19
Outreach Program Cyber Awareness – An introduction to Cyber Security Commercial - In - Confidence

Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Outreach Program

Cyber Awareness – An introduction to Cyber Security

Commercial - In - Confidence

Page 2: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

First: Context!

Commercial - In - Confidence

A common perception

Page 3: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Dec 2017

Cybersecurity in NZ?

Page 4: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

NZ Cyberthreat Trends

• State sponsored.

• China

• Many victims are unaware.

• Ransomware

• Cryptocurrency mining

• Mobile and IoT

• Phishing

• Insider Threat

• Malware + Viruses

Commercial - In - Confidence

Page 5: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Dec 2017

Cybersecurity in NZ?

Page 6: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Cybersecurity in NZ?

Page 7: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Case Study

Page 8: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Case Study

Medical Clinic (NZ)

This centre was hit with three different sorts of malware. Encrypting files, stealing system performance. Prevented the clinic running as the appointments system, patient data and critical equipment was rendered inoperable

Recover costs: currently $25,000 and still going. Final cost: around $60,000

Main causes: poor network design and inadequate IT security.

Commercial - In - Confidence

Page 9: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Case Study

Oil Company

This company had a suspected Chinese State Sponsored malware. It is suspected that Computer Aided Design (CAD) sketches of every Oil station where exfiltrated out.

Recover costs: Unknown

Main causes: poor network design and inadequate IT security.

Commercial - In - Confidence

Page 10: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Case Study

District Health Board

Over 25 active malware running on the system for

potentially years. Every 24 hours there was 90,000

pages of A4 data exfiltrated out

Recover costs: $50,000+

Main causes: poor network design, old IT equipment,

poorly trained staff and inadequate IT security

Commercial - In - Confidence

Page 11: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

1. Patch Software

2. Upgrade or replace legacy systems

3. Disable unused services

4. Application Whitelisting

5. Change default credentials

6. Multi-factor authentication

7. Principle of Least Privilege

8. Implement and Test backups

9. Centralised logging

10.Manage your mobile devices

NZCERT Critical Controls

Page 12: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

End of Stand up Presentation

Commercial - In - Confidence

Page 13: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Tony Grasso - Cyber Toa

[email protected]

Commercial - In - Confidence

GCHQ, Hewlett-Packard and Oracle

Head of Cyber Engineering, Research & Development

Cyber Technical Lead at Department of Internal Affairs

Geek!

Page 14: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Consequence

Page 15: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Consequence

Aug 2017

Page 16: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Consequence

Page 17: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Who Commits Cybercrime?

• The Hacker

• Predator (dating/children exploitation)

• The Hacktivist

• Industrial Spies / Commercial Competitors

• Organised Crime Groups / Terrorist Groups

• Nation States (Government Sponsored)

• The Insider

Anybody with the means and motive

Commercial - In - Confidence

Page 18: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

Commercial - In - Confidence

Case Study

Page 19: Cyber Awareness An introduction to Cyber Security€¦ · Centralised logging 10.Manage your mobile devices NZCERT Critical Controls. End of Stand up Presentation Commercial - In

How can my company be protected?

• Whitelisting – Application Control

• Types of Application Control (what the vendors call Whitelisting)

• targets known malware (Blacklisting – Anti Virus)

• isolates new Apps in a virtual environment (Sandboxing)

• regulating user privileges (User Admin)

• installation control (doesn’t stop unruly software running)

• Execution control – actual Whitelisting – Whitecloud

• Penetration Testing

• Annual due to cost.

• Cyber Toa can do it monthly so you get 12 tests for half the normal price of your annual test elsewhere.

Commercial - In - Confidence