Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast.

Slides:



Advertisements
Similar presentations
James D. Brown Chief Engineer and Senior Fellow Information Resource Management L-3 Communications.
Advertisements

The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Cyberspace - A Global Battlespace? Joel Ebrahimi Solutions Architect Bivio Networks, Inc.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Brian Connett, LCDR, USN US NAVAL ACADEMY
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Property of Argo Pacific Pty Ltd Cyber Security Threats Dr Paul Twomey The Lowy Institute for International Policy 8 September
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
South Carolina Cyber.
Cyber Capabilities Example IT 298 / Bohman January 6 th, 2014.
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Telstra in Confidence Managing Security for our Mobile Technology.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
MIS 213 Spring Why are we talking it?  It’s a major problemproblem  What do you think of?
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
MAP-IT! Review Meeting 5 March Brussels Intermediate results Palestinian Authority INNOVA.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
Cyber Threats Scenarios and Defense Model Principles ASSOCHAM Cyber Security Conference April 2011 Presented by Dr. Nimrod Kozlovski, Chairman,
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Information Warfare Playgrounds to Battlegrounds.
Cyber Warfare Case Study: Estonia
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Information Warfare Playgrounds to Battlegrounds.
1 An initiative developed in the framework of the START project supported by the European Commission (DG InfSo) START IST SSA.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
TÜBİTAK – BİLGEM – SGE Cyber Security Institute Asım Gençer Gökce TÜBİTAK BİLGEM Cyber Security Institute (SGE) Role: Cyber.
CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Surveillance and Security Systems Cyber Security Integration.
Calgary Computer Security Solutions
General information Targeted topics
Présentation des compétences
Nation State Actors Lex Dunlap.
ALEX RUNNER Jason Rosselot Sedar labarre Will Farrell Johnson Controls
Liberty International Underwriters
Public Facilities and Cyber Security
Cyber Security: State of the Nation
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cyber defense management
Information Security at Florida State University
Network Intrusion Responder Program
Strategic Partnerships to Increase Student and Faculty Opportunities
Information Security at Florida State University
Information Security at Florida State University
PGE Chris Nolke, Director of Cybersecurity
The Global Challenges of Cybersecurity and Digital Terrorism
NERC Cyber Security Standard
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
Dominic DeSoto, Jay Jackson IA 455 Oct. 23, 2017
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
IoT in Healthcare: Life or Death
Presentation transcript:

Preparing for a Cyber Attack By Jeffrey Carr CEO and Founder, GreyLogic.us Author, "Inside Cyber Warfare" (O'Reilly Media, 2009) O'Reilly Gov 2.0 Webcast April 29, 2010

Cyber Landscape Source: DHS, "Securing the Nation’s Critical Cyber Infrastructure

Threat Vectors Computer network attacks Cyber espionage Cyber terrorism Cyber crime Network infiltration of Critical Infrastructure Repression of Internal Opposition Groups Hybrid warfare Information warfare

Actors State State-Sponsored Non-State

State Actors Definition: Nation States who engage in one or more types of cyber operations Russian FederationKyrgyzstan UkraineEstonia GeorgiaIngushetia Peoples Republic of China Taiwan IsraelIran Palestinian National Authority (Hamas) Myanmar (Burma) U.S.Turkey PakistanGermany ZimbabweAustralia

State-Sponsored Actors Definition: Non-state actors who are engaged by States to perform one or more types of cyber operations. Partial list of States known to or suspected of sponsoring Actors Russian Federation Peoples Republic of China Turkey Iran United States Myanmar Israel

Non-State Actors Definition: Non-state actors who engage in cyber crime and/or patriotic hacking (aka hacktivists) Too numerous too list

Cyber Self Defense You cannot protect all your data You cannot stop every attack Therefore, 1) Reduce your attack surface 2) Segregrate and protect your critical data 3) Establish access norms and monitor for anomalies 4) When you are attacked, report it. Transparency = Security

R&D Priorities: RF, PRC Russian FederationPeoples Republic of China NanoelectronicsCore electronic components Cloud computingHigh end generic chips Cognitive systems and robotics Extra large scale integrated chips Digital librariesNext gen wireless mobile comms ICT for patient safety,Large scale oil, gas, and coal mining Semiconductor components and miniaturization systems Water pollution control and treatment Photonics

Contact Jeffrey Carr Blog: Website: Skype: greylogic

Extra Slides

Initiate an Active Defense Posture Source: Verdasys Enterprise Information Protection

Data Exfiltration Operation Source: Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation (2009, p. 61)