56
The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe © Copyright 2017 Protocol 46, Inc. All Rights Reserved

The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

“The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe”

™ © Copyright 2017 Protocol 46, Inc.

All Rights Reserved

Page 2: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

™ © Copyright 2017 Protocol 46, Inc.

All Rights Reserved

Page 3: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

AGENDA

TM

BRIEF Update on Cyber Threat Landscape

HR Involvement

Solutions

Q&A

Page 4: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

TM

Do we treat cybersecurity as:

an IT duty?an Operations duty?

or HR duty?

Page 5: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

eCellarSystems, LLC

Page 7: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

R.I.P. 201?

Page 8: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

TM

Page 9: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

TM

“If you have integrity,

….nothing else matters.

If you do NOT have integrity,

….nothing else matters.”

Page 10: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Mobile Threat

Data is now mobile and connected devices are the target

Commercial/Military UAVs

Artificial intelligence

Mobile payment

Networked telematics

Internet of things DDoS

Mirai Botnet

EVOLUTION OF THE CYBER THREATImpact of attacks growing as technology becomes more inter-connected

Unsophisticated Attacks

Exploration and Experimentation (Damage normally caused by accident)

Hacks conducted for Notoriety

1987 Christmas Tree Exec Worm

Attacks with a Purpose

Hackers identifying how to exploit weaknesses. Damage and Disruption done on purpose

Distinction between Script Kiddies and Hackers develops

Emergence of commercial internet (Web 1.0)

1992 – 1260 Virus (1st

Polymorphic Virus

1996- Cryptoviralogy is born

Age of Email

Hackers utilize email as the delivery system for worms and viruses

Criminal organizations start building infrastructure to exploit cyber crime.

Most activity is web defacement/network break-ins with limited data theft.

2002 – Web 2.0

Advent of BOT Attacks

RISE OF THE ELITE HACKER

Cyber Crime becomes monetized. (Data sales and Ransomware)

Widespread state sponsored attacks

Hackers start utilizing tertiary networks to breach the target.

Cyber Activism become commonplace

2010 – Operation Aurora revealed

June 2010 – Stuxnetreleased

Low

1990s 2000s1980s

High

Cyber terrorism

Insecure codes

Cyber crime

Identity theft

Hackers

Data breach

Network attacks

Malware

Critical infrastructure attacks

Foreign state sponsored cyber espionage

Cyber warfare

FUTURE2010-2016

BU

SIN

ES

S IM

PA

CT

Page 11: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cybersecurity 2017 Trends• 'Malware’ as a precision tool to breach

an organization’s defenses

• Ransomware

• Phishing

Page 12: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

0

50

100

150

200

250

Q1 2015 Q2 2015 Q3 2015 Q4 2015 Q1 2016 Q2 2016 Q3 2016 Q4 2016 Q1 2017

Volume of Spam 2015 - 2017In Excess of 205 Billion email per DAY

Page 13: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

0

100,000

200,000

300,000

400,000

500,000

600,000

700,000

800,000

900,000

1,000,000

2007 2008 2009 2010 2011 2012 2013 2014 2015 2016

Volume of Malware 2007-20161 Million New Incidents Per DAY

Page 14: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Crime• Is Big Business for

Hackers

• Easy and Profitable to Sell Data

Page 15: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

© Copyright Protocol 46 2017. All Rights Reserved.

Page 16: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

• “Monetized” their activity

• More sophistication

• Smaller organizations targeted

Hacker ActivityPast to CurrentHacker ActivityPast to Current

Page 17: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cost to any organization of a cyber-attack can literally destroy a

business.

Page 18: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

- 2016 Ponemon Institute Cost of Data Breach Study

$Healthcare

$245Financial

$123Transportation

$71Public

$200Education

$149Industrial

$154Retail

$137Energy

$450

$400

$350

$300

$250

$200

$150

$100

$ 50

$0

Per-Record Data Breach Costs

by Industry

Page 19: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Norton / Symantec Corp: July 2016

Cost / Profit from Crime

• Global black market in marijuana, cocaine and heroin COMBINED: $288 billion

• Cost of global cybercrime: $388 billion and growing

Page 20: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Information from:

2016: • 1,093 data breaches in U.S. (TRACKED)

- almost half of World breaches

• 900,000,000 Records Stolen

Page 21: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Information from:

• Average consolidated cost of a data breach in 2016 was $17.36 million.

• Average small size company breach cost was $454,000

Page 22: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Information from:

Minimum Cost of Breach:• Small Company was

$300,000

• Medium size company was $6.7 million

• Large size company was

$73.75 million

Page 23: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

“Economic cost”and

Reputational Costs

are Significant.

Page 24: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Only 6% of Companies will Survive Longer than 2

Years after a Data Breach.Gartner Research

Page 25: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

A FIREWALL

AND

ANTI-

MALWARE

SOFTWARE

ARE NOTADEQUATE

PROTECTION!

Page 26: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

You MIGHT be THINKING...

...But we have

our IT guys

protecting us

Page 27: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

• Break / Fix

• Install Software

• Keep machines working

• Re-active

IT Department

CRITICAL TO UNDERSTAND DIFFERENCES

Works to:

• Detect

• Analyze

• Defend

• Proactive

Cyber Security

Your HR and IT Department’s Best Friend™

Page 28: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

• Break / Fix

• Install Software

• Keep machines working

• Re-active

IT Department

CRITICAL TO UNDERSTAND DIFFERENCES

Prevents Bad Guys from:

• Gaining access to Company records

• Holding Company Hostage

Cyber Security

Your HR and IT Department’s Best Friend™

Page 29: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Nationally, the time elapsed from the initial breach to when the breach is detected exceeds 200 days- Accenture

Page 30: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Time from the detection of a new vulnerability by

to client notification is under 24 Hours

Page 31: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

The Alliance NetworkJanuary 2016

TheSOLUTION

Military Grade Cyber Security Prevention and Protection

Page 32: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Best Defense is often Prevention85% of All Cyber

Security Attacks Can be Stopped by

Implementing

5 Cyber Security Tools

Page 33: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

OUR SUITE of PRODUCTS

NimbleFeather™

Picket Fence™

RazorWire™

Stonewall Aegis™

TitaniumCastle

• We assess and rank a company’s vulnerabilities to hacking. This gives the Company’s IT department the ability to fix these weaknesses.

• Remember the IT department can't fix what it doesn’t know about.

• Your HR and IT Department’s Best Friend™

Page 34: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security Protection

Page 35: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

Page 36: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

© Copyright 1997, 2009 Protocol 46, Inc.

Page 37: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

© Copyright 1997, 2009 Protocol 46, Inc.

Page 38: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

© Copyright 1997, 2009 Protocol 46, Inc.

Page 39: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

© Copyright 1997, 2009 Protocol 46, Inc.

Page 40: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

© Copyright 1997, 2009 Protocol 46, Inc.

Page 41: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

© Copyright 1997, 2009 Protocol 46, Inc.

Page 42: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

True Cyber Security Protection

Defense in Depth

Page 43: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Protocol 46 Bitdefender

Nimble Feather

Stonewall Aegis

Picket Fence

Razor Wire

True Cyber Security Protection

TRUE CYBERSECURITY

PROTECTION

PROTOCOL46

PROTECTION

Page 44: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

OUR COMPANY ADVANTAGE

COMPETITION

AFFORDABILITY

Ease of UsePlug and Play

ReportsPull All Information Together

Page 45: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

OUR COMPANY ADVANTAGE

COMPETITION

Military and 3 Letter Agency Cyber Security Expertise and

Experience

Fighting an A-Typical War

Page 46: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

OUR COMPANY ADVANTAGE

COMPETITION

Our Solutions

are PRO-ACTIVE

rather than

REMEDIAL

Page 47: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

OUR COMPANY ADVANTAGE

COMPETITION

We get AHEAD of the Breach

Not Clean up the Mess After

Page 48: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

OUR COMPANY ADVANTAGE

COMPETITION

PRO-ACTIVE

Multi device/sensor concept make us different / better than the competition

All Protocol 46 tools work in concert to provide continuous scanning and multiple layers of proactive

protection.

Page 49: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

OUR COMPANY ADVANTAGE

COMPETITION

PRO-ACTIVEOur solutions are monitored and updated in

response to the cyber threat-scape.

Competitors or other products do not update, do not upgrade or have the ability to change like we do.

Page 50: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

TM

Do we treat cybersecurity as:

an IT duty?An Operations duty?

or HR duty?

Page 51: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Q and A

Page 52: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

THANK YOU!Scott [email protected](763) 276-3493

Chuck [email protected](612) 747-5860

Page 53: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

CYBER SECURITY CHECKLIST

Can you answer

How much is the issue of security integrated into your business?

Is our security clear and consistent?

How do we monitor our systems and prevent breaches?

How often do we verify the effectiveness of our security?

Do our security goals align with business priorities?

Do we have the basic rights for security measures?

What is our plan to respond to a data breach? Are we adequately insured?

Are third parties really securing our most valuable information?

Have we identified and protected our most valuable processes and information?

Do we treat cybersecurity as an IT, an Operations, or a HR duty?

Cybersecurity

checklistCan you answer these questions about your

business?

Page 54: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

• Inventory of Authorized and Unauthorized

Devices• Inventory of Authorized and Unauthorized

Software• Secure Configurations for Hardware and

Software• Continuous Vulnerability Assessment and

Remediation

• The one we don’t do is:• Controlled Use of Administrative Privileges

Page 55: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

• Bitdefender

• Nimble Feather

• Stonewall Aegis

• Picket Fence

• Razor Wire

True Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats

Page 56: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment

Proud to be Veteran owned

Over 150 years of Military Intelligence and Cyber Security Experience.