+ All Categories
Home > Documents > Cyber-Security Risk in the Global Organization · Train employees about the data risks in your...

Cyber-Security Risk in the Global Organization · Train employees about the data risks in your...

Date post: 04-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
11
1 Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management Todd Carroll Assistant Special Agent in Charge, FBI David Childers, CCEP, CIPP CEO, Compli Three Things We Know About Cyber Security 1 2 3
Transcript
Page 1: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

1

Cyber-Security Risk in the Global Organization:

Trends, Challenges and Strategies for Effective Management

Todd Carroll

Assistant Special Agent in Charge, FBI

David Childers, CCEP, CIPP

CEO, Compli

Three Things We Know About Cyber Security

1 2 3

Page 2: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

2

Helps to be a little paranoid

There is no Data Security

Page 3: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

3

There is no “patch” for stupid

Fast Cyber Security Facts:

234,000 computers worldwide infected CryptoLocker.

500 % growth in Ransomware threats.

August 2014 – Possibly 1.2 Billion user names & passwords stolen by Russian crooks. BIGGEST BREACH ON RECORD

Malware • 15 million new samples created during Q1 2014 • 160,000 new samples daily

Page 4: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

4

Fast Cyber Security Facts

• 35% of the incidents • 76% of the identities exposed

CYBER-TERRORIST WEBSITES

HACKERS

4.7 millionthe average number of identities exposed per data breach for hacking incidents was approximately Theft or loss of a device….accounted for 27% of data breach incidents

1998 Today

12 9,800

Data Breach Costs

The average time it took to detect breaches declined slightly from 2012 to 2013, from 243 to 229 days.

However, the number of firms that detected their own breaches actually dropped, from 37% to 33%.

The total number of breaches in 2013 was 62% greater than in 2012.

Eight of the breaches in 2013 exposed more than 10 million identities each. In 2012 only one breach exposed over 10 million identities.

*US Average2014 Cost of Data Breach Study: United States Benchmark research sponsored by IBM,

Independently conducted by Ponemon Institute LLC. May 2014

= $201 per record lost*

(28% increase from 2013)

Page 5: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

5

“Prevention Pays”

Prevention Plan Type

Savings Per Record

Pre-Prepared Data Breach Response $42

Strong Security Posture $34

CISO/CPO $13

XP Vulnerabilities

PROBLEM:April 8, 2014 - Microsoft stopped supporting XP

McAfee and other virus protection programs don’t work any longer

And if you think the patch fixes this problem, think again -

• MS warns not to install the Windows XP security workaround

• “It tricks Windows update into thinking that the XP version is an embedded point-of-sale OS that Redmond supports through 2019.”

• Released in 2001

• Most used business software

Page 6: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

6

Top Inhibitors to Cyber-Threat Defense

Inadequate cyber-security awareness among employees & lack of management support or awareness

Lack of budget & inability to justify investment

Lack of skilled personnel with too much data to analyze

Inadequate or poorly integrated security solutions & limited number of effective solutions on the market

Emerging Cyber-Threats

Page 7: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

7

Emerging Cyber-Threat Trends

The Internet of Things (IoT)IoT devices become the access points for targeted attackers and become bots for cybercriminals.

TARGETS: Baby Monitors, Security Cameras & Routers

• April of 2014: a man hacked an Ohio family’s baby monitor and began screaming, “WAKE UP BABY” into the monitor at midnight.

• March of 2014: hackers took control of 300,000 home routers in Europe.

UP NEXT: Smart Televisions, Automobiles & Medical Equipment

• “Red-button” attack on smart TVs – anticipate they can be hacked using a $250 transmitter.

PREDOMINANT RISK ROUTERS

• Worms like Linux.Darlloz are making a comeback.

The burden falls on

YOU

Emerging Cyber-Threat Trends

Cloud & Mobile Risks MOBILE THREATS: more sophisticated and pervasive.

• In 2013, there were 58 variants per mobile malware family

• Android is still the most widespread, and most targeted.

“1.4 million malicious and high-risk Android apps are in existence”

• Apple is improving vulnerabilities - Down 68% (Apple’s iOS7)

WI-FI INTENSIFIES SECURITY RISKS:

When your employees are working in a public place, who is listening? And what information are they potentially exposing?

What policies do you have in place to mitigate your risk?

Page 8: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

8

Emerging Cyber-Threat Trends

Ransomware Attacks grew by 500 percent in 2013.

• CryptoLocker was predominant threat; NOW it is CTB-Locker.

• CTB-Locker is a second-generation threat and much more powerful.

“Cybercriminals are adopting criminal business models developed for the PC, applying them to new areas and fine-tuning their methods.”

• 3 % of infected users historically paid the ransom

Do you have a policy in place for opening emails?

“Just Paid Cryptolocker - We got infected, found our backups did not work and we had to pay.”

“Cryptolocker SUCKS - This really is the nastiest thing on the web at the moment.”

“Ouch. This stinks - Our Controller opened the attachment, and her PC got infected. The phishing email passed through hosted email filtering.”

Actual comments from www.knowbe4.com

Where Help is Available

Atlanta

Baltimore

Birmingham

Boston

Oklahoma

Buffalo

Charlotte

Chicago

Cleveland

Dallas

Houston

Las Vegas

Los Angeles

Louisville

Miami

Minneapolis

New York/New Jersey

Orlando

Philadelphia

Phoenix

Pittsburgh

San Francisco

Seattle

South Carolina

Washington DC

U.S. Secret Service Electronic Crimes Task Forces

Page 9: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

9

Best Practices IT Guidelines for Businesses1.Employ defense-in-depth strategies.

2.Monitor for network incursion attempts, vulnerabilities, and brand use.

3.Antivirus on endpoints is not enough.

4.Secure your websites against MITM attacks and malware infection.

5.Protect your private keys.

6.Use encryption to protect sensitive data.

7.Ensure all devices allowed on networks have adequate protections.

8.Implement a removable media policy.

9.Be aggressive in your updating and patching.

10.Enforce an effective password policy.

11.Ensure regular backups are available.

12.Restrict email attachments.

13.Ensure you have infection and incident response procedures in place.

14.Educate users on basic security protocols.

Best Practice Guidelines for Businesses, Recommendations + Best Practice Guidelines, Internet Security Threat Report 2014: Volume 19, Symantec Corporation, pg 87, 2014

TOP SIX1. Educate users on basic security protocols.

2. Employ defense-in-depth strategies.

3. Use encryption to protect sensitive data.

4. Be aggressive in your updating and patching.

5. Enforce an effective password policy.6. Ensure you have infection and incident

response procedures in place.

Hottest Cyber-Risk Solutions

NGFW (NEXT GENERATION FIREWALL)• Application aware, uses deep packet inspection techniques to

examine traffic for anomalies and known malware.

NAC (NETWORK ACCESS CONTROL)• A computer networking solution that uses a set of protocols to

define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.

WORKFORCE AWARENESS TRAINING

• Creating the Human Firewall

Page 10: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

10

Data Breach is Not Just an IT Issue

Train employees about the data risks in your organization.• Physical

• Psychological

Monitor risks and keep training and awareness up to date.

“Think like the bad guys.”

Build from “Teachable Moments”.

Creating the Human Firewall Recognize this is a cultural shift.

• Think harassment or workplace safety.

• Expect and promote secondary benefits for employees.

Start the change process with people who have disproportionate influence in the organization.

Look for ways to get people to experience the harsh realities that make change necessary.

Look for ways to redistribute resources toward “hot spots” –activities that require few resources but result in large change.

Page 11: Cyber-Security Risk in the Global Organization · Train employees about the data risks in your organization. • Physical • Psychological Monitor risks and keep training and awareness

11

Questions?

[email protected]@ic.fbi.gov


Recommended