SlideShare a Scribd company logo
1 of 29
Download to read offline
Cyber Resilience
Malta Association of
Risk Management (MARM)

Donald Tabone
24 June 2013
Agenda

1

Where are we coming from?

2

Cybercrime and threat actors

3

What the stats say

4

Who‟s being targeted?

5

Cause for concern?

6

Cyber resilience defined

7

A six-point plan to becoming resilient

1
Where are we coming from?

The foundations
• ‟62 J.C. R. Licklider introduced the idea of an „Intergalactic Network‟
• „76 Dr. Robert Metcalfe invented Ethernet, coaxial cables
• „78 Gary Thuerek – first spam email sent to 400 users of ARPANET

• „84 Dr. Jon Postel described his idea for .com, .org, .gov etc. In a
series of papers published by the IETF
• „89 The World was the first ISP to offer commercial dial up internet
• ‟92 The Corporation for Education and Research Network (CREN)
released the world wide web

The beginning of eCommerce
• „94 Pizza hut offered online ordering through their website
• „95 Pierre Omidyar released AuctionWeb which later became eBay
• „96 Hotmail was launched. The following year Microsoft bought it out
for $400m
• „98 Google received funding to become Google Technology
Incorporated.
• „99 The Internet consisted of 19.5m hosts and over 1m websites

2
Where are we coming from?

The Dot-com bubble
• „00 The Dot-com bubble burst
• „03 Apple launched the iTunes store with 200,000 songs
• „03 The hacktivisit group Anonymous was born
• „04 Google launched Gmail with 1Gb of storage
• ‟05 YouTube is launched. The following year Google bought it out for
$1.6b
• „06 Twitter and Facebook came around
• „06 There are an estimated 92m websites online

40 years from its inception
• ‟09 Mobile data traffic exceeds voice traffic every single month
• „09 Cloud-based file hosting from the likes of Dropbox came around
• „10 Facebook announces it reached 400m active members
• „10 Syria and China attempt to control Internet access
• „10 The Wikileaks drama ensues whilst Anonymous conduct several cyber
attacks on government, religious and corporate websites
• „11 Interest in virtualisation and cloud computing reach their highest peak
• „13 The interest in BYOD and Big Data has reached a new high

3
Opportunity for crime

www
Cybercrime
& Cyber
criminals
Our
dependence

As a result, we face new challenges related to..
• Our online privacy,
• The confidentiality and integrity of the data we entrust to online entities, and
• Our ability to conduct business on the net through the use of ecommerce web
applications
Because of the nature of how the net works, accountability is also a challenge!
4
Threat actors..1
Organised Crime
• Traditionally based in former Soviet Republics
(Russia, Belarus, Ukraine)
• Common attacks: Theft of PII for resale and
misuse or resources for hosting of illicit
material
• Occasionally employ blackmail in terms of
availability (Threats of denial of service attacks
to companies and threats of exposing
individuals to embarrassment)

5
Threat actors..2
State Sponsored
• Nations where commercial and state interests
are very aligned
• Military or Intelligence assets deployed in
commercial environments
• Limitless resources?

• Main aim to achieve competitive advantage for
business
• Theft of commercial secrets (Bid information,
M&A details)

6
Just this week

7
Hacktivism
Will attack companies, organizations and individuals who are seen as
being unethical or not doing the right thing

Hacking for fun… seriously!
Entire nations can be taken down (Estonia)

8
Stolen information

• 18.5m people have been affected by PC theft
• 75% of data loss incidents in Retail were
attributed to Hacking
• 96% of data loss incidents in Media were
attributed to Hacking
Source: 2012 KPMG Data Loss Barometer

9
2012 KPMG cybercrime survey

Source: KPMG A nuanced perspective on cybercrime, shifting viewpoints – call for action. The results were based on over 170 responses from CIOs/CISOs or professionals in related
professions in the Netherlands.

10
3 Common
Attacks

Traditional crime, redefined?

Network based attacks

Spear phishing attacks

Human based attacks

• Identify a target website
• Conduct network
reconnaissance / mapping
• Engage in DDoS attacks to
deny accessibility
• The result is direct loss of
business

• Identify a target individual
• Build a profile / biography
• Directly target with a
personal email
• Trick user into accessing a
malicious website
• Implant malware and gain
control of a device
• Use a compromised
machine to obtain
otherwise confidential
information

• Human error incidents
• Inside users become the
target as they are often
trusted users
• Scorned / disgruntled
employees

The reality is that cyber attackers and
organised crime perpetuators often use
a combination of attack avenues to
profile a target and map out their internal
systems – the information is readily
available!

Competitive
edge is
eroded

Organisation
secrets are
stolen

Corporate
reputations
are
damaged

Source: 2012 KPMG Cyber Vulnerability Index

11
Who are they targeting?

Increased
attack
sophistication

Inappropriate
business
response

=

UNCERTAINITY
One study* conducted in the UK showed that
small businesses suffer an estimated loss of
£800m a year, averaging nearly £4000 per
business
• 30% of its members were victims of fraud as a
result of virus infections
• 50% hit by malware
• 8% victims of hacking
• 5% suffered security breaches

As a consequence, a second recent cybercrime
study** revealed that
• 53% of the British public is worried about the
damage of cyber attacks
• 40% feel more vulnerable to cyber attacks now
than a year ago
• 38% feel that their personal data exchanged
with organisations they do business with may
already have been compromised

Sources: * The study was carried out by the Federation of Small Businesses in the UK and is based on its 20000 members, http://www.fsb.org.uk/News.aspx?loc=pressroom&rec=8083, accessed 12/6/2013
** The study was conducted by PollOne in April 2013 for Tripwire on 1000 users, http://www.tripwire.com/company/research/survey-half-uk-population-worried-about-nation-state-cyber-attacks/, accessed 12/6/2013

12
In the US

The unverified losses that victims
claimed in 2012 jumped 8.3% from
$485m the previous year

Losses
Complaints

Sources: SC Magazine and Internet Crime Complaint Center

13
Meanwhile in a non-descript building …

… just outside of Shanghai, “Unit 61398” of the Peoples Liberation Army is the alleged source of
Chinese hacking attacks…

Source: Businessweek.com

… although the Chinese government consistently denies its involvement in such activities
claiming that such allegations are “irresponsible and unprofessional”

Why should you be concerned?
Source: Hello, Unit 61398, The Economist. 19 February 2013, accessed 13/06/2013

14
Convictions?
The fight against cybercrime seems to be ongoing
41
MONTHS

• Romanian hacker Cezar Butu – 21 months in prison for compromising
systems

credit card processing

• Darnell Albert-El, 53 – 27 months in prison for hacking
• Steven Kim, 40 – 12 months in prison for stealing personal data
• Bruce Raisley, 48 – 24 months in prison for creating a botnet virus to launch DDoS atacks
• Shawn Reilly, 34 – 33 months in prison for committing 84 fraudulent wire transfers
• Eduard Arakelyan, 21 and Arman Vardanyan, 23 – 36 months in prison for theft of credit card
Why should you be concerned?
information and committed bank fraud
• Sonya Martin, 45 – 30 months in prison for being part of a gang to evade encryption
Sources: ValueWork, Help Net Security, SC Magazine

15
Next generation cybercrime threat?
What if hackers hijacked a key satellite? Could space be cybercrime's new frontier?
FACT #1
We have an overwhelming reliance on
space technology for vital streams of
information

FACT #2
Satellites are frightfully vulnerable to
collisions and there are over 5500
redundant ones at the moment !

Makes us acutely vulnerable!
Source: The Independent, Space : the new cybercrime frontier, http://www.independent.co.uk/life-style/gadgets-and-tech/news/space-the-new-cyber-crime-frontier8194801.html accessed 16/2/2013

16
Juggling the risks

Examine
threats

Determine
the risk level

Risk
Assessment

AIM: reduce organisational risk

Risk Assumption

Risk Alleviation
Risk Avoidance

Risk Limitation
Risk Planning

Risk Transference

• With appropriate due diligence, management accept the potential
risk and continue operating
• Management approve the implementation of controls to lower risk to
an acceptable level
• Eliminate the process that could cause the risks
• Management limit the risk exposure by putting controls to limit the
impact of a threat
• A process to manage risk by developing an architecture that
prioritises, implements and maintains controls
• Management transfer the risk by using other options to compensate
for a loss – e.g. Purchasing an insurance policy

17
Risk Transference

Bespoke insurance products providing tailor made
policies targeting key professional liability exposures for
technology companies
18
Becoming resilient – a six point action plan

Cyber
Resilience

“ The ability of a system or a domain to withstand attacks or
failures and in such events to re-establish itself quickly ”
– Nigel Inkster, International Institute of Strategic Studies

1. Organizational Readiness
2. Situational awareness
3. Cyber defence

4. Detection
5. Mitigation and containment

6. Recovery

19
#1 - Organisational Readiness

Corporate awareness

Ownership at the C-level
Assign the role and responsibility for
information security oversight
Understand your business risks

Focus on your information and reputation

Share intelligence and experiences
20
#2 - Situational intelligence

Hacking for fame
& glory

Cybercrime
moved into
monetisation

Disruption

Criminal gangs

Protest
hacktivism

Corporate
espionage

Anonymous &
Lulzsec target
corporate
infrastructures

Specialist knowledge

Know your
information assets

Keep abreast of the
latest advanced threats

Classify your
information assets

“ One of the problems is that we all tend to be technology professionals weathered by our experiences rather than looking at
new ways of managing risk and gaining or using new sources of intelligence ” - Pat Brady, Information Security Manager,
National Australia Group
21
#3 – Cyber defence

Get a grip on infrastructure and access security

Assert the levels of staff awareness

Define strict access control and remote access control

Ensure strong visitor procedures for key buildings

Keep your basic security controls in sight e.g. Password
change policy

Infrastructure changes should trigger network configuration
changes allowing you to move the shape of the target
22
#4 – Detection

Develop the ability to detect attacks

Ensure you have an effective internal
& external monitoring process
Scan outbound messages for
abnormal volumes and patterns
Early recognition of a compromise is
key to early reaction
23
#5 – Mitigation and containment

The aim is to limit the damage to your
services and reputation

Continuity of
Operations Plan

Limit the impact / shutdown the source

Disaster
Recovery Plan

Being prepared is the key

IT / Network
Contingency
Plans

Contingency planning – define and
review your plans

Crisis
Communication
Plan

Ensure adequate testing of business
continuity plans
Prepared PR statements

Cyber
Incident
Plan
Occupant
Emergency Plan

24
#6 – Recovery

You need to develop the ability to re-establish
normal service

 Your survival as a business depends on it
Apply the lessons learnt

Give feedback to senior executives

Here’s what
happened to
us

This is how
we reacted

This is what
we’ve done to
mitigate /
prevent it

25
Conclusions

Some final thoughts..
• The cyber crime threat is actual and here to stay
• It’s NOT a question of IF but WHEN

IT Service
Continuity
Management
functions

Business
Continuity

• Be prepared for incidents
• Ensure security awareness between departments

Cyber
Resiliency

• Protect your information assets, regardless of where are being
held
• Ensure adequate crisis management between departments

Awareness

• Align individual goals with the organisations‟ cyber security
ambitions

Knowledge

• Cyber risk teams need to consist of flexible people who can build
relationships across departments
• Take a pragmatic approach to investing in your defences –
overinvesting is a real danger

Controls
Detection
Mitigation
Recovery

BEING PROACTIVE IS THE NAME OF THE GAME
26
References

Andrew Auernheimer, http://en.wikipedia.org/wiki/Weev
Bandit Country, Amir Singh, Chartech March/April 2013
Cyber Crime Study Reveals Uncertainty, http://www.tripwire.com/state-of-security/it-security-data-protection/cyber-security/viewpoints-oncyber-crime-reveal-uncertainty/
Eight cyber crooks who got less prison time than Andrew Auernheimer, http://www.scmagazine.com/here-are-eight-cyber-crooks-who-gotless-prison-time-than-andrew-auernheimer/article/284928/ KPMG data loss barometer 2012, http://www.kpmg.com/uk/en/services/advisory/risk-consulting/pages/data-loss-barometer-2012.aspx
KPMG seven ways to beat cyber crime,
http://www.kpmg.com/UK/en/IssuesAndInsights/ArticlesPublications/Documents/PDF/Advisory/seven-ways-beat-cyber-crime-nov2012.pdf
KPMG shifting viewpoints - A nuanced perspective on cybercrime, http://www.kpmg.com/NL/en/Issues-AndInsights/ArticlesPublications/Pages/Shifting-viewpoints.aspx
Microsoft and FBI disrupt global cybercrime ring, http://www.net-security.org/malware_news.php?id=2511
Most small businesses can't restore all data after a cyber attack, http://www.net-security.org/secworld.php?id=15012
Operation cyber taskforce, Gerry O’Neill, Chartech March/April 2013
Space: the new cyber crime frontier, http://www.independent.co.uk/life-style/gadgets-and-tech/news/space-the-new-cyber-crime-frontier8194801.html
The cost of cybercrime, http://securityaffairs.co/wordpress/14628/cyber-crime/cost-of-cybercrime-for-uk-small-businesses.html

27
Thank you!

Donald Tabone B.Sc. (Hons), LL.M. (Strath)
 donaldtabone@kpmg.com.mt

More Related Content

What's hot

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 

What's hot (20)

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Incident response
Incident responseIncident response
Incident response
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 

Viewers also liked

Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?John Gilligan
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015ITSM Academy, Inc.
 
EU Onshore Insurance Protected Cells - Captives on a Budget
EU Onshore Insurance Protected Cells - Captives on a BudgetEU Onshore Insurance Protected Cells - Captives on a Budget
EU Onshore Insurance Protected Cells - Captives on a BudgetIan-Edward Stafrace
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing John Weiler
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Cyber Crime & Big Data Webinar -- 10-16-13
Cyber Crime & Big Data  Webinar -- 10-16-13Cyber Crime & Big Data  Webinar -- 10-16-13
Cyber Crime & Big Data Webinar -- 10-16-13MedillNSZ
 
2016 Canadian CEO Outlook
2016 Canadian CEO Outlook2016 Canadian CEO Outlook
2016 Canadian CEO OutlookStradablog
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesCyber Security Alliance
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9ITpreneurs
 
Technician Wisdom_June 2010
Technician Wisdom_June 2010Technician Wisdom_June 2010
Technician Wisdom_June 2010Springboard Labs
 
Behavioural Economics and Finance
Behavioural Economics and FinanceBehavioural Economics and Finance
Behavioural Economics and FinanceIan-Edward Stafrace
 
FERMA Risk Management Benchmarking Survey 2014
FERMA Risk Management Benchmarking Survey 2014FERMA Risk Management Benchmarking Survey 2014
FERMA Risk Management Benchmarking Survey 2014Ian-Edward Stafrace
 
Driving higher performance from Google AdWords by applying Behavioural Economics
Driving higher performance from Google AdWords by applying Behavioural EconomicsDriving higher performance from Google AdWords by applying Behavioural Economics
Driving higher performance from Google AdWords by applying Behavioural Economicspaulsbooth
 
The Power of Cognitive Interviewing... and what qualitative research can lear...
The Power of Cognitive Interviewing... and what qualitative research can lear...The Power of Cognitive Interviewing... and what qualitative research can lear...
The Power of Cognitive Interviewing... and what qualitative research can lear...Merlien Institute
 
Tom ewing behavioural economics - 2012
Tom ewing   behavioural economics - 2012Tom ewing   behavioural economics - 2012
Tom ewing behavioural economics - 2012Ray Poynter
 
Operationalizing Safety II - Resilience Learning Network - January 10, 2013
Operationalizing Safety II - Resilience Learning Network - January 10, 2013Operationalizing Safety II - Resilience Learning Network - January 10, 2013
Operationalizing Safety II - Resilience Learning Network - January 10, 2013Springboard Labs
 

Viewers also liked (20)

Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
EU Onshore Insurance Protected Cells - Captives on a Budget
EU Onshore Insurance Protected Cells - Captives on a BudgetEU Onshore Insurance Protected Cells - Captives on a Budget
EU Onshore Insurance Protected Cells - Captives on a Budget
 
El negocio
El negocioEl negocio
El negocio
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing
 
Cyber Resilience @ Dundee & Angus College
Cyber Resilience @ Dundee & Angus CollegeCyber Resilience @ Dundee & Angus College
Cyber Resilience @ Dundee & Angus College
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Cyber Crime & Big Data Webinar -- 10-16-13
Cyber Crime & Big Data  Webinar -- 10-16-13Cyber Crime & Big Data  Webinar -- 10-16-13
Cyber Crime & Big Data Webinar -- 10-16-13
 
2016 Canadian CEO Outlook
2016 Canadian CEO Outlook2016 Canadian CEO Outlook
2016 Canadian CEO Outlook
 
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & RisquesASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
ASFWS 2011 : Cyberguerre et Infrastructures critiques : Menaces & Risques
 
EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9EC-Council Computer Hacking Forensic Investigator v9
EC-Council Computer Hacking Forensic Investigator v9
 
Technician Wisdom_June 2010
Technician Wisdom_June 2010Technician Wisdom_June 2010
Technician Wisdom_June 2010
 
Behavioural Economics and Finance
Behavioural Economics and FinanceBehavioural Economics and Finance
Behavioural Economics and Finance
 
FERMA Risk Management Benchmarking Survey 2014
FERMA Risk Management Benchmarking Survey 2014FERMA Risk Management Benchmarking Survey 2014
FERMA Risk Management Benchmarking Survey 2014
 
Driving higher performance from Google AdWords by applying Behavioural Economics
Driving higher performance from Google AdWords by applying Behavioural EconomicsDriving higher performance from Google AdWords by applying Behavioural Economics
Driving higher performance from Google AdWords by applying Behavioural Economics
 
The Power of Cognitive Interviewing... and what qualitative research can lear...
The Power of Cognitive Interviewing... and what qualitative research can lear...The Power of Cognitive Interviewing... and what qualitative research can lear...
The Power of Cognitive Interviewing... and what qualitative research can lear...
 
Tom ewing behavioural economics - 2012
Tom ewing   behavioural economics - 2012Tom ewing   behavioural economics - 2012
Tom ewing behavioural economics - 2012
 
Operationalizing Safety II - Resilience Learning Network - January 10, 2013
Operationalizing Safety II - Resilience Learning Network - January 10, 2013Operationalizing Safety II - Resilience Learning Network - January 10, 2013
Operationalizing Safety II - Resilience Learning Network - January 10, 2013
 

Similar to Cyber Resilience

Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesMary Rayme
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017SurfWatch Labs
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kkajairo
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 

Similar to Cyber Resilience (20)

Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Preventing Cybercrime in Libraries
Preventing Cybercrime in LibrariesPreventing Cybercrime in Libraries
Preventing Cybercrime in Libraries
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
kevin's powerpoint chapt 6
kevin's powerpoint chapt 6kevin's powerpoint chapt 6
kevin's powerpoint chapt 6
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
Cyber security
Cyber securityCyber security
Cyber security
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Hacking
Hacking Hacking
Hacking
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

More from Ian-Edward Stafrace

The Core Competencies of a Professional Risk Manager
The Core Competencies of a Professional Risk ManagerThe Core Competencies of a Professional Risk Manager
The Core Competencies of a Professional Risk ManagerIan-Edward Stafrace
 
Reasons to attend FERMA Risk Magament Forum 2017
Reasons to attend FERMA Risk Magament Forum 2017Reasons to attend FERMA Risk Magament Forum 2017
Reasons to attend FERMA Risk Magament Forum 2017Ian-Edward Stafrace
 
Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...Ian-Edward Stafrace
 
15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...
15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...
15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...Ian-Edward Stafrace
 
Risk and Internal Audit Synergies
Risk and Internal Audit SynergiesRisk and Internal Audit Synergies
Risk and Internal Audit SynergiesIan-Edward Stafrace
 
EU Insurance Protected Cells - Captives on a Budget
EU Insurance Protected Cells - Captives on a BudgetEU Insurance Protected Cells - Captives on a Budget
EU Insurance Protected Cells - Captives on a BudgetIan-Edward Stafrace
 

More from Ian-Edward Stafrace (8)

The Core Competencies of a Professional Risk Manager
The Core Competencies of a Professional Risk ManagerThe Core Competencies of a Professional Risk Manager
The Core Competencies of a Professional Risk Manager
 
Reasons to attend FERMA Risk Magament Forum 2017
Reasons to attend FERMA Risk Magament Forum 2017Reasons to attend FERMA Risk Magament Forum 2017
Reasons to attend FERMA Risk Magament Forum 2017
 
Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...Improving risk-return and resilience through Enterprise Risk Management — Jul...
Improving risk-return and resilience through Enterprise Risk Management — Jul...
 
15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...
15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...
15 March 2017 Half Day Seminar - Obtaining More Value From Risk & Actuarial F...
 
Risk and Internal Audit Synergies
Risk and Internal Audit SynergiesRisk and Internal Audit Synergies
Risk and Internal Audit Synergies
 
EU Insurance Protected Cells - Captives on a Budget
EU Insurance Protected Cells - Captives on a BudgetEU Insurance Protected Cells - Captives on a Budget
EU Insurance Protected Cells - Captives on a Budget
 
Risk Culture
Risk CultureRisk Culture
Risk Culture
 
Behavioural Economics Overview
Behavioural Economics OverviewBehavioural Economics Overview
Behavioural Economics Overview
 

Recently uploaded

Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 

Recently uploaded (20)

Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 

Cyber Resilience

  • 1. Cyber Resilience Malta Association of Risk Management (MARM) Donald Tabone 24 June 2013
  • 2. Agenda 1 Where are we coming from? 2 Cybercrime and threat actors 3 What the stats say 4 Who‟s being targeted? 5 Cause for concern? 6 Cyber resilience defined 7 A six-point plan to becoming resilient 1
  • 3. Where are we coming from? The foundations • ‟62 J.C. R. Licklider introduced the idea of an „Intergalactic Network‟ • „76 Dr. Robert Metcalfe invented Ethernet, coaxial cables • „78 Gary Thuerek – first spam email sent to 400 users of ARPANET • „84 Dr. Jon Postel described his idea for .com, .org, .gov etc. In a series of papers published by the IETF • „89 The World was the first ISP to offer commercial dial up internet • ‟92 The Corporation for Education and Research Network (CREN) released the world wide web The beginning of eCommerce • „94 Pizza hut offered online ordering through their website • „95 Pierre Omidyar released AuctionWeb which later became eBay • „96 Hotmail was launched. The following year Microsoft bought it out for $400m • „98 Google received funding to become Google Technology Incorporated. • „99 The Internet consisted of 19.5m hosts and over 1m websites 2
  • 4. Where are we coming from? The Dot-com bubble • „00 The Dot-com bubble burst • „03 Apple launched the iTunes store with 200,000 songs • „03 The hacktivisit group Anonymous was born • „04 Google launched Gmail with 1Gb of storage • ‟05 YouTube is launched. The following year Google bought it out for $1.6b • „06 Twitter and Facebook came around • „06 There are an estimated 92m websites online 40 years from its inception • ‟09 Mobile data traffic exceeds voice traffic every single month • „09 Cloud-based file hosting from the likes of Dropbox came around • „10 Facebook announces it reached 400m active members • „10 Syria and China attempt to control Internet access • „10 The Wikileaks drama ensues whilst Anonymous conduct several cyber attacks on government, religious and corporate websites • „11 Interest in virtualisation and cloud computing reach their highest peak • „13 The interest in BYOD and Big Data has reached a new high 3
  • 5. Opportunity for crime www Cybercrime & Cyber criminals Our dependence As a result, we face new challenges related to.. • Our online privacy, • The confidentiality and integrity of the data we entrust to online entities, and • Our ability to conduct business on the net through the use of ecommerce web applications Because of the nature of how the net works, accountability is also a challenge! 4
  • 6. Threat actors..1 Organised Crime • Traditionally based in former Soviet Republics (Russia, Belarus, Ukraine) • Common attacks: Theft of PII for resale and misuse or resources for hosting of illicit material • Occasionally employ blackmail in terms of availability (Threats of denial of service attacks to companies and threats of exposing individuals to embarrassment) 5
  • 7. Threat actors..2 State Sponsored • Nations where commercial and state interests are very aligned • Military or Intelligence assets deployed in commercial environments • Limitless resources? • Main aim to achieve competitive advantage for business • Theft of commercial secrets (Bid information, M&A details) 6
  • 9. Hacktivism Will attack companies, organizations and individuals who are seen as being unethical or not doing the right thing Hacking for fun… seriously! Entire nations can be taken down (Estonia) 8
  • 10. Stolen information • 18.5m people have been affected by PC theft • 75% of data loss incidents in Retail were attributed to Hacking • 96% of data loss incidents in Media were attributed to Hacking Source: 2012 KPMG Data Loss Barometer 9
  • 11. 2012 KPMG cybercrime survey Source: KPMG A nuanced perspective on cybercrime, shifting viewpoints – call for action. The results were based on over 170 responses from CIOs/CISOs or professionals in related professions in the Netherlands. 10
  • 12. 3 Common Attacks Traditional crime, redefined? Network based attacks Spear phishing attacks Human based attacks • Identify a target website • Conduct network reconnaissance / mapping • Engage in DDoS attacks to deny accessibility • The result is direct loss of business • Identify a target individual • Build a profile / biography • Directly target with a personal email • Trick user into accessing a malicious website • Implant malware and gain control of a device • Use a compromised machine to obtain otherwise confidential information • Human error incidents • Inside users become the target as they are often trusted users • Scorned / disgruntled employees The reality is that cyber attackers and organised crime perpetuators often use a combination of attack avenues to profile a target and map out their internal systems – the information is readily available! Competitive edge is eroded Organisation secrets are stolen Corporate reputations are damaged Source: 2012 KPMG Cyber Vulnerability Index 11
  • 13. Who are they targeting? Increased attack sophistication Inappropriate business response = UNCERTAINITY One study* conducted in the UK showed that small businesses suffer an estimated loss of £800m a year, averaging nearly £4000 per business • 30% of its members were victims of fraud as a result of virus infections • 50% hit by malware • 8% victims of hacking • 5% suffered security breaches As a consequence, a second recent cybercrime study** revealed that • 53% of the British public is worried about the damage of cyber attacks • 40% feel more vulnerable to cyber attacks now than a year ago • 38% feel that their personal data exchanged with organisations they do business with may already have been compromised Sources: * The study was carried out by the Federation of Small Businesses in the UK and is based on its 20000 members, http://www.fsb.org.uk/News.aspx?loc=pressroom&rec=8083, accessed 12/6/2013 ** The study was conducted by PollOne in April 2013 for Tripwire on 1000 users, http://www.tripwire.com/company/research/survey-half-uk-population-worried-about-nation-state-cyber-attacks/, accessed 12/6/2013 12
  • 14. In the US The unverified losses that victims claimed in 2012 jumped 8.3% from $485m the previous year Losses Complaints Sources: SC Magazine and Internet Crime Complaint Center 13
  • 15. Meanwhile in a non-descript building … … just outside of Shanghai, “Unit 61398” of the Peoples Liberation Army is the alleged source of Chinese hacking attacks… Source: Businessweek.com … although the Chinese government consistently denies its involvement in such activities claiming that such allegations are “irresponsible and unprofessional” Why should you be concerned? Source: Hello, Unit 61398, The Economist. 19 February 2013, accessed 13/06/2013 14
  • 16. Convictions? The fight against cybercrime seems to be ongoing 41 MONTHS • Romanian hacker Cezar Butu – 21 months in prison for compromising systems credit card processing • Darnell Albert-El, 53 – 27 months in prison for hacking • Steven Kim, 40 – 12 months in prison for stealing personal data • Bruce Raisley, 48 – 24 months in prison for creating a botnet virus to launch DDoS atacks • Shawn Reilly, 34 – 33 months in prison for committing 84 fraudulent wire transfers • Eduard Arakelyan, 21 and Arman Vardanyan, 23 – 36 months in prison for theft of credit card Why should you be concerned? information and committed bank fraud • Sonya Martin, 45 – 30 months in prison for being part of a gang to evade encryption Sources: ValueWork, Help Net Security, SC Magazine 15
  • 17. Next generation cybercrime threat? What if hackers hijacked a key satellite? Could space be cybercrime's new frontier? FACT #1 We have an overwhelming reliance on space technology for vital streams of information FACT #2 Satellites are frightfully vulnerable to collisions and there are over 5500 redundant ones at the moment ! Makes us acutely vulnerable! Source: The Independent, Space : the new cybercrime frontier, http://www.independent.co.uk/life-style/gadgets-and-tech/news/space-the-new-cyber-crime-frontier8194801.html accessed 16/2/2013 16
  • 18. Juggling the risks Examine threats Determine the risk level Risk Assessment AIM: reduce organisational risk Risk Assumption Risk Alleviation Risk Avoidance Risk Limitation Risk Planning Risk Transference • With appropriate due diligence, management accept the potential risk and continue operating • Management approve the implementation of controls to lower risk to an acceptable level • Eliminate the process that could cause the risks • Management limit the risk exposure by putting controls to limit the impact of a threat • A process to manage risk by developing an architecture that prioritises, implements and maintains controls • Management transfer the risk by using other options to compensate for a loss – e.g. Purchasing an insurance policy 17
  • 19. Risk Transference Bespoke insurance products providing tailor made policies targeting key professional liability exposures for technology companies 18
  • 20. Becoming resilient – a six point action plan Cyber Resilience “ The ability of a system or a domain to withstand attacks or failures and in such events to re-establish itself quickly ” – Nigel Inkster, International Institute of Strategic Studies 1. Organizational Readiness 2. Situational awareness 3. Cyber defence 4. Detection 5. Mitigation and containment 6. Recovery 19
  • 21. #1 - Organisational Readiness Corporate awareness Ownership at the C-level Assign the role and responsibility for information security oversight Understand your business risks Focus on your information and reputation Share intelligence and experiences 20
  • 22. #2 - Situational intelligence Hacking for fame & glory Cybercrime moved into monetisation Disruption Criminal gangs Protest hacktivism Corporate espionage Anonymous & Lulzsec target corporate infrastructures Specialist knowledge Know your information assets Keep abreast of the latest advanced threats Classify your information assets “ One of the problems is that we all tend to be technology professionals weathered by our experiences rather than looking at new ways of managing risk and gaining or using new sources of intelligence ” - Pat Brady, Information Security Manager, National Australia Group 21
  • 23. #3 – Cyber defence Get a grip on infrastructure and access security Assert the levels of staff awareness Define strict access control and remote access control Ensure strong visitor procedures for key buildings Keep your basic security controls in sight e.g. Password change policy Infrastructure changes should trigger network configuration changes allowing you to move the shape of the target 22
  • 24. #4 – Detection Develop the ability to detect attacks Ensure you have an effective internal & external monitoring process Scan outbound messages for abnormal volumes and patterns Early recognition of a compromise is key to early reaction 23
  • 25. #5 – Mitigation and containment The aim is to limit the damage to your services and reputation Continuity of Operations Plan Limit the impact / shutdown the source Disaster Recovery Plan Being prepared is the key IT / Network Contingency Plans Contingency planning – define and review your plans Crisis Communication Plan Ensure adequate testing of business continuity plans Prepared PR statements Cyber Incident Plan Occupant Emergency Plan 24
  • 26. #6 – Recovery You need to develop the ability to re-establish normal service  Your survival as a business depends on it Apply the lessons learnt Give feedback to senior executives Here’s what happened to us This is how we reacted This is what we’ve done to mitigate / prevent it 25
  • 27. Conclusions Some final thoughts.. • The cyber crime threat is actual and here to stay • It’s NOT a question of IF but WHEN IT Service Continuity Management functions Business Continuity • Be prepared for incidents • Ensure security awareness between departments Cyber Resiliency • Protect your information assets, regardless of where are being held • Ensure adequate crisis management between departments Awareness • Align individual goals with the organisations‟ cyber security ambitions Knowledge • Cyber risk teams need to consist of flexible people who can build relationships across departments • Take a pragmatic approach to investing in your defences – overinvesting is a real danger Controls Detection Mitigation Recovery BEING PROACTIVE IS THE NAME OF THE GAME 26
  • 28. References Andrew Auernheimer, http://en.wikipedia.org/wiki/Weev Bandit Country, Amir Singh, Chartech March/April 2013 Cyber Crime Study Reveals Uncertainty, http://www.tripwire.com/state-of-security/it-security-data-protection/cyber-security/viewpoints-oncyber-crime-reveal-uncertainty/ Eight cyber crooks who got less prison time than Andrew Auernheimer, http://www.scmagazine.com/here-are-eight-cyber-crooks-who-gotless-prison-time-than-andrew-auernheimer/article/284928/ KPMG data loss barometer 2012, http://www.kpmg.com/uk/en/services/advisory/risk-consulting/pages/data-loss-barometer-2012.aspx KPMG seven ways to beat cyber crime, http://www.kpmg.com/UK/en/IssuesAndInsights/ArticlesPublications/Documents/PDF/Advisory/seven-ways-beat-cyber-crime-nov2012.pdf KPMG shifting viewpoints - A nuanced perspective on cybercrime, http://www.kpmg.com/NL/en/Issues-AndInsights/ArticlesPublications/Pages/Shifting-viewpoints.aspx Microsoft and FBI disrupt global cybercrime ring, http://www.net-security.org/malware_news.php?id=2511 Most small businesses can't restore all data after a cyber attack, http://www.net-security.org/secworld.php?id=15012 Operation cyber taskforce, Gerry O’Neill, Chartech March/April 2013 Space: the new cyber crime frontier, http://www.independent.co.uk/life-style/gadgets-and-tech/news/space-the-new-cyber-crime-frontier8194801.html The cost of cybercrime, http://securityaffairs.co/wordpress/14628/cyber-crime/cost-of-cybercrime-for-uk-small-businesses.html 27
  • 29. Thank you! Donald Tabone B.Sc. (Hons), LL.M. (Strath)  donaldtabone@kpmg.com.mt