7
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) STRATEGIC INSIGHTS: CYBER (IN)SECURITY, THE AMERICAS AND U.S. NATIONAL SECURITY STAYING IN THE GAME – EMPOWERING SOC PROFESSIONALS THROUGH A METHODOLOGY DRIVEN, TECHNOLOGICAL APPROACH TO INCIDENT ANALYSIS AND ATTRIBUTION WHO’S WATCHING YOU? CYBER INSIDER RISK MITIGATION MATURITY MATRIX THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY ACCOUNT HACKS: THE USER OR THE COMPANY – WHO’S TO BLAME? LAZARUS: DATA LEAKAGE WITH PGP AND RESURRECTION OF THE REVOKED USER JUSTIFIED PHYSICAL RESPONSE TO CYBER ATTACKS Cyber Security Review Autumn 2016

Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

ISSN 2055-6950 (Print)ISSN 2055-6969 (Online)

STRATEGIC INSIGHTS: CYBER (IN)SECURITY,THE AMERICAS AND U.S. NATIONAL SECURITY

STAYING IN THE GAME – EMPOWERING SOC PROFESSIONALS THROUGH A METHODOLOGY DRIVEN, TECHNOLOGICAL APPROACH

TO INCIDENT ANALYSIS AND ATTRIBUTION

WHO’S WATCHING YOU?

CYBER INSIDER RISK MITIGATION MATURITY MATRIX

THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY

ACCOUNT HACKS: THE USER OR THE COMPANY – WHO’S TO BLAME?

LAZARUS: DATA LEAKAGE WITH PGPAND RESURRECTION OF THE REVOKED USER

JUSTIFIED PHYSICAL RESPONSE TO CYBER ATTACKS

Cyber Security ReviewAutumn 2016

Page 2: Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

INCORPORATING

The UK’s Flagship Event for a Global End-User Security Audience

www.uksecurityexpo.com/csr

• 8000+ visitors from the public and private sector• 250+ exhibitors showcasing the latest security solutions• Live response demonstrations and technology workshops• 6 CPD certified free to attend conferences

TRANSPORTSECURITY CONFERENCE

CNI CONFERENCE

DESIGNING OUT TERRORISM CONFERENCE

PROTECTING CROWDED PLACES CONFERENCE

GLOBAL COUNTER TERRORISM CONFERENCE

MAJOR EVENTS CONFERENCE

FREE TO ATTEND REGISTER NOW

DESIGN | SECURE | RESPOND

Cyber Security Highlights Include:• Cyber in the boardroom• Cyber securing the built

environment• Mitigating the cyber risk to

aviation• The cyber threat for business

• Collaboration and information sharing for effective cybersecurity

• Cyber securing the maritime environment

• Why current approaches to managing cyber risk are not enough

Plus don’t miss the demonstration of cyber security systems

In association with

Page 3: Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

3cybersecurity-review.com

Cyber Security Review Published by Delta Business Media Limited3rd floor, 207 Regent StreetLondon W1B 3HHUnited Kingdom

Tel: +44 (0) 20 7193 2303Fax: +44 (0) 20 3014 7659info@deltabusinessmedia.comwww.deltabusinessmedia.comwww.cybersecurity-review.com

ISSN 2055-6950 (Print)ISSN 2055-6969 (Online)

EDITORIAL CONTRIBUTORS

The opinions and views expressed in the editorial content in this publication are those of the authors alone and do not necessarily represent the views of any organisation with which they may be associated. Material in advertisements and promotional features may be considered to represent the views of the advertisers and promoters. The views and opinions expressed in this publication do not necessarily express the views of the publisher. While every care has been taken in the preparation of this edition, the publisher is not responsible for such opinions and views or for any inaccuracies in the articles.

© 2016. The entire contents of this publication are protected by copyright. Full details are available from the publisher. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical photocopying, recording or otherwise, without the prior permission of the copyright owner.

MEDIA PARTNERS

Page 4: Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

CONTENTS

4 CYBER SECURITY REVIEW, Autumn 2016

IFC UK SECURITY EXPO 2016

5 CDANS - CYBER DEFENCE & NETWORK SECURITY CONFERENCE

6 ISDEF 2017 – 8TH INTERNATIONAL DEFENCE & HLS EXPO

7 9TH INTERNATIONAL CYBERSECURITY FORUM

8 WORLD CYBERSECURITY CONGRESS 2017

9 STRATEGIC INSIGHTS: CYBER (IN)SECURITY, THE AMERICAS AND U.S. NATIONAL SECURITY By Dr. Jose de Arimateia da Cruz, Professor of International Relations/Comparative Politics at Armstrong State University

16 CYBER INTELLIGENCE ASIA 2017

17 STAYING IN THE GAME – EMPOWERING SOC PROFESSIONALS THROUGH A METHODOLOGY DRIVEN, TECHNOLOGICAL APPROACH TO INCIDENT ANALYSIS AND ATTRIBUTION By Aaron (Ronnie) Eilat, General Manager, Custodio Pte Ltd, IAI’s cyber early warning R&D Center in Singapore

20 COMEX EXHIBITION AND CONFERENCE 2017

21 WHO’S WATCHING YOU? By Dominic Lyons, a Senior Technical Pre-Sales Network Architect at Tellemachus

26 CONNECT:ID 2017

27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL

34 MILSIM ASIA 2017

35 THE RAPID EVOLUTION OF THE RANSOMWARE INDUSTRY By Patrick Vibert, Senior Consultant, Cyber Threat Intelligence, Control Risks

41 INTERPOL WORLD 2017

CONTENTS

Page 5: Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

Proudly presentsCYBER

Improving national resilience to cyber threats

Key Speakers for 2017 include:

150+ Attendees

20+ Senior Cyber Security Speakers

14+ Hours Reserved For Networking

Insight from across government, law enforcement and military

Pre-conference workshop: 24th January 2017 | Main Conference Dates: 25th – 26th January 2017

Prospero House, London, UK

Major General Jim Hockenhull

DCI3UK MoD

Don DavidsonDeputy Director, CS Implementation &

Acquisition Integration Chief, CS Lifecycle Risk

ManagementDoD CIO’s Offi ce

Sherill NicelyCISOCIA

Deborah PettersonHead of Energy Cyber Security, Department

of BusinessEnergy &

Industrial Strategy

Philip QuadeChief of

Cyber Task ForceNSA

The CDANS event was valuable as I was able to meet several key personnel that face the very same problems as I do, their experience is a great reach back. The topics were all interesting and valued the discussions

Branch Chief, DoD

Register online at www.cdans.org

Page 6: Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

CONTENTS

6 CYBER SECURITY REVIEW, Autumn 2016

42 EUROPEAN SMART GRID CYBER SECURITY 2017

43 ACCOUNT HACKS: THE USER OR THE COMPANY – WHO’S TO BLAME? By Mike Milner, CTO and Co-founder, IMMUNIO 46 IDEF 2017 – 13TH INTERNATIONAL DEFENCE INDUSTRY FAIR

47 LAZARUS: DATA LEAKAGE WITH PGP AND RESURRECTION OF THE REVOKED USER By Rodrigo Ruiz, CTI Renato Archer and Rogério Winter, Brazilian Army, Campinas, Brazil

54 ISDEF 2017 – 8TH INTERNATIONAL DEFENCE & HLS EXPO

55 JUSTIFIED PHYSICAL RESPONSE TO CYBER ATTACKS By Joseph W. Smotherman, Commander in the United States Navy

67 BIDEC 2017 - BAHRAIN’S PREMIER INTERNATIONAL TRI-SERVICE DEFENCE SHOW

OBC ISRAEL AEROSPACE INDUSTRIES - IAI

THE 8TH INTERNATIONAL DEFENSE & HLS EXPO

VISIT OUR WEBSITE

WWW.ISDEFEXPO.COM

JUNE 6-8

2017TEL- AVIV

THE RIGHT placeTHE RIGHT timeTHE RIGHT people

Contact us now for more detailsExhibition & Sponsorship Opportunities: [email protected] General Information: [email protected]. +972 3 691 4564 | Fax. +972 3 691 4567

Page 7: Cyber Security Review · 27 CYBER INSIDER RISK MITIGATION MATURITY MATRIX By Chris Hurran, OBE, Senior Associate Fellow of the Institute for Security and Resilience Studies, UCL 34

www.cybersecurity-review.com

Published by Delta Business Media3rd floor, 207 Regent Street, London, W1B 3HH, United Kingdom

Tel: +44 (0) 20 7193 2303 Fax: +44 (0) 20 3014 [email protected] www.deltabusinessmedia.com

To receive a full version of the Cyber Security Review, please complete the Request Form Here.

Please provide a valid corporate, government or academic email address. We reserve the right to refuse to accept any

application at our discretion.

If you have any queries please email to: [email protected]

REQUEST YOUR COPY OF THE CYBER SECURITY REVIEW