Presentation is loading. Please wait.

Presentation is loading. Please wait.

Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Similar presentations


Presentation on theme: "Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast."— Presentation transcript:

1 Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast April 29, 2010

2 Cyber Landscape Source: DHS, "Securing the Nation’s Critical Cyber Infrastructure

3 Threat Vectors Computer network attacks Cyber espionage Cyber terrorism Cyber crime Network infiltration of Critical Infrastructure Repression of Internal Opposition Groups Hybrid warfare Information warfare

4 Actors State State-Sponsored Non-State

5 State Actors Definition: Nation States who engage in one or more types of cyber operations Russian FederationKyrgyzstan UkraineEstonia GeorgiaIngushetia Peoples Republic of China Taiwan IsraelIran Palestinian National Authority (Hamas) Myanmar (Burma) U.S.Turkey PakistanGermany ZimbabweAustralia

6 State-Sponsored Actors Definition: Non-state actors who are engaged by States to perform one or more types of cyber operations. Partial list of States known to or suspected of sponsoring Actors Russian Federation Peoples Republic of China Turkey Iran United States Myanmar Israel

7 Non-State Actors Definition: Non-state actors who engage in cyber crime and/or patriotic hacking (aka hacktivists) Too numerous too list

8 Cyber Self Defense You cannot protect all your data You cannot stop every attack Therefore, 1) Reduce your attack surface 2) Segregrate and protect your critical data 3) Establish access norms and monitor for anomalies 4) When you are attacked, report it. Transparency = Security

9 R&D Priorities: RF, PRC Russian FederationPeoples Republic of China NanoelectronicsCore electronic components Cloud computingHigh end generic chips Cognitive systems and robotics Extra large scale integrated chips Digital librariesNext gen wireless mobile comms ICT for patient safety,Large scale oil, gas, and coal mining Semiconductor components and miniaturization systems Water pollution control and treatment Photonics

10 Contact Jeffrey Carr Blog: http://IntelFusion.net Website: http://Greylogic.us Skype: greylogic Email: jeffreyc@greylogic.us

11 Extra Slides

12 Initiate an Active Defense Posture Source: Verdasys Enterprise Information Protection

13 Data Exfiltration Operation Source: Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (2009, p. 61)


Download ppt "Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast."

Similar presentations


Ads by Google