37
Robert Annett @ robert_annett 2015 A CyberSecurity Year

2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Embed Size (px)

Citation preview

Page 1: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Robert Annett @robert_annett

2015 A CyberSecurity Year

Page 2: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Why was 2015

special?

Page 3: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud
Page 4: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud
Page 5: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Page 6: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Source: http://www.bloomberg.com/graphics/2014-data-breaches/

Page 7: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Note

• The data taken is not necessarily about the target breached

• Sensitivity for the client does not necessarily indicate effect on the data holder

• Number of records does not necessarily indicate sensitivity

• Number of records and sensitivity does not necessary indicate financial cost

Page 8: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Who has borne the

consequences?

Page 9: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

What effect has this had?

Page 10: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

F.U.D

Page 11: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Regulation

Page 12: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Regulation

Different per region e.g. EU Different per country/state Different per industry Can be contradictory

Many regulators are now introducing regulation to protect data. However…

Page 13: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Some UK Regulatory Authorities

• ICO • FCA • PRA • FRC • GMC • MHRA

• OFCOM • ONR • OFGEM • OFWAT • EA • …

This is NOT exhaustive!

Page 14: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Example recent Cybersecurity Regulation/Guidance (Mainly Financial Services)

• European Commission • EU Cybersecurity Strategy (Action 124)(2014) • Directive on network and information security (2014) • Policy on Critical Information Infrastructure Protection (CIIP) (2013)

• EBA (European Banking Authority) • Guidelines on the security of internet payments (December 2014)

• HMG Department of Business, Innovation and Skills (Cabinet Office) • Cyber Essentials Scheme (June 2014) • Guiding principles on cyber security (Dec 2013)

• CERT-UK National Computer Emergency Response Team, The National Cyber Security Strategy (2013) • BoE – CBEST Vulnerability Testing Framework (2013-2015) • FCA (Financial Conduct Authority)

• Handbook specifies best practices/NIST • Guidance for firms outsourcing to the ‘cloud’ and other third-party IT services (November 2015)

• AIMA (Alternative Investment Management Association) • Guide to sound practices for Cybersecurity (October 2015)

• HFSB (Hedge Fund Standards Board) - Cyber Security for Hedge Fund Managers (May 2015) • SEC (Security and Exchange Commission) Office of Compliance Inspections and Examinations

• Cybersecurity Examination Initiative(September 2015) • Division of Investment Management – Cybersecurity Guidance Update (April 2015)

• FINRA (Financial Industry Regulatory Authority) - Report on Cybersecurity Practices (Feb 2015) • NYSE - Navigating the Digital Age: Cybersecurity Guide (October 2015) A 355 page book!

This is NOT exhaustive!

Page 15: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Irony of the week!

Page 16: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Enforcement

• Serious Organised Crime Agency (SOCA) e-crime unit

• The Police Central e-crime Unit (PCeU)

• The Medicines and Healthcare products Regulatory Agency (MHRA)

• H.M. Revenue & Customs • Child Exploitation and

Online Protection (CEOP) • National Crime Agency NCA

• National Fraud Agency NFA • National Fraud Intelligence

Bureau (NFIB) • Office of Fair Trading

(OFT) • Cyber Security Operations

Centre (CSOC) • EuroPol Cybercrime Center

(EC3) • IntelPol • GCHQ

Who do you report cybercrime to?

This is NOT exhaustive!

Page 17: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Money

Page 18: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud
Page 19: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Products

Page 20: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

There has been an

Explosion Of cybersecurity products and services

Page 21: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Products

• Virus Scanners • Malware scanner • Spam Filters • Phishing Filters • Email Link Rewriters • Malicious Website Detection • Cyber Security Training • Firewalls • Pentests • Intrusion detectors

• Mobile Device Managers • Authentication devices • Password storage • Behavioural Detectors • Data loss prevention systems • DarkWeb Monitoring • Risk Alerting • Tiger Team Reviews • Cyber Insurance

This is NOT exhaustive!

Page 22: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Some products and services

provide little value

Page 23: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Due Diligence

Page 24: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Do you know what your

vendors processes are?

Page 25: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Do you know who your

vendors really are?

Page 26: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Do your vendors

subcontract?

Page 27: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Where are they

located?Safe Harbour?

Page 28: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

You may also be the

subject of a DDQ

Page 29: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Some Actions

Page 30: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Perform an

audit of your current equipment, data and processes

Page 31: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Identify your

‘crown jewels’

Page 32: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Identify if any

regulation applies

Page 33: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

What are the relevant

best practices?

Page 34: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Do you have

Disaster Recovery Plan Business Continuity Plan Incident Response Plan Data Access Policies Data Protection Policies

Page 35: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

“ ”60% of threats are

caused by ‘People Issues’ rather than technology

Verizon 2015 Data Breach Investigations Report

Page 36: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

Consider the People as well

Security training (job relevant) Phishing Training Data loss training Incident Reporting Password choice

Page 37: 2015 A CyberSecurity Year - Coding the Architecturestatic.codingthearchitecture.com/presentations/2015-a...Online Protection (CEOP) • National Crime Agency NCA • National Fraud

discuss!Let’s now

[email protected]

@robert_annett on Twitter