26
[email protected] Information Assurance for the 21st Century: The Human Firewall CILT 10/2012 Ed Puddicombe Puddico Ltd

Information Assurance for the 21st Century: The Human Firewall · The Human Firewall CILT 10/2012 Ed Puddicombe PuddicoLtd. [email protected] Information Assurance? [email protected] Ed

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

[email protected]

Information Assurance for the

21st Century:

The Human Firewall

CILT 10/2012

Ed Puddicombe

Puddico Ltd

[email protected]

Information

Assurance?

[email protected]

Ed Puddicombe

� Information Systems since 1999

� Information Security since 2005

�Southampton to Cambridge

�Security – Management – Exploitation

[email protected]

Objectives

Mitigation

Business Context

Security Industry

[email protected]

In the news…. StuxNet

� 2010

� US / Israeli (Alleged…)

� Nuclear Sabotage

� Siemens SCADA systems

� ‘Sniper’ targeting

� USB sticks and lax processes

[email protected]

In the news…. Flame

� 20x StuxNet & Prolific

� Targeting Middle East

� 650,000 lines

� KeyLogger

� Screenshots

� Microphone

� Bluetooth

� C&C infrastructure

� Self Destruct

� A ‘Cyber Weapon’

[email protected]

In the news….

WikiLeaks

� Late 2009 / Early 2010

� 251,287 United States diplomatic cables

� 400,000 classified army reports from the Iraq War

� 90,000 army reports from the war in Afghanistan

� Two videos

[email protected]

Origin of security risk?

� Anyone with access to a computer

[email protected]

Objectives

Mitigation

Business Context

Security Industry

[email protected]

Why you?

� Who you are / what you represent

� What you (might) have

� Who you (might) associate with

� Technical environment

� Insider

� None of the above – an accident!

[email protected]

In 2012 Large Orgs…

� 8% of IT Budget

� 93% been breached

� Cost of worst £110k-£250k

� 67% expect more breaches

� 80% have no security ROI

PWC - UK Information Security Survey 2012

[email protected]

Average Days to Recover

45.5

41.6

23.5

13.1

10.7

9.1

3.6

2.4

2.3

0 5 10 15 20 25 30 35 40 45 50

Malicious insiders

Malicious code

Web-based attacks

Denial of Service

Stolen Devices

Phishing and Social Engineering

Malware

Botnets

Viruses, Worms, Trojans

HP/Ponemon – Cost of CyberCrime Study 2011

[email protected]

Corporate Security

� Intimidating

�Barrier

�Advantage?

[email protected]

Objectives

Mitigation

Business Context

Security Industry

[email protected]

Defences

Business

Information

Processes

Logical Systems

Physical Systems

People

[email protected]

Driving force

� Who knows your business best?

� Who forms Strategy?

� Who gives direction?

� IT or Business?

[email protected]

New Approach

Security as a Culture

Supported by Technology

[email protected]

Business Assets

Given & Bought

Created

Entrusted Earned

[email protected]

What can you do?

� Your assets

� Value to you

� Value to others

� Response to loss

[email protected]

Look Outside In

� What is of interest to another party?

� What might the threat be?

� How can you mitigate threats?

[email protected]

Take away

� Dispel the myth:

� This is a real threat, posed in professional capacity

� Enable you to take action:

� Identify your Business Assets & their value

� Create Security Culture to protect your assets

[email protected]

Human Firewall?

Best Defence & Biggest Risk

[email protected]

ZEUS…

[email protected]

Questions?

[email protected]

Thank you

IP Seminar,

15 Nov 2012

Ed Puddicombe

Puddico.com