SlideShare a Scribd company logo
1 of 29
Chuck Brooks
Vice President
Sutherland Government Solutions
Wed, October 12, 2016
Terrorism and non-state actors
The US Critical Infrastructure
Sectors as Targets and Recent
Examples
• “A few lines of code can wreak more havoc than a bomb.”
Hon. Tom Ridge (Former) Secretary of the U.S. Department of
Homeland Security
• “The Internet was not built for security, yet we have made it the
backbone of virtually all private-sector and government
operations, as well as communications. Pervasive connectivity
has brought dramatic gains in productivity and pleasure but has
created equally dramatic vulnerabilities. Huge heists of personal
information are common, and cybertheft of intellectual property
and infrastructure penetrations continue at a frightening pace.”
Joel Brenner, the former counsel to the National Security Agency
The Cyber Threat
Major Threat Actors
Major Threat Actors
• Hacker/Script Kiddies/Hobbyist
• Insider Threat/Disgruntled Employee
• Hacktivist
• Industrial Espionage
• Foreign Espionage
• Terrorist
• State Sponsored Attack
Major Threat Actors
• Hacker/Script Kiddies/Hobbyist
• Insider Threat/Disgruntled Employee
• Hacktivist
• Industrial Espionage
• Foreign Espionage
• Terrorist
• State Sponsored Attack
Cyber-Threats
• Trojan. A Trojan is one of the most complicated threats among all. Most of the
popular banking threats come from the Trojan family such as Zeus and SpyEye.
• Virus. A Virus is a malicious program where it replicates itself and aim to only
destroy a computer. The ultimate goal of a virus is to ensure that the victim’s
computer will never be able to operate properly or even at all.
• Worms; They can spread from one computer to another computer within a
network or even the internet. The computer security risk here is, it will use up
your computer hard disk space due to the replication and took up most of your
bandwidth due to the spread.
• DDoS (Distributed Denial of Service) sends millions of traffic to a single server to
cause the system to down with certain security feature disable so that they can
do their data stealing.
• A Zero-day Vulnerability refers to a hole in software that is unknown to the
vendor, which can be exploited by hackers before the vendor becomes aware and
hurries to patch it up. They are becoming an increasingly powerful weapon of
cyber espionage as countries become more connected to the internet
Cyber-Threats
• Spyware Is a Malware which is designed to spy on the victim’s computer
• Botnet. Botnet is something which is installed by a BotMaster to take
control of all the computer bots via the Botnet infection
• Phishing. A fake website which is designed to look almost like the actual
website is a form of phishing attack. The idea of this attack is to trick the
user into entering their username and password into the fake login form
which serves the purpose of stealing the identity of the victim
• Ransomware: in which hackers hold computers and even entire networks
hostage for electronic cash payments. Ransomware has been around for
more than a decade, but attacks have exploded in the past couple of years
Researchers have seen a 3,500% increase in the criminal use of ransomware
.
Critical Infrastructure
Securing Critical Infrastructure
• Government
• Military: Secrets, tactics, location of forces, tampering
• Power Grid: Generator controls, power distribution controls
• Telecommunications: Phone, internet connectivity
• Transportation: Air traffic control, railway, bridge and highway, radar
• Energy/Fuel Supply: Locations of pipelines, types of fuel and amounts
• Banking and Finance: Asset protection, stock market
• Emergency Services: 911 system, disaster response, first
responder coordination, deployment and locations
• Food and Water Infrastructure: Food and water distribution, process
Securing Critical Infrastructure
• The number of cyber incidents reported by federal agencies jumped
more than 1,300 percent, from 5,503 to 77,183, over the 10 years
through fiscal 2015
• Ransomware attacks on government agencies around the world have
tripled in the past year
• About 4 percent of government agencies had been exposed to
Nymaim, and 3 percent to Locky, both ransomware strains
• OPM Breach - heist of data on 22 million current and former federal
employees
• Elections: In Illinois and Kansas registration databases were
suspected of being hacked. Illinois hackers managed to download
personal data on up to 200,000 state voters
• There is only one way to protect the voting system from a nation-
state-funded cyberattack," "Use paper."
• Cybersecurity, information assurance, and resilience has become one
of the largest areas of government spending at all agencies and is
consistently ranked the top priority among government and industry
CIOs in surveys
• In the U.S., most -approximately 85 per cent of the cybersecurity
critical infrastructure is owned by the private sector and regulated by
the public sector
• In 2013, President Obama issued Executive Order 13636 (“Improving
Critical Infrastructure Cyber-security”) called for the establishment of a
voluntary risk-based cyber-security framework between the private and
public sectors
• Incident response to Industrial Control Systems -Supervisory Control
and Data Acquisition (SCADA)
• The leader civilian agency in the government for public/private
cooperation in cybersecurity is the Department of Homeland Security
(DHS).
Cybersecurity -- Role of Government
Critical Security Controls
The CIS Critical Security Controls are a recommended set of actions for cyber defense
that provide specific and actionable ways to stop today's most pervasive and dangerous
attacks (APTs – Advanced Persistent Threats)
1: Inventory of Authorized and Unauthorized Devices
2: Inventory of Authorized and Unauthorized Software
3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and
Servers
4: Continuous Vulnerability Assessment and Remediation
5: Malware Defenses
6: Application Software Security
7: Wireless Access Control
8: Data Recovery Capability
9: Security Skills Assessment and Appropriate Training to Fill Gaps
10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
11: Limitation and Control of Network Ports, Protocols, and Services
12: Controlled Use of Administrative Privileges
13: Boundary Defense
14: Maintenance, Monitoring, and Analysis of Audit Logs
15: Controlled Access Based on the Need to Know
16: Account Monitoring and Control
17: Data Protection
18: Incident Response and Management
19: Secure Network Engineering
20: Penetration Tests and Red Team Exercises
Cybersecurity -DHS
• DHS is responsible for overseeing the protection of the.gov domain
and for providing assistance and expertise to private sector owners
and operators. The agency’s work benefits the information
technology community and the public at-large.
• DHS plays a key role in securing the federal government's civilian
cyber networks and helping to secure the broader cyber ecosystem
• US-CERT is responsible for analyzing and reducing cyber threats,
vulnerabilities, disseminating cyber threat warning information,
and coordinating incident response activities. The division brings
advanced network and digital media analysis expertise to bear on
malicious activity targeting the networks within the United States
and abroad
Energy
• Protecting The Grid
• Utilities and Power Plants
• Solar Energy
• Data Centers
• Water Systems
• Oil, Gas & Coal (Logistics)
• “China and one or two other countries have the ability to launch a cyber
attack that could shut down the entire U.S. power grid and other critical
infrastructure” Admiral Mike Rodgers, head of the National Security
Agency (NSA) and U.S. Cyber Command
• US Department of Homeland Security’s Cybersecurity Emergency
Response Team responded to 295 cyber incidents in the energy sector in
2015
• The frequency, sophistication and costs of data breaches are increasing,
says the World Energy Council, and the world’s first publicly-
acknowledged power outage caused by hackers has taken place in
Ukraine
• In South Korea last year hackers targeted Korea Hydro and Nuclear Power
Company, trying to cause nuclear reactors to malfunction
• An attack on a nuclear plant could lead to a core meltdown and dispersal
of radioactivity, says the report, while attacks on other critical energy
infrastructure could threaten a country’s economy, public safety and
national defense
Energy
• Mobile payments/transactions
• Mobile banking
• ATMS
• Identity Theft:
• Identity management Biometric Security: access control
facial recognition, voice recognition, iris and retina
scanners, fingerprint sensors on tablets and smartphones –
pass keys
• Retail Commerce
• Stock Markets
Finance/Commerce
• A sophisticated hacking scheme targeted the Bangladesh central bank
($81M stolen) in March 2016
• In March 2016, the U.S. Justice Department indicted seven hackers tied to
the Iranian regime These hackers staged a coordinated cyber attack that
targeted 46 major financial institutions and a dam outside of New York City
• According to Websense Security Labs, the average number of attacks
against financial services institutions is four times higher than that of
companies in other industries
• The Federal Bureau of Investigation estimated that more than 500 million
financial records were hacked in 2013
• According to the Ponemon Institute, over 43% of companies had breaches
last year (including mega companies such as Home Depot, JPMorgan, and
Target
• According to the Center For Strategic and International Studies (CSIS),
cyber related crime now costs the global economy about $445 billion every
year
Finance/Commerce
• The cybersecurity healthcare landscape has many facets. These
include the information security networks of medical facilities and
hospitals, medical equipment and devices, and protection of the
sensitive data and privacy of patients
• Interconnected Hospital networks with multiple devices
• Health- Implantable devices; (bionic eyes, limbs)
• Remote sensing tech (Wearables)
• Telemedicine
• Real-time biomarker tracking and monitoring
• Refrigeration and storage
Health & Medicine
• Last year, a series of hospitals fell victim to ransomware attacks;
one, the Hollywood Presbyterian Medical Center, paid the $17,000
ransom to unlock critical medical information
• Another US hospital, Boston Children’s Hospital was the target of
a series of breaches including distributed denial of service
attacks. Medical institutions in Europe and Canada have also been
subjected to intrusions.
• Healthcare data is highly valuable to hackers because they can
sell it for a high price on the black market
• In 2015 36% of breaches included medical records
Health & Medicine
• A “connected transportation system,” and more specifically
“connected cars” allow for safer and more efficient urban
mobility. Connected car technology is evolving rapidly and is
now being tested
• A group of Virginia-based researchers funded by the Defense
Department found that it is relatively easy to remotely hack into a
driverless car’s control system
Aviation:
• LOT Polish Airlines had its flight operations system hacked,
resulting in disruption or cancellation of 22 flights
• American security researcher Chris Roberts claims to have
accessed flight-critical controls through the in-flight
entertainment system
Transportation
Securing The Digital Future
• Cisco predicts that 50 billion devices (including our smartphones,
appliances, and office equipment) will be wirelessly connected via a
network of sensors to the internet by 2020
• How do we protect cascading interconnectivity?
IoT Verticals:
• Smart Cities
• Facilities & infrastructure management
• Industrial applications
• Energy (smart grid)
• Medical & healthcare
• Transportation
• Building/construction (smart buildings)
• Environment (waste management)
• Water resources
• Retail and supply chain,
• Communications
• Education (learning analytics)
The Digital age and “The Internet of Things”
Cybersecurity
• Defining and monitoring the threat landscape
• Risk Management (identifying, assessing and responding to
threats- i.e. NIST Framework: Identify, Protect, Detect, Respond,
Recover)
• Protecting critical infrastructure through rapid proto-typing of
technologies and Public/Private cooperation
• Modernizing security Architectures
• Better encryption and biometrics (quantum encryption, keyless
authentication)
• Automated network-security correcting systems (self-encrypting
drives)
Cybersecurity Priorities
• Technologies for continuous “real time” horizon scanning and
monitoring of networks
• Access Management and Control
• Endpoint protection
• Diagnostics, data analytics, and forensics (network traffic
analysis, payload analysis, and endpoint behavior analysis)
• Advanced defense for framework layers (network, payload,
endpoint, firewalls, and anti-virus)
• Enterprise and client Network isolation to protect against
malware, botnets, insider threats
• Forensics
Cybersecurity Priorities
Sutherland Government Solutions, Inc. (SGSI) mission is to ensure government can
meet its vision of fully responding to citizen mandates. As a trusted partner, we
enable government to succeed by providing smart, affordable and highly
responsive customer care processes and solutions.
Our Industry experience instills confidence in constituent oriented government
operations. SGSI’s capabilities include rapidly deploying major contact centers,
integrating citizen-centric IT services, and processing health and insurance benefit
claims. SGSI’s technology-enabled services are performance force multipliers for
government, especially in times of budget constraint.
Sutherland's Services for Government Include:
• Multi-Channel Constituent Relations
• Veterans Choice: Customer Care
• Healthcare & Insurance Claims Processing
• Revenue Cycle Management
• Analytics
• IT Service Desks & Contact Centers
• System Integration
Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for
Sutherland Global Services. Chuck leads Federal and State & Local Government relations
activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought
Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck is
Chairman of the CompTIA Emerging Technologies Committee also serves on Boards to several
prominent public and private companies and organizations. Chuck has extensive service in Senior
Executive Management, Marketing, Government Relations, and Business Development and worked
in those capacities for three large public corporations. In government, he served at the Department
of Homeland Security as the first Director of Legislative Affairs for the Science & Technology
Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen
Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck
was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level
students about homeland security and Congress. He has an MA in International relations from the
University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in
International Law from The Hague. He is widely published on topics o fhomeland security,
cybersecurity, and emerging technologies.
Twitter: @ChuckDBrooks
Linked in Profile: http://www.linkedin.com/in/chuckbrooks
Email: Charles.Brooks@sutherlandglobal.com
Chuck Brooks Bio:
The problems that
exist in the world
today cannot be
solved by the level of
thinking that created
them.

More Related Content

What's hot

What's hot (20)

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Wars And Cyber Terrorism
Cyber Wars And Cyber TerrorismCyber Wars And Cyber Terrorism
Cyber Wars And Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber war
Cyber warCyber war
Cyber war
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
C018131821
C018131821C018131821
C018131821
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 

Viewers also liked

Q1 Section 2 FINAL
Q1 Section 2 FINALQ1 Section 2 FINAL
Q1 Section 2 FINALJames Coy
 
Ching Ho Pang (Leo) - Portfolio
Ching Ho Pang (Leo) - Portfolio Ching Ho Pang (Leo) - Portfolio
Ching Ho Pang (Leo) - Portfolio Ching Ho (Leo) Pang
 
807 - גיאומטריה אנליטית לדוגמה
 807 - גיאומטריה אנליטית לדוגמה 807 - גיאומטריה אנליטית לדוגמה
807 - גיאומטריה אנליטית לדוגמהbagrutonline
 
807 - וקטורים לדוגמה
 807 - וקטורים לדוגמה 807 - וקטורים לדוגמה
807 - וקטורים לדוגמהbagrutonline
 
Taller sopa de letras
Taller sopa de letrasTaller sopa de letras
Taller sopa de letrasBraian Perez
 
6.- El reinado de Carlos II (1665-1700)
6.- El reinado de Carlos II (1665-1700)6.- El reinado de Carlos II (1665-1700)
6.- El reinado de Carlos II (1665-1700)Antonio Luengo Gil
 

Viewers also liked (13)

Q1 Section 2 FINAL
Q1 Section 2 FINALQ1 Section 2 FINAL
Q1 Section 2 FINAL
 
Ching Ho Pang (Leo) - Portfolio
Ching Ho Pang (Leo) - Portfolio Ching Ho Pang (Leo) - Portfolio
Ching Ho Pang (Leo) - Portfolio
 
CRMEVOLUTION
CRMEVOLUTIONCRMEVOLUTION
CRMEVOLUTION
 
Christopher Fowler CV
Christopher Fowler CVChristopher Fowler CV
Christopher Fowler CV
 
Art
ArtArt
Art
 
807 - גיאומטריה אנליטית לדוגמה
 807 - גיאומטריה אנליטית לדוגמה 807 - גיאומטריה אנליטית לדוגמה
807 - גיאומטריה אנליטית לדוגמה
 
807 - וקטורים לדוגמה
 807 - וקטורים לדוגמה 807 - וקטורים לדוגמה
807 - וקטורים לדוגמה
 
3.- El Dadaísmo
3.- El Dadaísmo3.- El Dadaísmo
3.- El Dadaísmo
 
Taller sopa de letras
Taller sopa de letrasTaller sopa de letras
Taller sopa de letras
 
2014 winter 807 q
2014 winter 807 q2014 winter 807 q
2014 winter 807 q
 
Math summer 807
Math summer 807Math summer 807
Math summer 807
 
Man ray
Man rayMan ray
Man ray
 
6.- El reinado de Carlos II (1665-1700)
6.- El reinado de Carlos II (1665-1700)6.- El reinado de Carlos II (1665-1700)
6.- El reinado de Carlos II (1665-1700)
 

Similar to Critical Infrastructure Sectors as Targets and Recent Cybersecurity Examples

Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...IT Arena
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsFidelis Cybersecurity
 

Similar to Critical Infrastructure Sectors as Targets and Recent Cybersecurity Examples (20)

Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 

More from Chuck Brooks

Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Chuck Brooks
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Chuck Brooks
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Chuck Brooks
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Chuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Chuck Brooks
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting InternationalChuck Brooks
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...Chuck Brooks
 

More from Chuck Brooks (20)

Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
Cybersecurity, Emerging Tech, and Risk Management - compiled media and writin...
 
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
Cybersecurity, Emerging Technologies, Risk Management, Homeland Security, and...
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
Cybersecurity, Emerging Technologies, and Homeland Security - Chuck Brooks
 
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
Thought Leadership in Cybersecurity, Emerging Technologies, Homeland Security...
 
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
Chuck Brooks Updated Profile: on Homeland Security, Cybersecurity, Emerging T...
 
Brooks Consulting International
Brooks Consulting InternationalBrooks Consulting International
Brooks Consulting International
 
Chuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer ProfileChuck Brooks Thought Leadership/Influencer Profile
Chuck Brooks Thought Leadership/Influencer Profile
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging techChuck Brooks profile on cybersecurity, homeland security, and emerging tech
Chuck Brooks profile on cybersecurity, homeland security, and emerging tech
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck Brooks profile on cybersecurity, homeland security, and emerging techno...
 
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
Chuck brooks profile on cybersecurity, homeland security, and emerging techno...
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
Chuck Brooks on Cybersecurity, Homeland Security, and Emerging Technologies (...
 
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...Chuck brooks;  cybersecurity, homeland security, Innovation, & emerging techn...
Chuck brooks; cybersecurity, homeland security, Innovation, & emerging techn...
 
Advisory Board
Advisory BoardAdvisory Board
Advisory Board
 

Recently uploaded

PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOMAIRIEORGERUS
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfKatrina Sriranpong
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Sonam Pathan
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationEnergy for One World
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILChristina Parmionova
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Christina Parmionova
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxjennysansano2
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfAmir Saranga
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Christina Parmionova
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证mbetknu
 

Recently uploaded (20)

PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
 
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdfIf there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
If there is a Hell on Earth, it is the Lives of Children in Gaza.pdf
 
Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170Call Girls Near Surya International Hotel New Delhi 9873777170
Call Girls Near Surya International Hotel New Delhi 9873777170
 
Club of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological CivilizationClub of Rome: Eco-nomics for an Ecological Civilization
Club of Rome: Eco-nomics for an Ecological Civilization
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRILPanet vs.Plastics - Earth Day 2024 - 22 APRIL
Panet vs.Plastics - Earth Day 2024 - 22 APRIL
 
Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...Enhancing Indigenous Peoples' right to self-determination in the context of t...
Enhancing Indigenous Peoples' right to self-determination in the context of t...
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Narela DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mehrauli  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mehrauli DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptx
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Yellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdfYellow is My Favorite Color By Annabelle.pdf
Yellow is My Favorite Color By Annabelle.pdf
 
Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.Press Freedom in Europe - Time to turn the tide.
Press Freedom in Europe - Time to turn the tide.
 
(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证(多少钱)Dal毕业证国外本科学位证
(多少钱)Dal毕业证国外本科学位证
 

Critical Infrastructure Sectors as Targets and Recent Cybersecurity Examples

  • 1. Chuck Brooks Vice President Sutherland Government Solutions Wed, October 12, 2016 Terrorism and non-state actors The US Critical Infrastructure Sectors as Targets and Recent Examples
  • 2. • “A few lines of code can wreak more havoc than a bomb.” Hon. Tom Ridge (Former) Secretary of the U.S. Department of Homeland Security • “The Internet was not built for security, yet we have made it the backbone of virtually all private-sector and government operations, as well as communications. Pervasive connectivity has brought dramatic gains in productivity and pleasure but has created equally dramatic vulnerabilities. Huge heists of personal information are common, and cybertheft of intellectual property and infrastructure penetrations continue at a frightening pace.” Joel Brenner, the former counsel to the National Security Agency The Cyber Threat
  • 4. Major Threat Actors • Hacker/Script Kiddies/Hobbyist • Insider Threat/Disgruntled Employee • Hacktivist • Industrial Espionage • Foreign Espionage • Terrorist • State Sponsored Attack
  • 5. Major Threat Actors • Hacker/Script Kiddies/Hobbyist • Insider Threat/Disgruntled Employee • Hacktivist • Industrial Espionage • Foreign Espionage • Terrorist • State Sponsored Attack
  • 6. Cyber-Threats • Trojan. A Trojan is one of the most complicated threats among all. Most of the popular banking threats come from the Trojan family such as Zeus and SpyEye. • Virus. A Virus is a malicious program where it replicates itself and aim to only destroy a computer. The ultimate goal of a virus is to ensure that the victim’s computer will never be able to operate properly or even at all. • Worms; They can spread from one computer to another computer within a network or even the internet. The computer security risk here is, it will use up your computer hard disk space due to the replication and took up most of your bandwidth due to the spread. • DDoS (Distributed Denial of Service) sends millions of traffic to a single server to cause the system to down with certain security feature disable so that they can do their data stealing. • A Zero-day Vulnerability refers to a hole in software that is unknown to the vendor, which can be exploited by hackers before the vendor becomes aware and hurries to patch it up. They are becoming an increasingly powerful weapon of cyber espionage as countries become more connected to the internet
  • 7. Cyber-Threats • Spyware Is a Malware which is designed to spy on the victim’s computer • Botnet. Botnet is something which is installed by a BotMaster to take control of all the computer bots via the Botnet infection • Phishing. A fake website which is designed to look almost like the actual website is a form of phishing attack. The idea of this attack is to trick the user into entering their username and password into the fake login form which serves the purpose of stealing the identity of the victim • Ransomware: in which hackers hold computers and even entire networks hostage for electronic cash payments. Ransomware has been around for more than a decade, but attacks have exploded in the past couple of years Researchers have seen a 3,500% increase in the criminal use of ransomware .
  • 9. Securing Critical Infrastructure • Government • Military: Secrets, tactics, location of forces, tampering • Power Grid: Generator controls, power distribution controls • Telecommunications: Phone, internet connectivity • Transportation: Air traffic control, railway, bridge and highway, radar • Energy/Fuel Supply: Locations of pipelines, types of fuel and amounts • Banking and Finance: Asset protection, stock market • Emergency Services: 911 system, disaster response, first responder coordination, deployment and locations • Food and Water Infrastructure: Food and water distribution, process
  • 10. Securing Critical Infrastructure • The number of cyber incidents reported by federal agencies jumped more than 1,300 percent, from 5,503 to 77,183, over the 10 years through fiscal 2015 • Ransomware attacks on government agencies around the world have tripled in the past year • About 4 percent of government agencies had been exposed to Nymaim, and 3 percent to Locky, both ransomware strains • OPM Breach - heist of data on 22 million current and former federal employees • Elections: In Illinois and Kansas registration databases were suspected of being hacked. Illinois hackers managed to download personal data on up to 200,000 state voters • There is only one way to protect the voting system from a nation- state-funded cyberattack," "Use paper."
  • 11. • Cybersecurity, information assurance, and resilience has become one of the largest areas of government spending at all agencies and is consistently ranked the top priority among government and industry CIOs in surveys • In the U.S., most -approximately 85 per cent of the cybersecurity critical infrastructure is owned by the private sector and regulated by the public sector • In 2013, President Obama issued Executive Order 13636 (“Improving Critical Infrastructure Cyber-security”) called for the establishment of a voluntary risk-based cyber-security framework between the private and public sectors • Incident response to Industrial Control Systems -Supervisory Control and Data Acquisition (SCADA) • The leader civilian agency in the government for public/private cooperation in cybersecurity is the Department of Homeland Security (DHS). Cybersecurity -- Role of Government
  • 12. Critical Security Controls The CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today's most pervasive and dangerous attacks (APTs – Advanced Persistent Threats) 1: Inventory of Authorized and Unauthorized Devices 2: Inventory of Authorized and Unauthorized Software 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 4: Continuous Vulnerability Assessment and Remediation 5: Malware Defenses 6: Application Software Security 7: Wireless Access Control 8: Data Recovery Capability 9: Security Skills Assessment and Appropriate Training to Fill Gaps 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11: Limitation and Control of Network Ports, Protocols, and Services 12: Controlled Use of Administrative Privileges 13: Boundary Defense 14: Maintenance, Monitoring, and Analysis of Audit Logs 15: Controlled Access Based on the Need to Know 16: Account Monitoring and Control 17: Data Protection 18: Incident Response and Management 19: Secure Network Engineering 20: Penetration Tests and Red Team Exercises
  • 13. Cybersecurity -DHS • DHS is responsible for overseeing the protection of the.gov domain and for providing assistance and expertise to private sector owners and operators. The agency’s work benefits the information technology community and the public at-large. • DHS plays a key role in securing the federal government's civilian cyber networks and helping to secure the broader cyber ecosystem • US-CERT is responsible for analyzing and reducing cyber threats, vulnerabilities, disseminating cyber threat warning information, and coordinating incident response activities. The division brings advanced network and digital media analysis expertise to bear on malicious activity targeting the networks within the United States and abroad
  • 14. Energy • Protecting The Grid • Utilities and Power Plants • Solar Energy • Data Centers • Water Systems • Oil, Gas & Coal (Logistics)
  • 15. • “China and one or two other countries have the ability to launch a cyber attack that could shut down the entire U.S. power grid and other critical infrastructure” Admiral Mike Rodgers, head of the National Security Agency (NSA) and U.S. Cyber Command • US Department of Homeland Security’s Cybersecurity Emergency Response Team responded to 295 cyber incidents in the energy sector in 2015 • The frequency, sophistication and costs of data breaches are increasing, says the World Energy Council, and the world’s first publicly- acknowledged power outage caused by hackers has taken place in Ukraine • In South Korea last year hackers targeted Korea Hydro and Nuclear Power Company, trying to cause nuclear reactors to malfunction • An attack on a nuclear plant could lead to a core meltdown and dispersal of radioactivity, says the report, while attacks on other critical energy infrastructure could threaten a country’s economy, public safety and national defense Energy
  • 16. • Mobile payments/transactions • Mobile banking • ATMS • Identity Theft: • Identity management Biometric Security: access control facial recognition, voice recognition, iris and retina scanners, fingerprint sensors on tablets and smartphones – pass keys • Retail Commerce • Stock Markets Finance/Commerce
  • 17. • A sophisticated hacking scheme targeted the Bangladesh central bank ($81M stolen) in March 2016 • In March 2016, the U.S. Justice Department indicted seven hackers tied to the Iranian regime These hackers staged a coordinated cyber attack that targeted 46 major financial institutions and a dam outside of New York City • According to Websense Security Labs, the average number of attacks against financial services institutions is four times higher than that of companies in other industries • The Federal Bureau of Investigation estimated that more than 500 million financial records were hacked in 2013 • According to the Ponemon Institute, over 43% of companies had breaches last year (including mega companies such as Home Depot, JPMorgan, and Target • According to the Center For Strategic and International Studies (CSIS), cyber related crime now costs the global economy about $445 billion every year Finance/Commerce
  • 18. • The cybersecurity healthcare landscape has many facets. These include the information security networks of medical facilities and hospitals, medical equipment and devices, and protection of the sensitive data and privacy of patients • Interconnected Hospital networks with multiple devices • Health- Implantable devices; (bionic eyes, limbs) • Remote sensing tech (Wearables) • Telemedicine • Real-time biomarker tracking and monitoring • Refrigeration and storage Health & Medicine
  • 19. • Last year, a series of hospitals fell victim to ransomware attacks; one, the Hollywood Presbyterian Medical Center, paid the $17,000 ransom to unlock critical medical information • Another US hospital, Boston Children’s Hospital was the target of a series of breaches including distributed denial of service attacks. Medical institutions in Europe and Canada have also been subjected to intrusions. • Healthcare data is highly valuable to hackers because they can sell it for a high price on the black market • In 2015 36% of breaches included medical records Health & Medicine
  • 20. • A “connected transportation system,” and more specifically “connected cars” allow for safer and more efficient urban mobility. Connected car technology is evolving rapidly and is now being tested • A group of Virginia-based researchers funded by the Defense Department found that it is relatively easy to remotely hack into a driverless car’s control system Aviation: • LOT Polish Airlines had its flight operations system hacked, resulting in disruption or cancellation of 22 flights • American security researcher Chris Roberts claims to have accessed flight-critical controls through the in-flight entertainment system Transportation
  • 22. • Cisco predicts that 50 billion devices (including our smartphones, appliances, and office equipment) will be wirelessly connected via a network of sensors to the internet by 2020 • How do we protect cascading interconnectivity? IoT Verticals: • Smart Cities • Facilities & infrastructure management • Industrial applications • Energy (smart grid) • Medical & healthcare • Transportation • Building/construction (smart buildings) • Environment (waste management) • Water resources • Retail and supply chain, • Communications • Education (learning analytics) The Digital age and “The Internet of Things”
  • 23.
  • 25. • Defining and monitoring the threat landscape • Risk Management (identifying, assessing and responding to threats- i.e. NIST Framework: Identify, Protect, Detect, Respond, Recover) • Protecting critical infrastructure through rapid proto-typing of technologies and Public/Private cooperation • Modernizing security Architectures • Better encryption and biometrics (quantum encryption, keyless authentication) • Automated network-security correcting systems (self-encrypting drives) Cybersecurity Priorities
  • 26. • Technologies for continuous “real time” horizon scanning and monitoring of networks • Access Management and Control • Endpoint protection • Diagnostics, data analytics, and forensics (network traffic analysis, payload analysis, and endpoint behavior analysis) • Advanced defense for framework layers (network, payload, endpoint, firewalls, and anti-virus) • Enterprise and client Network isolation to protect against malware, botnets, insider threats • Forensics Cybersecurity Priorities
  • 27. Sutherland Government Solutions, Inc. (SGSI) mission is to ensure government can meet its vision of fully responding to citizen mandates. As a trusted partner, we enable government to succeed by providing smart, affordable and highly responsive customer care processes and solutions. Our Industry experience instills confidence in constituent oriented government operations. SGSI’s capabilities include rapidly deploying major contact centers, integrating citizen-centric IT services, and processing health and insurance benefit claims. SGSI’s technology-enabled services are performance force multipliers for government, especially in times of budget constraint. Sutherland's Services for Government Include: • Multi-Channel Constituent Relations • Veterans Choice: Customer Care • Healthcare & Insurance Claims Processing • Revenue Cycle Management • Analytics • IT Service Desks & Contact Centers • System Integration
  • 28. Charles (Chuck) Brooks serves as the Vice President for Government Relations & Marketing for Sutherland Global Services. Chuck leads Federal and State & Local Government relations activities. He is also responsible for the Marketing portfolio (Media, PR, Digital Outreach, Thought Leadership, Strategic Partnering, Branding) for the Federal and State & Local markets. Chuck is Chairman of the CompTIA Emerging Technologies Committee also serves on Boards to several prominent public and private companies and organizations. Chuck has extensive service in Senior Executive Management, Marketing, Government Relations, and Business Development and worked in those capacities for three large public corporations. In government, he served at the Department of Homeland Security as the first Director of Legislative Affairs for the Science & Technology Directorate. He also spent six years on Capitol Hill as a Senior Advisor to the late Senator Arlen Specter where he covered foreign affairs, business, and technology issues. In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught graduate level students about homeland security and Congress. He has an MA in International relations from the University of Chicago, and a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague. He is widely published on topics o fhomeland security, cybersecurity, and emerging technologies. Twitter: @ChuckDBrooks Linked in Profile: http://www.linkedin.com/in/chuckbrooks Email: Charles.Brooks@sutherlandglobal.com Chuck Brooks Bio:
  • 29. The problems that exist in the world today cannot be solved by the level of thinking that created them.