Dissecting the Cyber Security Threat Landscape

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Security for Today’s Threat Landscape Kat Pelak 1.
OWASP Principles for GIS Data Security Keeping your GIS data secure.
Cyber-Warfare: The Future is Now!
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Securing Information Systems
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Securing Information Systems
Your Partner for Superior Cybersecurity
Cyber Security Zafar Sadik
Six Steps to Secure Access for Privileged Insiders and Vendors
Cybersecurity - What’s Next? June 2017
2016 Data Breach Investigations Report
Public Facilities and Cyber Security
Security Risk Profiles – Tips and Tricks
Active Cyber Security, OnDemand
Data Compromises: A Tax Practitioners “Nightmare”
Cybersecurity Reference Architecture
Six Steps to Secure Access for Privileged Insiders and Vendors
E-commerce Application Security
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Joe, Larry, Josh, Susan, Mary, & Ken
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
CHAPTER 4 Information Security.
Incident Detection and Response
Securing Information Systems
Jon Peppler, Menlo Security Channels
CSI Survey 2007 Tiffany Gorman
Preparing for the cyber landscape of 2020
Today’s Risk. Today’s Solutions. Cyber security and
بهترین راهکار را انتخاب کنید...
Cybersecurity Awareness
I have many checklists: how do I get started with cyber security?
Risks & Reality Cyber Security Risks & Reality
Andy Hall – Cyber & Tech INSURANCE Specialist
Company Overview & Strategy
Cyber Security in the Mortgage Industry
Strong Security for Your Weak Link:
Curating an Effective Security Culture
Real World Advanced Threat Protection
Securing the Threats of Tomorrow, Today.
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
CRITICAL INFRASTRUCTURE CYBERSECURITY
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
Faculty of Science IT Department By Raz Dara MA.
Protecting Your Company’s Most Valuable Asset
Anatomy of a Large Scale Attack
Considerations for Cybersecurity and Data Security in Today’s World
How to keep the bad guys out and your data safe
Computer Security By: Muhammed Anwar.
Tom Murphy Chief Information Security Officer
Information Protection
In the attack index…what number is your Company?
Information Protection
“Workplace Behaviour: Activating your greatest security asset”
Anatomy of a Common Cyber Attack
Presentation transcript:

Dissecting the Cyber Security Threat Landscape Chris Novak, Co-Founder & Global Director Verizon Threat Research Advisory Center, Verizon Communications INTRODUCE GENERAL ALEXANDER

State of the Union: Understanding Today's Hyper Evolving Threat Landscape Christopher Novak Director VTRAC | Investigative Response @ChrisJNovak

PLAY VIDEO HERE… @ChrisJNovak

Data Breach Investigations Report (DBIR) Lift the lid on cybercrime. 65 contributors 1,935 breaches 42,068 incidents 10th edition @ChrisJNovak

Over a Decade of Security Thought Leadership 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 Coming soon Read the DBIR 2017: VerizonEnterprise.com/DBIR2017 Read the DBD 2017: VerizonEnterprise.com/databreachdigest 2016 2017 2018 Coming soon @ChrisJNovak

Data Breach Investigations Report (DBIR) Lift the lid on cybercrime. 1,935 breaches 42,068 incidents 10th edition 65 contributors VERIS Framework www.veriscommunity.net @ChrisJNovak

Our 65 DBIR Contributing Partners

Incident classification patterns Miscellaneous Errors Privilege Misuse Physical Theft and Loss Denial of Service Crimeware Web Application Attacks 98% of incidents and 88% of breaches fall into one of the incident classification patterns. Point of Sale Intrusions Cyber-Espionage Payment Card Skimming @ChrisJNovak

DBIR - Key Highlights @ChrisJNovak

DBIR - Key Highlights @ChrisJNovak

Industry analysis & breakdown by incidents @ChrisJNovak

Threat Actor Motivation Financial Motivation Largely opportunistic attacks Organized Crime Gains/Losses in the $M’s Espionage Motivation Targeted Attacks State sponsored Gains/Losses in the $B’s FIG = Fun, Ideology, and/or Grudge Motivation @ChrisJNovak

The crooks aren’t just after the big guys. Nearly two-thirds of the data breach victims in this year’s report are businesses and government agencies with under 1,000 employees. Further emphasizing that nobody is immune to data breaches… 61% @ChrisJNovak

The basics still aren’t covered. 1 in 14 users fell for phishing. A quarter of those were duped more than once. Stolen or easily guessable passwords featured in over 50% of breaches. @ChrisJNovak

Timespan of breach events over time @ChrisJNovak

For any data you could want to buy, there is a “Darknet” site that sells it…

Focusing your defenses Single-factor authentication is compromised often, and reused as a tool for the attacker. Shift from weak authentication methods to multi-factor solutions. Malware is not going anywhere. We assume you have client- based anti-virus running, which is a start. Enrich AV with network malware detection, sandboxing technologies and application whitelisting. Most breaches are starting with a compromised user device. Limit the sensitive data stored on workstations and build a properly segmented network with strong authentication between security zones. @ChrisJNovak

Focusing your defenses Patch web browser software (and associated plugins) promptly. Know what assets you have from which to determine patching. Limit what attachments make it past your email gateway. Strip all executables and macro- enabled Office documents, at a minimum. Encrypt all mobile devices! Keep audit logs of authorized user activity and monitor them to hunt down employee misuse or account takeovers. @ChrisJNovak

What does the future hold? Breaches beyond loss / theft of sensitive data… Internet of Things (IoT) - Estimated ~50B devices by 2020 Industrial Control Systems (Phys. disruption & destruction) Medical Devices …??? @ChrisJNovak

Q&A Questions? ... Email me at chris.novak@verizon.com DBIR Download: www.VerizonEnterprise.com/DBIR Data Breach Digest Download: www.VerizonEnterprise.com/databreachdigest @ChrisJNovak

Thank you. Chris Novak chris.novak@verizon.com @ChrisJNovak

INTRODUCE GENERAL ALEXANDER