+ All Categories
Home > Technology > Our Crisis Turning Point 2016 12-13.3

Our Crisis Turning Point 2016 12-13.3

Date post: 12-Apr-2017
Category:
Upload: william-kiss
View: 21 times
Download: 1 times
Share this document with a friend
64
Our Crisis Turning Point Our Current State of Cyber In-Security 2016-12-13.3
Transcript
Page 1: Our Crisis Turning Point 2016 12-13.3

Our Crisis Turning Point

Our Current State of

Cyber In-Security 2016-12-13.3

Page 2: Our Crisis Turning Point 2016 12-13.3

Massive Data Breaches

WHO is doing the Hacking? WHAT are Their Goals? WHAT is Being Stolen?

WHAT is their “End-Game”?

Page 3: Our Crisis Turning Point 2016 12-13.3
Page 4: Our Crisis Turning Point 2016 12-13.3
Page 5: Our Crisis Turning Point 2016 12-13.3

• As a nation…

We suffer from a ‘delusion of technology grandeur’

• Resulting in an overall -

False ‘Sense of Cyber-Security’ (Bad things can’t happen to us…)

IMHO (In My Humble Opinion)…

This has lead us into a period that is putting our nation

in a HIGH RISK category…

We have ‘slept’ as our political adversaries have pilfered our nation’s

defense assets (Intellectual Property), used our currency against us and

created a cyber army that can be used in an effort to defeat us militarily.

Just HOW did I arrive at this conclusion?

Page 6: Our Crisis Turning Point 2016 12-13.3

Photos courtesy of: SAIC Gregory Fowler, FBI, Portland, OR

U.S. Development Costs: Joint Strike Fighter Lockheed / Martin $337 Billion

China’s Development Cost… SIGNIFICANTLY LESS

Page 7: Our Crisis Turning Point 2016 12-13.3

U.S. Defense Asset Designs Stolen by Hackers Before & After 2006

• F-35 Joint Strike Fighter

• Black Hawk Helicopter

• Global Hawk Surveillance Drone

• Patriot Missile System

• GE Jet Engines

• Aegis Ballistic Missile Defense System

• C-17 Globemaster Transport Aircraft

• RC-135 Reconnaissance Aircraft

• Other Less Notable Designs

Page 8: Our Crisis Turning Point 2016 12-13.3

• Our Army is at its lowest point since just after WWII.

• Our Navy has its smallest fleet size since 1917.

• Our Air Force & Navy are salvaging parts from museums

and airplane-graveyards to keep what few aircraft we have are ‘deployable’ “ready”.

• It’s ALL in the news… every day.

• Just “WHY” is this important to us, now?

Page 9: Our Crisis Turning Point 2016 12-13.3

• It’s not just my opinion…

Rear Admiral Thomas C. Lynch

CIA Agent Michael Baker

Newt Gingrich Speaker of the House

Richard A Clarke Presidential Advisor - Cyber

Page 10: Our Crisis Turning Point 2016 12-13.3

We ALL Concur! • America has become war-weary and

‘over-embraced’ technology to the detriment of our safety and National Security.

• Our cars’ computerized systems can be hacked or

taken over, our hospital networks and active medical devices can be compromised or our data encrypted and held for ransom.

• What we don’t know or fail to comprehend about cyber threats can now injure us or worse!

Page 11: Our Crisis Turning Point 2016 12-13.3

What the Experts say…

Page 12: Our Crisis Turning Point 2016 12-13.3

“Cybercrime is becoming everything in

crime. Again, because people have

connected their entire lives to the

Internet, that’s where those who want to

steal money or hurt kids or defraud go.

So it’s an epidemic for reasons that make

sense.” 10/2014

about: Cybercrime… James Comey – Director FBI

about: Data Breach… General Michael Hayden – Former Director: NSA (1999-2005); CIA (2006-2009)

“It’s shame on us for not protecting this kind of information… (How does this type of Gov’t.

data breach happen?) It’s a tremendously big deal… There are three layers: The government

system, the political system and popular culture. So the governmental system: Raw

incompetence is the best explanation I can offer you. That’s at the executive-branch level. At

the political level, last week we began reigning in the renegade NSA for actually having phone

bills (yours and mine) up at Fort Meade… and Thursday we learned that OPM had lost (over)

14 million sets of records. At the level of popular culture, we Americans have not yet decided

what it is we want … or will permit our government to do in this cyber domain. Until we make

those decisions, these kinds of events are more likely.” 6/2015

Page 13: Our Crisis Turning Point 2016 12-13.3

about: U.S. Military Abilities… Richard Clarke – Former Presidential Advisor, Cyber Security

“The U.S. military is no more capable of operating

without the Internet than Amazon.com would be.

Logistics, command and control, fleet positioning,

everything down to targeting, all rely on software and

Internet-related technologies. … All of it is just as

insecure as your home computer, because it is all

based on the flawed underlying technologies and uses

the same insecure software and hardware.”

4/2012

about: North American Electrical Power Grids… George R. Cotter – Retired 2009 Former Chief Scientist NSA (60 years as Cryptologist) Specialty North American Electrical Generation & Distribution Networks

“With adversaries’ malware in the National Grid, the nation has little to no chance of

withstanding a major cyberattack on the North American electrical system. Incredibly weak

cybersecurity standards with a wide open communications and network fabric, virtually

guarantees success to major nation states and competent hacktivists.” 4/2015

Page 14: Our Crisis Turning Point 2016 12-13.3

IDentity Theft

• As of 2012, has surpassed ALL other types of Theft (COMBINED)!

• Can typically take more than 800 hours to repair

• Is NOT Limited to ONE Occurrence per Individual

• Can occur in MANY different ways

Page 15: Our Crisis Turning Point 2016 12-13.3

Ransomware

• Typically initiated by a Phishing Attack or Spear-Phishing Attack

• Encrypts your Data, Disk Drive(s) or ALL Storage

• Devices connected to your network(s)

• May DELETE all your Data (WIPER)

• May also qualify as a Data Breach (Data Theft)

Page 16: Our Crisis Turning Point 2016 12-13.3

Social Media Hacking

Page 17: Our Crisis Turning Point 2016 12-13.3

Why Social Media Hacking?

Page 18: Our Crisis Turning Point 2016 12-13.3

WSJ Article Small Business

Page 19: Our Crisis Turning Point 2016 12-13.3

TYPES of Records Breached

Page 20: Our Crisis Turning Point 2016 12-13.3

COST of a Data Breach

Page 21: Our Crisis Turning Point 2016 12-13.3

Hacker Rewards - Breached Computer

Courtesy Krebs On Security

Page 22: Our Crisis Turning Point 2016 12-13.3

Hacker Rewards - e-Mail

Courtesy Krebs On Security

Page 23: Our Crisis Turning Point 2016 12-13.3

Where Do I Start ? ? ? • Secure the services of a good Cyber Security Consultant

(Minimum 10-15 years experience)

• Document / Diagram Your IT Infrastructure o Account for ALL your Host Computers, Servers, Networking & End-

Point Devices

• Select the members of your Cyber Security Incident Response

Team.

• Perform a SWOT Analysis of your Cyber Vulnerabilities

• Select a seasoned Data Breach / Cyber Insurance Professional (Minimum 7-10 years experience)

Page 24: Our Crisis Turning Point 2016 12-13.3

Then…

• Create a Layered Security Model

• Separate Your HIGH VALUE Target / Vulnerable Data from the rest of your networks

• Layout Short / Medium & Long Range Goals

• Create your Initial Cyber Security Incident Response Plan

Page 25: Our Crisis Turning Point 2016 12-13.3

The CHOICE is Ours to Make!

• Will we as a nation remain Passive and RE-Active to our current situation… ?

(Pearl Harbor Scenario)

OR

• Wrestle our future back from those ‘I don’t see a problem’ short-sighted individuals /

organizations and transform our nation into a PRO-Active movement that will attack the problems

BEFORE they destroy us!

The THREAT is REAL America… Get Over It!

Page 26: Our Crisis Turning Point 2016 12-13.3

Solutions That REALLY Work… …And Won’t Bust Your Budget!

• Next Generation Anti-Virus / Anti-Malware STOPS Ransomware BEFORE it Encrypts Your Data!

(Endpoints & Servers!)

• Data Scanning & Protection Locate and Protect ALL Your Sensitive Data!

Your Staff can Install and Configure These Products!

Page 27: Our Crisis Turning Point 2016 12-13.3
Page 28: Our Crisis Turning Point 2016 12-13.3
Page 29: Our Crisis Turning Point 2016 12-13.3

Where Has ALL The Data Gone?

Page 33: Our Crisis Turning Point 2016 12-13.3
Page 34: Our Crisis Turning Point 2016 12-13.3

U.S.A. DHS-Defined

Critical Infrastructure Economic Sectors

Page 35: Our Crisis Turning Point 2016 12-13.3

1. Water

2. Food & Agriculture

3. Dams

4. Financial Services

5. Chemical

6. Critical Manufacturing

7. Commercial Facilities

8. Emergency Services

9. Transportation

10. Healthcare

11. Government Facilities

12. National Defense

13. Information Technology

14. Communications

15. Nuclear Reactors

16. Electrical Energy

Critical Infrastructure Economic Sectors

Copyright © 2016 Global 1 Research & Development, Ltd. ALL Rights Reserved

Page 36: Our Crisis Turning Point 2016 12-13.3

Copyright © 2016 Global 1 Research & Development, Ltd. ALL Rights Reserved

The REALITY – A Fragile, Vulnerable Economy, Subject to our Lynch-Pin Theory

Page 37: Our Crisis Turning Point 2016 12-13.3

What Is The GRID?

An Inter-Connection of Electrical Generation Facilities, Distribution Components and

Sub-Stations that Distribute the BES (Basic Electric System) to Government, Commercial and

Residential facilities.

Page 38: Our Crisis Turning Point 2016 12-13.3

North American Electrical Grids

Page 39: Our Crisis Turning Point 2016 12-13.3

DOE – Hierarchy of Electrical Reliability Monitoring

Page 40: Our Crisis Turning Point 2016 12-13.3

DOE – Regional Entities

Page 41: Our Crisis Turning Point 2016 12-13.3

DOE – Regional Reliability Coordinators

Page 42: Our Crisis Turning Point 2016 12-13.3

http://www.wsj.com/articles/SB10001424052702304851104579359141941621778

Page 43: Our Crisis Turning Point 2016 12-13.3

3 Types of Primary Threats to the Grid

• Low-Tech

• Hi-Tech

• Natural Phenomenon

Page 44: Our Crisis Turning Point 2016 12-13.3

Primary Threats to The Grid

Page 45: Our Crisis Turning Point 2016 12-13.3

PG&E’s Metcalf, CA Transmission Substation – Supplies A.C. Power to Silicon Valley “Most significant incident of Domestic Terrorism involving the GRID that has ever occurred” in the U.S. –Jon Wellinghof, then Chairman FERC • Began before 1 a.m. 4/16/2013

• Cut phone lines / fiber optic cables • Within 30 minutes, snipers opened fire with AK-47s on substation transformers • Knocked out 17 extra large transformers • Power was re-routed to keep power on to Silicon Valley, however it took 27 days to

make this one substation operational again • Total cost to repair this ONE substation $15 Million

http://www.wsj.com/articles/SB10001424052702304851104579359141941621778

Page 46: Our Crisis Turning Point 2016 12-13.3

http://www.wsj.com/articles/SB10001424052702304851104579359141941621778

Page 47: Our Crisis Turning Point 2016 12-13.3

Low-Tech Defense to AK-47 Style Attack

• Projectile Shredding Fencing

• Real-Time Situation Monitoring of Sub-Stations (Nationwide Network)

http://www.betafenceusa.com/Bullet-Resistant-Fence

Page 48: Our Crisis Turning Point 2016 12-13.3

EMP Event

• TND Detonation at Altitude

• Produces a Hi-Frequency Event (Electro-Magnetic Pulse) [EMP]

• Only Current Protection is to enclose equipment to be protected in a Faraday Cage (EMI Shielding)

Page 49: Our Crisis Turning Point 2016 12-13.3

August 31, 2012 Magnificent CME

• Published September 4, 2012 (NASA)

• On August 31, 2012 a long filament of solar material that had been hovering in the sun's atmosphere, the corona, erupted out into space at 4:36 p.m. EDT.

• The coronal mass ejection, or CME, traveled at over 900 miles per second.

• The CME did not travel directly toward Earth, but did connect with Earth's magnetic environment, or magnetosphere, with a glancing blow, causing aurora to appear on the night of Monday, September 3rd.

The Following Image of the Earth is to scale with the Filament Eruption (CME). Note: the Earth is not this close to the sun, this image is for scale purposes only.

https://svs.gsfc.nasa.gov/cgibin/details.cgi?aid=11095

Page 50: Our Crisis Turning Point 2016 12-13.3

What is a Coronal Mass Ejection?

Actual Distance from Sun: NOT to Scale

Page 51: Our Crisis Turning Point 2016 12-13.3

Charged Ionosphere Produced by a CME Rising to the Carrington Level Event

Page 52: Our Crisis Turning Point 2016 12-13.3

CME / CLE Defenses

• Solar Observation Satellites

• Synchrophasor Device Integration for BES Protection

• Monitoring & Alerting Network E-ISAC (Benefiting Owner-Operators)

Page 53: Our Crisis Turning Point 2016 12-13.3

Hospital / Patient Vulnerabilities

Page 54: Our Crisis Turning Point 2016 12-13.3

HOSPITALS MEDICAL RECORDS

ACTIVE MEDICAL DEVICES

Wrong Mission x Outdated Approach = FAILURE (Focusing on Patient Records) (Ignoring Advanced Threats) (Patients NOT Protected)

Page 55: Our Crisis Turning Point 2016 12-13.3

General Implementation Issues w / Hospital I.T. Infrastructure

• Insecure (un-secured) services (Insecure protocols) • Broken Access Controls • Default Configurations • Shared Credentials • Unpatched Systems

Page 56: Our Crisis Turning Point 2016 12-13.3

ISE “Securing Hospitals” – February 23, 2016

Healthcare Facilities Security Blueprint

Facility Re-Design Processes

Page 57: Our Crisis Turning Point 2016 12-13.3

ISE “Securing Hospitals” – February 23, 2016

Sample Good Network Architecture - Medical Facility

Highly Secure & Protected Area

Page 58: Our Crisis Turning Point 2016 12-13.3

ISE “Securing Hospitals” – February 23, 2016

Patient Health Attack Model

Page 59: Our Crisis Turning Point 2016 12-13.3
Page 60: Our Crisis Turning Point 2016 12-13.3

CEO, Global 1 Research & Development, Ltd.

Bill has more than 50 years in I.T., Telecommunications and Security. With a background in Electrical Engineering & Database Design,

he has been a consultant to the U.S Federal Government, various state agencies and Fortune 500 companies.

Bill assists companies in reviewing their Business Continuity, Data Recovery and Data Breach plans. He also assists CEO, CIO and CISO staff with vulnerability assessments & remediation, implementing enhancements to harden their web servers, internal networks, and data protection. Averting

damage from the next major cyberattack on Corporate America and helping individuals protect their identity are Bill’s primary goals. He has spoken extensively on technical matters both domestically and in Latin

America for over 20 years. Bill is the creator of the Data Breach Boot Camp™ Seminar Series for executives.

Perhaps some of his past clients say it best:

“I have worked with Bill on multiple projects over the past 21 years… He has a rare ability to see solutions where most find clutter…

You will find him a valuable, reliable contributor to any serious project.”

P.L. Thomas, PhD NIH, Bethesda, MD.

“I have found Bill to be very competent. He can be relied upon to deliver quality in business.”

A.P. Bertolino MD, PhD, MBA, Exec. V.P. Pharmaceutical Company, San Francisco, CA

Bill currently resides with his wife Barbara in Doylestown, PA

Former Clients Include…

U.S. Library of Congress U.S. Department of Commerce

U.S. Department of State State of Delaware: Department of Health & Social Services Many other small & medium size businesses (Including Medical Practices)

Page 61: Our Crisis Turning Point 2016 12-13.3

Available on LinkedIn and SlideShare

Page 62: Our Crisis Turning Point 2016 12-13.3

Please complete the Speaker Evaluation Form. THANK YOU !

Page 63: Our Crisis Turning Point 2016 12-13.3

Thank you for your kind attention!

William D. Kiss, Founder & CEO

Global 1 Research & Development, Ltd.

www.BillKiss.com

[email protected]

Cell: +1.484.357.2339

• For More Information, please contact:

Copyright © 2016 Global 1 Research & Development, Ltd. ALL Rights Reserved

Page 64: Our Crisis Turning Point 2016 12-13.3

Potential EBITDA Savings

How To Squeeze Savings Out of Already Allocated Budget Dollars


Recommended