+ All Categories
Home > Technology > Countering the Cyber Threat

Countering the Cyber Threat

Date post: 22-Nov-2014
Category:
Upload: ollie-whitehouse
View: 206 times
Download: 2 times
Share this document with a friend
Description:
A presentation providing a high-level overview of the problems that organizations face with regards to cyber security and the available options to the,
26
Countering the cyber threat Ollie Whitehouse, Technical Director, NCC Group
Transcript
Page 1: Countering the Cyber Threat

Countering the cyber threatOllie Whitehouse, Technical Director, NCC Group

Page 2: Countering the Cyber Threat

Before we begin… What is NCC Group?

• £110 million revenue FTSE company• Cyber Security Assurance Practice• 180 UK technical assurance consultants

o applied research o technical security assessmentso cyber forensics incident responseo 50 UK risk/audit consultantso 90 US technical assurance consultants

• Escrow & Software Assurance = sister business units

Page 3: Countering the Cyber Threat

Before we begin…

Page 4: Countering the Cyber Threat

Offence v Defense

Page 5: Countering the Cyber Threat

Offence: demonstrating exposure

Page 6: Countering the Cyber Threat

Defense:defense in depth

Page 7: Countering the Cyber Threat

Defense

Page 8: Countering the Cyber Threat

Defense: Training

• Executive

• Risk & Security Teams

• Technical Teams

• General Staff Population

Page 9: Countering the Cyber Threat

Defense: Governance

• Accountability

• Visibility

• Validation

All within the organisations Cyber & Information security framework

Page 10: Countering the Cyber Threat

Defense: Risk Management

• Business

• Technology

• Compliance

Page 11: Countering the Cyber Threat

Defense: Compliance

• Ethical

• Regulatory

• Legal

• Other…

Page 12: Countering the Cyber Threat

Defense: Counter Measures & Controls

Page 13: Countering the Cyber Threat

Defense: Monitoring & Incident Response

• It will happen

• Have processes & procedures in place

• Have ability to detect and investigate

• Have the skill sets and capability

• Perform fire drilling

Page 14: Countering the Cyber Threat

Offence

Page 15: Countering the Cyber Threat

Offense: Penetration Testing

• Reconnaissance

• Mapping

• Identity vulnerabilities (VA)

• Exploit (Penetrate)

• Trust relationships (Lateral)

Page 16: Countering the Cyber Threat

Offense: Social Engineering

• Appear legitimate

• Goalso Gain somethingo Instruct or convince

• Examples:o Credentialso Building entry

Page 17: Countering the Cyber Threat

Offence: Phishing Simulation• Example of social engineering

o Click this linko Click this link & supply credentialso Open this attachmento Supply this information

• Can be used too Gain informationo Exploit computer systems

Page 18: Countering the Cyber Threat

Offence: Open Source Intelligence Profiling

• Company or people

• Direct information

• Information to facilitate other attacks

• Documents, technologies, hobbies, conferences, attendees

Page 19: Countering the Cyber Threat

Offence: Red Teaming

• Blended attacks• Physical, Social & Cyber

• Emulates motivated external threat actor

• Does not emulate motivated internalemployee

Page 20: Countering the Cyber Threat

Offence: APT Simulation• Blended attacks

• Social and Cyber

• Emulates organised crime & nation state threat actors• Inbound attacks & staff training• Lateral movement & exfiltration• Persistence

• Assess defences, detection & response

Page 21: Countering the Cyber Threat

There is always more…

Page 22: Countering the Cyber Threat

Standards

• Cyber Essentials

• Cyber Essentials+

• ISO:27001

• Etc…

Page 23: Countering the Cyber Threat

More…

• Supply chain security

• Security Development Life-Cycle

• Home infection leading to corporate compromise

Page 24: Countering the Cyber Threat

Summary..• Cyber security is a complex problem

• It’s a business, human & technology problem

• Visibility & understanding at the executive level has historically been weak

• It should always be proportional

Page 25: Countering the Cyber Threat

Final thought

Page 26: Countering the Cyber Threat

EuropeManchester - Head Office

Cheltenham

Edinburgh

Leatherhead

London

Milton Keynes

Amsterdam

Copenhagen

Munich

Zurich

North AmericaAtlanta

Austin

Chicago

Mountain View

New York

San Francisco

Seattle

AustraliaSydney

ThanksAny Questions?

Ollie [email protected]


Recommended