David J. Carter, CISO Commonwealth Office of Technology

Slides:



Advertisements
Similar presentations
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Advertisements

7 Effective Habits when using the Internet Philip O’Kane 1.
Cybercrime: From Kudos to Profit Gerhard Eschelbeck, CTO Sophos.
David A. Brown Chief Information Security Officer State of Ohio
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
TARGETED ATTACKS AND THE SMALL BUSINESS Stephen Ferrero Consultant, Xantrion.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Introduction to Computer Ethics
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Topic 5: Basic Security.
Computer Security By Duncan Hall.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Understanding and breaking the cyber kill chain
WannaCry/WannaCrypt Ransomware
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
WannaCry/WannaCrypt Ransomware
Edexcel GCSE Cyber security threats Computer Science 1CP1
3.6 Fundamentals of cyber security
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Cybersecurity - What’s Next? June 2017
Lessons Learned in Managing IT Risk
Network Security Fundamentals
EITAC Cybersecurity program and IT Security updates
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
UNIVERSITY Common Cyber Security Myths An Update on Cyber Security.
Forensics Week 11.
Jon Peppler, Menlo Security Channels
Teaching Computing to GCSE
Cybersecurity Awareness
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
Robert Leonard Information Security Manager Hamilton
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Malware, Phishing and Network Policies
Home Internet Vulnerabilities
Cybersecurity Am I concerned?
Information Systems for Health:
Keeping your data, money & reputation safe
Computer Security.
Anatomy of a Large Scale Attack
Security Hardening through Awareness August 2018
Bethesda Cybersecurity Club
How to keep the bad guys out and your data safe
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
Cybersecurity Threat Assessment
Tom Murphy Chief Information Security Officer
Information Security – Sep 18
Chapter # 3 COMPUTER AND INTERNET CRIME
Cybersecurity and Cyberhygiene
Stop Ignoring the Problem
Unit 1.6 Systems security Lesson 1
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
IP Addresses & Ports IP Addresses – identify a device on a network
Cybersecurity Simplified: Phishing
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
Presentation transcript:

David J. Carter, CISO Commonwealth Office of Technology Cybersecurity Trends David J. Carter, CISO Commonwealth Office of Technology

The Information Technology Security Evolution We are no longer in the business of just looking for bad things, we need to look for good things behaving badly.

The Information Technology Security Evolution The Top Challenges Faced In IT Security Social Engineering Complex Systems Customer Expectations Mobile Workforce Commercialization

EMERGING THREATS Social Engineering Tricking users in to providing information, access, or credentials using fear, curiosity, passions or other manipulation. Malicious Code Injecting code in to a system that can cause ill effects such as a virus, keylogger, backdoor, or other threat. Vulnerability Exploitation Taking advantage of system weaknesses or misconfigurations to gain access to data or otherwise compromise a system.

Social Engineering Phishing

Social Engineering SPEAR Phishing Social Media Corporate Site Professional Profiles Public Information

Social Engineering – The RISKS Stolen Credentials Bad actors will use social engineering to steal credentials through phishing to gain access to your systems and send more emails. Even the most alert user can fall for these official looking threats. Malicious Code Bad actors will use these campaigns to plant malicious code in your systems that can lead to data loss or operational impact. This may be through attachments or links in the emails they send.

Social Engineering – The DEFENSE Your People

Social Engineering – The DEFENSE Some Examples

Social Engineering – The DEFENSE Some Examples

Social Engineering – The DEFENSE Some Examples

Malicious Code HoW Does It Get In?

MALWARE – The RISKS Stolen Information Some Malware will steal your information to be sent out to an awaiting hacker on the Internet. Information and System Integrity Some Malware, also known as Ransomware, will encrypt your data and ask that you pay a ransom to get it back. Others will attempt to impact operations such as interfering with control systems. System Access Some Malware will establish what is known as persistence, meaning that it will establish a back door that the hacker can use at will.

MALWARE – The DEFENSE Keep Protections Current Ensure anti-virus and anti-malware protection software is up to date and current on all of your systems. System Patching Ensure that all of your systems are on the current patch releases and most current supported versions of software. Educate Users Ensure that your users are made aware of the risks and code of conduct when using your systems.

Vulnerability Exploitation

Vulnerability Exploitation

Vulnerability Exploitation – The RISKS Stolen Information A hacker can steal your information to be sent out to an awaiting hacker on the Internet. System Access A hacker can basically own your system directly and/or through that access reach in to your network to do even more harm. This is known as lateral movement.

Vulnerability Exploitation – The DEFENSE Limit Your Exposure Use your defenses and system configurations only to allow those ports and services that are really needed for your systems. System Patching Ensure that all of your systems are on the current patch releases and most current supported versions of software. Monitor and Audit Monitor and audit your systems for anomalous activity.

Layered DEFENSEs

Layered DEFENSEs

The Slide You Have Been Waiting For Questions

Contact Information David J. Carter, CISO Commonwealth Office of Technology 669 Chamberlin Ave Frankfort, KY 40601 Email: davidj.carter@ky.gov Phone: 502-564-8734