25
Session 13 Cyber-security and cybercrime

Session 13 Cyber-security and cybercrime. Contents What’s the issue? Why should we care? What are the risks? How do they do it? How do we protect

Embed Size (px)

DESCRIPTION

What’s the issue?

Citation preview

Page 1: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Session 13Cyber-security and cybercrime

Page 2: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Contents

What’s the issue? Why should we care? What are the risks? How do they do it? How do we protect the firm? What if the worst happens?

Page 3: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

What’s the issue?

Page 4: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

What’s the issue?

Page 5: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

What’s the issue

60-81% report breach…

£65k-£1.15m cost of one breach…

84% believe colleagues violate controls…

…GLOBAL COST - £338 bn

Page 6: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Why should we care?

Page 7: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Why should I care?

http://www.lawsociety.org.uk/advice/cyber-security/

Page 8: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Why should we care?

Page 9: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

ConfidentialityWhat are the risks?

Page 10: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Confidentiality

Page 11: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Structural and financial instabilityWhat are the risks?

Page 12: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Structural and financial instability

Page 13: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Reputational damageWhat are the risks?

Page 14: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Reputation damage

Page 15: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

How do they do it?

Page 16: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

How do they do it?

Page 17: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Identify our vulnerabilities…How can we protect our firm?

Page 18: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Identify your vulnerabilities

People

Passwords

Operations

Too much information

Page 19: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Take action!How can we protect our firm?

Page 20: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Take action – the ‘do’ list

Manage the risk properlyRestrict data sticks and email attachmentsKeep browsers etc updatedRestrict file accessTake identity theft precautionsHave a policyEncrypt remote dataBack-upSound HR proceduresTraining and awareness

Page 21: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Take action – the ‘don’t’ list!

Use unsecured webmail or unapproved devices to transfer filesUse guessable passwords and locally stored filesLet your operating systems fall behindStore critical files online without backups.work remotely on an unsecured Wi-Fi connection

Page 22: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

What if the worst happens?

Page 23: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

What if the worst happens?

Page 24: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Summary

What is cybercrime Why it’s important to us The risks Cybercrime types and methods Protection Incident management?

Page 25: Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect

Final comments

• Any questions?