Threat context TLP WHITE Cyber security panel

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Overview An emerging challenge A belated response Debating the alternatives – Air-Sea Battle – A distant blockade – Maritime denial Conclusions.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
PAGE 1 | Gradient colors RGBRGB Diagrams RGBRGB RGBRGB 166.
Who Is Attacking You? Distinguishing Motivation to Prioritize Threats John Hultquist Senior Manager, Cyber Espionage Threat Intelligence iSIGHT Partners.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Dark Reading Threat Intelligence Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
COMPLEXITY AND CYBER DEFENSE TTI/VANGUARD TAMING COMPLEXITY October 5, 2011 Michael A. Wertheimer, DoD.
ISSA QUARTER MEETING 2015 David Eilken Co-Chair FS-ISAC Security Automation Working Group Intelligence Driven Community Defense.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Ch 3 -1 External Strategic Management Audit – Environmental Scanning – Industry Analysis.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Maritime Cyber Risks – What is real, what is fiction?
PUBLIC PRIVATE DEFENCE INDUSTRY COLLABORATION TO MEET MARITIME SECURITY CHALLENGES By Dr. M. Amir Yousuf GM (Tech) Maritime Technologies Complex (MTC)
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Red-DragonRising.com©. Red-DragonRising.com© Red-DragonRising.com©
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
 Article  Article Idea  Article Purpose  The main Points  Conclusion  Comment.
Cyber Warfare Case Study: Estonia
Cyber Security Nevada Businesses Overview June, 2014.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
THE THREAT LANDSCAPE FROM CYBERCRIME TO CYBER-WAR David Emm Global Research and Analysis Team.
Information Warfare Midterm Overview. Lectures Covered Everything until (including) March 2 nd Reading: – All lecture slides – Denning book: Chapters.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
CJ416 Eric Salvador. Housekeeping Lets finish strong in Unit 9 discussions Alternative seminars Final submission of work – Tues. May 29 th at midnight.
Unit 9.  Lets finish strong in Unit 9 discussions  Alternative seminars  Final submission of work – Tuesday, October 9 th at midnight.
Ali Alhamdan, PhD National Information Center Ministry of Interior
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Information Warfare Playgrounds to Battlegrounds.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Security Mindset Lesson Introduction Why is cyber security important?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
How to Make Cyber Threat Intelligence Actionable
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Why SIEM – Why Security Intelligence??
Deloitte-LBG UK screen 4:3 (19.05 cm x cm) © 2013 Deloitte LLP. Private and confidential. Cyber Security. Evolved. Building Resilience 29th May 2013.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Edison Electric Institute Cybersecurity 101 October 24,
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
What, when and how – are you prepared?
Proactive Incident Response
Cybersecurity as a Business Differentiator
Cyber Security: State of the Nation
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
Cyber Threat Intelligence Sharing Standards-based Repository
بهترین راهکار را انتخاب کنید...
Cyber Threat Simulation
Four Generations of Security Devices Putting IDS in Context
Mr. Mario Beccia – Cyber Defence Project Officer November 2018
A.P.T. wehackpeople.com.
Strategic threat assessment
Cyber Security Accelerator for trusted SMEs IT Ecosystems
LAZARUS | GLOBAL kOS | MAFIABOY
Security Trends and Threats Affecting Innovations in Technology
Presentation transcript:

Threat context TLP WHITE www.soltra.com Cyber security panel SOLTRA | an FS-ISAC DTCC Company

External Threats Growing 117,339 incoming attacks every day The total number of security incidents detected by respondents climbed to 42.8 million this year, an increase of 48% over 2013. Findings from The Global State of Information Security Survey 2015 Graphic Source: PwC TLP WHITE

Evolution of Cyber Attacks Cyber Threats on the Private Sector Fun Technically curious individuals Fame Technically adept groups leaving their mark on public websites Fortune Cyber criminals and organized gangs stealing money, data ransom schemes and competitive information Force Nation states and non-nation state groups launching targeted attacks for strategic purposes 2001 2010 1988 2004 Academic “Script Kiddies” Commodity Threats Nature of Threat Advanced Persistent Threats (APT) – Targeting government entities APT– Targeting private sector TLP WHITE SOLTRA | An FS-ISAC DTCC Company

Who Are the Adversaries? August 2014 Attacker Motivation, Capability & Intent Criminals Money And more money Large number of groups Skills from basic to advanced Present in virtually every country Up to $$$ Hacktivists Protest Revenge Groups tend to have basic skills with a few 'standout' individuals with advanced technical and motivational skills" Up to $ -$$ Espionage Acquiring Secrets for national security or economic benefit Small but growing number of countries with capability Larger array of ‘supported’ or ‘tolerated’ groups Up to $$$$+ War Motivation is to destroy, degrade, or deny capabilities of an adversary Politics by other means Non-state actors may utilize ‘war’ like approaches Up to $$$$$ ? …but, a lot less expensive than a nuclear weapon $ - Under thousands $$ - Tens to hundreds of thousands $$$ - Millions $$$$ - Tens to hundreds of millions $$$$$ - Billions TLP WHITE SOLTRA | An FS-ISAC DTCC Company

The Need for Speed TLP WHITE Attackers have honed their skills to come at you rapidly Defenders take a long time to feel the impact of an attack Attackers Act 150x Faster Than Victims Respond Minutes vs. Weeks/ Months Seconds Minutes Hours Days Weeks Months Initial Attack to Initial Compromise (Shorter Time Worse) 10% 75% 12% 2% 0% 1% Initial Compromise to Data Exfiltration (Shorter Time Worse) 8% 38% 14% 25% 8% 8% Initial Compromise to Discovery (Longer Time Worse) 0% 0% 2% 13% 29% 54% TLP WHITE SOLTRA | An FS-ISAC DTCC Company

Changing the Economics Cost to Firms  The current cost to process a single piece of intelligence is 7 hours. Equal to 2014 =$100m; 2015 = $1b; 2016 = $4b Cost to Adversaries  Adversaries must “re-tool” much more often and their exploits cause less damage Risks from Cyber Threats  Frequency and impact of threats decrease while higher adoption leads to exponential benefits Advantage: Attackers Advantage: Defenders Cost to Defend Max Policy Effectiveness Current State of Cyber-Symmetry (Unsophisticated Adversaries Can Play) Future State of Cyber-Symmetry (Only Most Advanced Can Play) Cost Cost to Attack Min Cyber Warfare Symmetry SOLTRA | An FS-ISAC DTCC Company