3. Introduction to the Global Threat
1. Thousands of IT Systems are compromised every day
2. Attacks can be political but most commonly are to steal money or secrets
3. The magnitude of the attacks pose a real threat to Britain's economic state
4. No such thing as 100% Protection
4. Definition - What is an APT
An advanced persistent threat is a network attack in which an
unauthorized person gains access to a network and stays there
undetected for a long period of time.
The purpose of an APT attack is to steal data rather than to
cause damage.
What distinguishes an APT from other threats is it is targeted,
persistent, evasive and advanced
5. 2014 – IF ONLY WE KNEW
Security breaches are inevitable
Headliners
•Sony
•JP Morgan
•PSN – DDOS
•Home Depot
7. Why should you care?
•Data Destroyed, Stolen, Exposed
•Present and former employees personally impacted
•Lawsuits
•Brand Damage
•REPUTATION
•Decrease in share prices
8. Q. A Disaster puts you at risk and
you’re off limits for 3 days. Are you?
A, Well Prepared
B, Somewhat Prepared
C, Not clear
D, In Deep Trouble
9. Security Strategies:
•To attack the security gap, organizations need smart people, visibility into
their networks, endpoints and logs.
•Organisations also need actionable threat intelligence that identifies
malicious activity faster.
•Protecting your computer with a standalone anti-virus solution only is
simply no longer enough to protect your devices and your sensitive
information.
•A comprehensive, 360-degree security solution is entry level protection
Breaches are inevitable — how will you cope
10. Mandiant a helping hand
• Mandiant is the ONLY information security
company that can show:
•WHEN
•IMPACT
• More than 30% of the Fortune
100 have turned to us when
they’ve been under assault
• We Complement Your Capabilities With
Ours
There Is Strength In Fingerprints
• We Have Undisputed Experts
12. The Year Ahead
• In 2015 the public and press will be on high alert Re:
privacy and security
• Malicious messages that look like the real thing
• Ransomware moves into the cloud and onto your
phone
• Point-of-sale attacks
• Targeting the 'one percent‘
13. Conclusion
You will be breached, it may not be now
and it may not be big but it will happen!!.
Are you ready for it?
Any questions?
Notas do Editor
Faded background picture
(Basic)
To reproduce the background effects on this slide, do the following:
On the Home tab, in the Slides group, click Layout and then click Blank.
Right-click the slide and click Format Background.
In the Format Background dialog box, click Fill in the left pane. In the Fill pane, select Picture or texture fill, and then under Insert from, click File.
In the Insert Picture dialog box, select a picture, and then click Insert.
Also in the Format Background dialog box, in the Fill pane, in the Transparency box, enter 85%.
Cyber threat actors continued to target a diverse array of industries.
While organizations are detecting compromises two weeks sooner than they did a year ago, they are less likely to discover a breach on their own compared to a year ago.
Preparing to respond to: – Security breaches, data theft – Privacy incidents, internal fraud – Extreme weather, man-made disasters • At all levels: – Communications, people, processes, data and systems, recovery, analysis
Strategies for success • Are you responsible for protecting data and systems? • Don’t panic, you are not alone • Leverage heightened awareness (courtesy Snowden-Target- HomeDepot-Sony-JPMorgan) • Take a structured approach
Targeting the 'one percent'
While cybercriminals may target a specific company or a government entity, they don't generally spend time targeting an individual because the potential financial payoff isn't worth their time. But wealthy consumers are the exception, said Stephen Coggeshall, chief analytics and science officer at identity theft firm LifeLock.
"I would expect cybercriminals to take a more active eye toward the wealthy, the 1 percenters," Coggeshall said. "If criminals think they can get some serious money from a victim, they can afford to spend more time on an individualized attack."
Even if you're part of the "99 percent," Coggeshall warns consumers should avoid giving out information like birthdays, employers and other biographical details on Facebook and other sites. Criminals can be crafty about leveraging this information.