not sharing in
public.
#FRD consequences
Question 2: If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
#FRD’s initiative influenced
inessentially, and Sean admitted
that
#FRD consequences
Question 2: If so, has
#FuckResponsibleDisclosure
initiative influenced on it?
Yes, #FRD has influenced.
And this initiative must be used in
upcoming Law on Cybersecurity in
Ukraine
#FRD consequences
3. What factors in your opinion have
influenced on current cybersecurity
level in Ukraine the most?
NotPetya and most known
cyberattacks
Why #FRD occurred?
#FRD consequences
3. What factors in your opinion have
influenced on current cybersecurity
level in Ukraine the most?
What #FRD has led to?
Western Partners: not inner factor
#FRD consequences
3. What factors in your opinion have
influenced on current cybersecurity
level in Ukraine the most?
No ’inner factors’ or ‘can’t say’ –
honest answers
Only one hint at #FRD
#FRD consequences
So 23 best Ukrainian Cybersecurity experts
believe that:
Cybersecurity level in Ukraine has increased:
78,3%
#FRD influenced on that significantly or partially:
56,2%
BUT
#FRD was not a determined factor of that growth.
Conclusions
Question to myself:
Main inner driver was marginal and
hasn’t influenced whole country’s
cybersecurity significantly?
Massive cyberattacks were a main
driver?
#FRD is important initiative, but
not enough effective?
Any other idea?
Conclusions
u #FRD is necessary and helpful
u #FRD is not enough to influence
whole country
u #FRD needs to be changed;
however it wouldn’t be #FRD
u Government should do what
#FRD does; but actually they
don’t.
#FRD is something bright,
emotional, scandal, patriotic.
Thank you, #FRD
Have we a
time for
Q&A session?
Thank you!
Please reach me out:
kos@berezhasecurity.com
https://berezhasecurity.com

More Related Content

Similar to Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons.

Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...Karin Wahl-Jorgensen
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)Michael Edson
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite12
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docxwrite31
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...MIT Startup Exchange
 
Social media risks - data leakage and data accountability
Social media risks - data leakage and data accountabilitySocial media risks - data leakage and data accountability
Social media risks - data leakage and data accountabilityArrka Consulting
 
Social media data leakage and data accountability risks
Social media   data leakage and data accountability risksSocial media   data leakage and data accountability risks
Social media data leakage and data accountability risksArrka Consulting
 
Presentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, BudapestPresentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, BudapestMarc Garriga
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
 
How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...Moldova ICT Summit
 

Similar to Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons. (20)

NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
 
Situational Awareness meets Public Information
Situational Awareness meets Public InformationSituational Awareness meets Public Information
Situational Awareness meets Public Information
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
comm120 week 6 discussion.docx
comm120 week 6 discussion.docxcomm120 week 6 discussion.docx
comm120 week 6 discussion.docx
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social media risks - data leakage and data accountability
Social media risks - data leakage and data accountabilitySocial media risks - data leakage and data accountability
Social media risks - data leakage and data accountability
 
Social media data leakage and data accountability risks
Social media   data leakage and data accountability risksSocial media   data leakage and data accountability risks
Social media data leakage and data accountability risks
 
Presentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, BudapestPresentation #1ODataLicenseEU. LAPSI Seminar, Budapest
Presentation #1ODataLicenseEU. LAPSI Seminar, Budapest
 
Simon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison RWE - Chain of Things 010616 final
Simon Harrison RWE - Chain of Things 010616 final
 
Voip Cyber Security
Voip Cyber SecurityVoip Cyber Security
Voip Cyber Security
 
How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...How European start-ups can make a business out of the US shut-down of privacy...
How European start-ups can make a business out of the US shut-down of privacy...
 

More from NoNameCon

Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...NoNameCon
 
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]NoNameCon
 
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]NoNameCon
 
Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop] Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop] NoNameCon
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...NoNameCon
 
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїNoNameCon
 
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...NoNameCon
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 
Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...NoNameCon
 
Bert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for CybersecurityBert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for CybersecurityNoNameCon
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingNoNameCon
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...NoNameCon
 
Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?NoNameCon
 
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!NoNameCon
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...NoNameCon
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConNoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopNoNameCon
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security ByNoNameCon
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessNoNameCon
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...NoNameCon
 

More from NoNameCon (20)

Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
Help, my browser is leaking! Exploring XSLeaks attacks and defenses - Tom Van...
 
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]Anastasiia Vixentael – Encryption basics [NoName CyberKids]
Anastasiia Vixentael – Encryption basics [NoName CyberKids]
 
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
Ihor Malchenyuk – What is privacy and how to protect it [NoName CyberKids]
 
Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop] Olha Pasko - Hunting fileless malware [workshop]
Olha Pasko - Hunting fileless malware [workshop]
 
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
Nazar Tymoshyk - Automation in modern Incident Detection & Response (IDR) pro...
 
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографіїRuslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
Ruslan Kiyanchuk - Калина, Купина, та інша флора вітчизняної криптографії
 
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
Artem Storozhuk - Search over encrypted records: from academic dreams to prod...
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...Oksana Safronova - Will you detect it or not? How to check if security team i...
Oksana Safronova - Will you detect it or not? How to check if security team i...
 
Bert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for CybersecurityBert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for Cybersecurity
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
 
Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?
 
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons.

  • 1. Державна кібербезпека ¹ Кібербезпека держави Уроки #FRD State Cybersecurity ≠ Cybersecurity of the State Lessons of #FRD Костянтин Корсун, Бережа Сек’юріті, директор та співзасновник Kostiantyn Korsun, Berezha Security, Co-founder & CEO NoNameCon, May 16, 2019, Kyiv, Ukraine
  • 2. Structure u What is Responsible Disclosure and history of FuckResponsibleDisclosure (#FRD); u #FRD Paradox: I’m not a doctor, I’m a pain. u The Story in Pictures: first splashes of #FRD, #FRD reaction, #FRD participants; u Behavioral models during the #FRD: from a hate to a love; u National Cybersecurity System: what we’ve got and how much we paid; u #FRD efficiency: results of 23 Top Ukrainian Experts polling; u Conclusions
  • 3. Intro Cybersecurity is important. Do you agree? Cybersecurity is a most important thing? Do you agree? There is no Cybersecurity System in whole Ukraine. Trust me.
  • 4. What we actually have as a System?
  • 5.
  • 6.
  • 7. #FRD Paradox u There is No System, any evidences? u In October 2017 group of activists set up something under hashtag #FuckResponsibleDisclosure, (#FRD) u Зневажаю_Відповідальне_Розкриття u What those three words under the same # mean?
  • 8. #FRD Paradox u Responsible Disclosure: a vulnerability is revealed to an owner, in a nonpublic way Shortcoming: low efficiency u Full Disclosure, Irresponsible Disclosure: a vulnerability is revealed to everyone, in a public way. Shortcoming : exploitation possibility, in fact assisting offender Bruce Schneier: "Full disclosure – the practice of making the details of security vulnerabilities public – is a damned good idea. Public scrutiny is the only reliable way to improve security, while secrecy only makes us less secure” https://www.schneier.com/essays/archives/2007/01/schneier _full_disclo.html
  • 9. #FRD Paradox u #FRD important difference (and similarity): - public vulnerability statement BUT - no exploitation possibilities, like open disk share (exception: XSS); u Motivation: improvement of cybersecurity level at critical infrastructure objects AND public limelight through resonance; u #FRD activists: no problems’ solving, no service ; u #FRD activists: only point on problems, laughing on officials’ ignorance and critical infrastructure objects’ owners incompetence; u I’m not a doctor, I’m just a pain.
  • 10. #FRD Paradox How legal #FRD is? How moral #FRD is?
  • 11. The Story in Pictures u When #FRD started: October 6, 2017 with water supply company and energy company; u CERT-UA u Енергоатом (Energoatom, nuclear energy company): open access to local network; u Regional water supply company: : open access to local network; u КиївЕнерго (KyivEnergo, energy company): open access to local network; u Фінмоніторинг (Financial Monitoring Authority): archaic web site containing plenty of vulnerabilities
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. The Story in Pictures: KhOR Херсонська обласна рада (Kherson Regional Public Council): typical example Problem: open access to internal network disk, without a password
  • 20. Kübler-Ross model: five stages of a grief
  • 21. The Story in Pictures: KhOR Shock – Denial - Anger: 1) It’s just a provocation 2) We haven’t been hacked 3) The documents are not secret 4) We complained to the police
  • 22. The Story in Pictures: KhOR Bargaining: is it true that….? Kateryna Handziuk
  • 23. The Story in Pictures: KhOR Depression – Acceptance: ignoring and/or thank you
  • 24. Typical #FRD reaction: other option 1) We haven’t been hacked 2) We don’t have any critical/secret information 3) We complained to the police 4) It was customized attack from our competitors
  • 25. Typical #FRD reaction Shame on you! BUT Probably the problem needs to be solved
  • 26. Most prominent #FRD cases 43 most prominent cases (from most important) State and public authorities: 27 u Центральна виборча комісія u Державний реєстр виборців u Міністерство оборони України u Генеральна прокуратура України u РНБО u Міністерство юстиції України u Міністерство охорони здоров’я u Міністерство внутрішніх справ України u Міністерство енергетики та вугільної промисловості України
  • 27. Most prominent #FRD cases u Білоцерківський відділ поліції Національної поліції u Державна регуляторна служба України u Конституційна комісія при Президентові України u Державна служба України з лікарських засобів та контролю за наркотиками u Державна служба статистики України u НКРЕП (Національна комісія, що здійснює державне регулювання у сферах енергетики та комунальних послуг u Державна служба фінансового моніторингу України
  • 28. Most prominent #FRD cases u Судова влада України u Волинська ОДА u Донецька ОДА u Чернігівська ОДА u Херсонська обласна рада u Черкаська обласна рада u районні державні адміністрації Хмельницької та Харківської областей
  • 29. Most prominent #FRD cases Critical infrastructure objects: u Енергоатом u Південно-Українська АЕС u Укрпошта u Укренерго u Укрзалізниця u Київпастранс u Водоканал «Дніпро-Кіровоград» u Київенерго u ПАО «Завод Маяк» u Державна фірма “Укрінмаш» («Укроборонпром») u КБ «Південне» u Комунальний концерн «Центр комунального сервісу» u Львівська залізниця
  • 30. Most prominent #FRD cases Приватні компанії: u Метінвест u Київстар u велика аудиторська компанія
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48. Most popular vulnerabilities: u Open network disk, without password u XSS u Outdated CMS u Web-servers without updates + plenty of vulnerabilities u Old web sites’ versions on sub- domains .gov.ua u SQLi u HTTP instead of HTTPS
  • 49. Outstanding #FRD activists Sean Brian Townsend Дмитрий Орлов Jeoffrey Dahmer Yehor Papyshev Andrii Pertsiukh Kir Vaznitsky Сергій Дяченко Aleksandr Galushchenko Андрей Перевезий Дякую!
  • 50. ‘National Cybersecurity System’ Seven public authorities are responsible for National Cybersecurity System: u РНБО, National Security and Defense Council. coordinator u Держспецзв’язку, SSSCIP u СБУ, Security Service of Ukraine u Кіберполіція, CyberPolice u НБУ, National Bank of Ukraine u Міністерство оборони/ГШ ЗСУ, Ministry of Defense, General Staff u Розвідувальні органи, Intelligence Agencies Three of them are objects of #FRD Other ones are potential objects
  • 51. ‘National Cybersecurity System’: money u $125 million per year for SSSCIP u SSU: $17 million u CyberPolice: $700k u NBU, MoD, Intel: N/A Total: ? ? ? ? ? ? On National Cybersecurity System in details: UISGCON14, Костянтин Корсун, Система кібербезпеки України - реальність чи міф? https://www.youtube.com/watch?v =HerX0DDEaFs&t=9s
  • 52. #FRD consequences Tactical effects: Resonance in media Discharges Budgets for cybersecurity Growing interest to cybersec industry Increasing number of professional certificates Better cooperation of Gov and Private sectors Is it objective or subjective? 23 Ukrainian cybersecurity Top-experts have been inquired.
  • 53. #FRD consequences Who are those 23 experts? u 5 work at Gov sector u 14 work at Private sector u 4 independent experts (freelance, journalist) u 8 work at critical infrastructure objects u 2 females, 21 males u No one is #FRD activist u No one from CyberPolice
  • 54. #FRD consequences u 1.Do you believe that since 2014 cybersecurity level in Ukraine has been increased? u 2. If so, has #FuckResponsibleDisclosure initiative influenced on it? u 3. What factors in your opinion have influenced on current cybersecurity level in Ukraine the most?
  • 55. #FRD consequences Question 1: Do you believe that since 2014 cybersecurity level in Ukraine has been increased? YES: 78,3% NO: 4,3% Other: 17,4%
  • 56. #FRD consequences Question 1: Do you believe that since 2014 cybersecurity level in Ukraine has been increased? For commercial sector: Yes For Governmental sector: don’t think so
  • 57. #FRD consequences Question 1: Do you believe that since 2014 cybersecurity level in Ukraine has been increased? Changes are insignificant, in some organizations only
  • 58. #FRD consequences Question 1: Do you believe that since 2014 cybersecurity level in Ukraine has been increased? Rather yes then no. Cybersecurity level in Governmental/state organization has been increased unessentially
  • 59. #FRD consequences Question 2: If so, has #FuckResponsibleDisclosure initiative influenced on it? Yes: 34,7% No: 13% It influenced partially: 21,5% Influence was minor/moderate:12,9% I haven’t heard on #FRD: 12,9% I can’t say definitely: 5%
  • 60. #FRD consequences Question 2: If so, has #FuckResponsibleDisclosure initiative influenced on it? #FRD contribution was minor
  • 61. #FRD consequences Question 2: If so, has #FuckResponsibleDisclosure initiative influenced on it? Any initiative influences but I can’t say how strong
  • 62. #FRD consequences Question 2: If so, has #FuckResponsibleDisclosure initiative influenced on it? I can’t be sure however probably the initiative influenced on cyber awareness
  • 63. #FRD consequences Question 2: If so, has #FuckResponsibleDisclosure initiative influenced on it? The initiative has an opposite side: our country is in war any the adversary could use revealed vulnerabilities. If an owner of vulnerable resources doesn’t response it would be better to let LEs know, not sharing in public.
  • 64. #FRD consequences Question 2: If so, has #FuckResponsibleDisclosure initiative influenced on it? #FRD’s initiative influenced inessentially, and Sean admitted that
  • 65. #FRD consequences Question 2: If so, has #FuckResponsibleDisclosure initiative influenced on it? Yes, #FRD has influenced. And this initiative must be used in upcoming Law on Cybersecurity in Ukraine
  • 66. #FRD consequences 3. What factors in your opinion have influenced on current cybersecurity level in Ukraine the most? NotPetya and most known cyberattacks Why #FRD occurred?
  • 67. #FRD consequences 3. What factors in your opinion have influenced on current cybersecurity level in Ukraine the most? What #FRD has led to? Western Partners: not inner factor
  • 68. #FRD consequences 3. What factors in your opinion have influenced on current cybersecurity level in Ukraine the most? No ’inner factors’ or ‘can’t say’ – honest answers Only one hint at #FRD
  • 69. #FRD consequences So 23 best Ukrainian Cybersecurity experts believe that: Cybersecurity level in Ukraine has increased: 78,3% #FRD influenced on that significantly or partially: 56,2% BUT #FRD was not a determined factor of that growth.
  • 70. Conclusions Question to myself: Main inner driver was marginal and hasn’t influenced whole country’s cybersecurity significantly? Massive cyberattacks were a main driver? #FRD is important initiative, but not enough effective? Any other idea?
  • 71. Conclusions u #FRD is necessary and helpful u #FRD is not enough to influence whole country u #FRD needs to be changed; however it wouldn’t be #FRD u Government should do what #FRD does; but actually they don’t. #FRD is something bright, emotional, scandal, patriotic. Thank you, #FRD
  • 72. Have we a time for Q&A session?
  • 73. Thank you! Please reach me out: kos@berezhasecurity.com https://berezhasecurity.com