David J. Carter, CISO Commonwealth Office of Technology Cybersecurity Trends David J. Carter, CISO Commonwealth Office of Technology
The Information Technology Security Evolution We are no longer in the business of just looking for bad things, we need to look for good things behaving badly.
The Information Technology Security Evolution The Top Challenges Faced In IT Security Social Engineering Complex Systems Customer Expectations Mobile Workforce Commercialization
EMERGING THREATS Social Engineering Tricking users in to providing information, access, or credentials using fear, curiosity, passions or other manipulation. Malicious Code Injecting code in to a system that can cause ill effects such as a virus, keylogger, backdoor, or other threat. Vulnerability Exploitation Taking advantage of system weaknesses or misconfigurations to gain access to data or otherwise compromise a system.
Social Engineering Phishing
Social Engineering SPEAR Phishing Social Media Corporate Site Professional Profiles Public Information
Social Engineering – The RISKS Stolen Credentials Bad actors will use social engineering to steal credentials through phishing to gain access to your systems and send more emails. Even the most alert user can fall for these official looking threats. Malicious Code Bad actors will use these campaigns to plant malicious code in your systems that can lead to data loss or operational impact. This may be through attachments or links in the emails they send.
Social Engineering – The DEFENSE Your People
Social Engineering – The DEFENSE Some Examples
Social Engineering – The DEFENSE Some Examples
Social Engineering – The DEFENSE Some Examples
Malicious Code HoW Does It Get In?
MALWARE – The RISKS Stolen Information Some Malware will steal your information to be sent out to an awaiting hacker on the Internet. Information and System Integrity Some Malware, also known as Ransomware, will encrypt your data and ask that you pay a ransom to get it back. Others will attempt to impact operations such as interfering with control systems. System Access Some Malware will establish what is known as persistence, meaning that it will establish a back door that the hacker can use at will.
MALWARE – The DEFENSE Keep Protections Current Ensure anti-virus and anti-malware protection software is up to date and current on all of your systems. System Patching Ensure that all of your systems are on the current patch releases and most current supported versions of software. Educate Users Ensure that your users are made aware of the risks and code of conduct when using your systems.
Vulnerability Exploitation
Vulnerability Exploitation
Vulnerability Exploitation – The RISKS Stolen Information A hacker can steal your information to be sent out to an awaiting hacker on the Internet. System Access A hacker can basically own your system directly and/or through that access reach in to your network to do even more harm. This is known as lateral movement.
Vulnerability Exploitation – The DEFENSE Limit Your Exposure Use your defenses and system configurations only to allow those ports and services that are really needed for your systems. System Patching Ensure that all of your systems are on the current patch releases and most current supported versions of software. Monitor and Audit Monitor and audit your systems for anomalous activity.
Layered DEFENSEs
Layered DEFENSEs
The Slide You Have Been Waiting For Questions
Contact Information David J. Carter, CISO Commonwealth Office of Technology 669 Chamberlin Ave Frankfort, KY 40601 Email: davidj.carter@ky.gov Phone: 502-564-8734