19
BCI North Midlands regional forum Meeting (17/09/2015) Office of the Public Guardian, Birmingham,B1 1TF

Introduction to information and cyber security

Embed Size (px)

Citation preview

Page 1: Introduction to information and cyber security

BCI North Midlands regional forum Meeting (17/09/2015)

Office of the Public Guardian, Birmingham,B1 1TF

Page 2: Introduction to information and cyber security

TIME ITEM

8.00 – 8.30 Arrival, Tea/Coffee – networking opportunity

8.30 – 8.45 Welcome, Housekeeping & Introductions

8.50 – 09.10

Janet Poole - BCI Update

09.10 – 10.00 Simon Plummer of EON UK- Presentation with Q&A : Cyber Security

10.00 – 10.40

Tea & Coffee Break

10.40 – 12.10 Steve Webb – Exercising (Group Activity)

12.10 – 12.30 BC Surgery

12.30 Wrap up and close

Page 3: Introduction to information and cyber security

Introduction to Information and Cyber Security

Simon Plummer – UK Information Security Manager E.ON UK

Page 4: Introduction to information and cyber security

4

Overview– Introduction

– What is ‘Information and Cyber Security’

– Case Study – London 2012 Olympics

– What threats are on the horizon…and now?

– Security Risks and impacts

– Case Study – Ashley Madison

– Hacking the Human

– Initiatives and standards

Page 5: Introduction to information and cyber security

5

Introduction– Simon Plummer - UK Information Security Manager E.ON UK

– Background in IT, now circa 7 years in security related roles

– Currently responsible for Information security for our UK operations covering approximately 10,000 staff

– Member of the IISP (Institute for Information Security Practitioners)

– ISO27001:2013 Certified Lead Implementer

– Currently working towards CESG Certified Professional Scheme (CCP)

Page 6: Introduction to information and cyber security

6

What is ‘Information and Cyber Security’• Information security, sometimes shortened to InfoSec, is the practice of

defending information from unauthorised activity such as;

– Access, – Use, – Disclosure, – Disruption, – Modification, – Perusal, – Inspection, – Recording– Destruction.

• It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical).

• https://en.wikipedia.org/wiki/Information_security

Page 7: Introduction to information and cyber security

7

What is ‘Information and Cyber Security’

• “Cyber security, is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorised access. In a computing context, the term security generally implies cybersecurity” whatis.techtarget.com/definition/cybersecurity

Page 8: Introduction to information and cyber security

8

Scenario – London 2012 Olympics

Page 9: Introduction to information and cyber security

9

–GCHQ and CESG intelligence identified a genuine threat to the electricity infrastructure prior to the opening ceremony.

–Top 5 Cyber Risks Mobile and Tablet Risk Drive-By Downloads Information Phishing Search Engine Poisoning Ticketing Scams

–Protective measures identified 166m Security related events–783 required full investigation (more than 55 per day!)–six serious events within a 10 day period–No outages or disruption was reportedhttp://www.bbc.co.uk/news/uk-23195283http://www.insidegovernment.co.uk/new-upload/gerrypennell.pdfhttp://www.threatmetrix.com/threatmetrix-identifies-the-top-five-cybersecurity-threats-of-olympic-proportions/

Case Study – London 2012 Olympics

Page 10: Introduction to information and cyber security

10

What threats are on the horizon…and now

– International Interest – Generally state sponsored

– Aiming at intellectual property, intelligence, acquisitions and mergers

– Seeking to gain economic advantage

– Hacktivism– Can be a range of drivers

– Malicious, disruptive

– Massively increased capabilities

– Cyber meets physical

– Organised

Page 11: Introduction to information and cyber security

11

What threats are on the horizon…and now

– Industrial Competitor– Financial and economic gain

– National and international

– Organised Crime– Capability increasing, however services can be paid for at little cost

– Financially driven (Fraud, sale of valuable information, ransom)

– Effects both business and individuals

– Insider / Employee– Lack of awareness

– Focus of physical security generally doesn’t include

• ‘IT’ and information

– Can be ‘begrudged’ or compromised

Page 12: Introduction to information and cyber security

12

Case Study – Ashley Madison

• …The facts

– In excess of 30 million account details stolen

– Personal details

– Poor security – no email ownership/verification

• …The ramifications

– Extortion/Blackmail

– Financial Liabilities

– Work and home life disruption

– Economic implications

– Threat to life

Page 13: Introduction to information and cyber security

13

Hacking the Human

– InfoSec is about people – historically focus is on technical countermeasures

– Humans are unfortunately the ‘soft spot’

– Technical controls can assist, however without the culture there are many

challenges

– Policies generally don’t work

– Culture change

– Social Engineering

Page 14: Introduction to information and cyber security

14

Hacking the Human – Social Engineering Lifecycle

Page 15: Introduction to information and cyber security

15

Questions/Discussion?

Page 16: Introduction to information and cyber security

16

Initiatives and Standards

Page 17: Introduction to information and cyber security

17

Page 18: Introduction to information and cyber security

18

Resources– https://uk.linkedin.com/pub/simon-plummer/28/65b/3a7– https://www.getsafeonline.org/– http://www.cpni.gov.uk/– http://www.cpni.gov.uk/advice/cyber/– http://www.cpni.gov.uk/highlights/cyber-advice-businesses/– https://www.cert.gov.uk/– https://www.cert.gov.uk/cisp/– http://www.cesg.gov.uk/

– London 2012 Cyber Security : Experiences from the games

– http://www.mcafee.com/uk/resources/reports/rp-hacking-human-os.pdf

– GCHQ – Government Communications Headquarters

– CESG – Communications-Electronics Security Group (dropped in 2002)

– CPNI – Centre for the Protection of National Infrastructure

Page 19: Introduction to information and cyber security

This presentation was delivered at a BCI forum event. For details of upcoming events please click here.

For details of BCI membership please click here.