Upload
motorola-solutions
View
593
Download
0
Embed Size (px)
Citation preview
CRITICAL INFRASTRUCTURE AND CYBER THREATSAFER CITIES. THRIVING COMMUNITIES.
CRITICAL INFRASTRUCTURE AND CYBER THREAT
Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation’s security and stability.
16 CRITICAL INFRASTRUCTURE SECTORS
Department of Homeland Security classified the top 16 sectors at risk to cyber attacks
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
CRITICAL INFRASTRUCTURE AND CYBER THREAT
16 CRITICAL INFRASTRUCTURE SECTORS
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
1. CHEMICAL2. COMMERCIAL FACILITIES3. COMMUNICATIONS SECTOR4. CRITICAL MANUFACTURING5. DAMS6. DEFENSE INDUSTRIAL BASE7. EMERGENCY SERVICES8. ENERGY
9. FINANCIAL SERVICES 10. FOOD AND AGRICULTURE 11. GOVERNMENT FACILITIES12. HEALTHCARE AND PUBLIC HEALTH 13. INFORMATION TECHNOLOGY14. NUCLEAR REACTORS, MATERIALS, AND WASTE15. TRANSPORTATION SYSTEMS16. WATER AND WASTEWATER
DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT RISK TO CYBER ATTACKS
CRITICAL INFRASTRUCTURE AND CYBER THREAT
INTERCONNECTED SYSTEMS
• The continued increase of interconnected systems and devices provide cyber criminals limitless attack vectors. 25 billion networked devices are projected by 2020.
Source: ITU’s Trends in Telecommunication Reform 2015, http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf
CRITICAL INFRASTRUCTURE AND CYBER THREAT
MALWARE OUTBREAK• 1 million new malware instances released every day• Ransomware attacks soared 113% in prior year• Increasing number of zero day attacks
Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
UNAUTHORIZED CONNECTIONSCRITICAL INFRASTRUCTURE SECTORS TOP THE LIST
Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jspPWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf
*Risk Ratio of Spear-Phishing Attacks by Industry
CRITICAL INFRASTRUCTURE AND CYBER THREAT
INDUSTRY RISK RATIO* INDUSTRY RISK RATIO”
Mining
Wholesale
Manufacturing
Transportation, Communications, Electric, Gas & Sanitary Services
Public Administration(Government)
Finance, Insurance & Real Estate
44%
34%
33%
29%
21%
21%
1 in 3.41 in 2.3
1 in 2.9
1 in 3.0
1 in 3.4
1 in 4.8
CRITICAL INFRASTRUCTURE AND CYBER THREAT
SOURCE:, InformationWeek's 2013 enterprise security survey, http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic-Security-Survey.html
BRING YOUR OWN DEVICE (BYOD)
• 45% of organizations have had a mobile device containing
enterprise data reported missing
• 11% have experienced a data breach requiring public disclosure
SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft-subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html
IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras-installed-globally-in-2014
CRITICAL INFRASTRUCTURE AND CYBER THREAT
FIXED CAMERA
• More than 210 million CCTV cameras worldwide
• 73,011 locations with unsecured cameras in 256 countries
INSIDER THREAT• 55% of threats come from insider abuse or misuse
• 32% of organizations report insider crimes are more costly or damaging than incidents caused by outsiders
SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf
CRITICAL INFRASTRUCTURE AND CYBER THREAT
Motorola Solutions has in depth experience, expertise and robust capability to assist with today's cyber risk challenges.We take a comprehensive approach to help customers
• Evaluate Environment• Assess Threats• Manage Risk
Unique to each customer's operational setting. Visit us at motorolasolutions.com/cybersecurity
CRITICAL INFRASTRUCTURE AND CYBER THREAT
THANK YOU!