11
CRITICAL INFRASTRUCTURE AND CYBER THREAT SAFER CITIES. THRIVING COMMUNITIES.

Critical Infrastructure and Cyber Threat

Embed Size (px)

Citation preview

Page 1: Critical Infrastructure and Cyber Threat

CRITICAL INFRASTRUCTURE AND CYBER THREATSAFER CITIES. THRIVING COMMUNITIES.

Page 2: Critical Infrastructure and Cyber Threat

CRITICAL INFRASTRUCTURE AND CYBER THREAT

Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation’s security and stability.

Page 3: Critical Infrastructure and Cyber Threat

16 CRITICAL INFRASTRUCTURE SECTORS

Department of Homeland Security classified the top 16 sectors at risk to cyber attacks

Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors

CRITICAL INFRASTRUCTURE AND CYBER THREAT

16 CRITICAL INFRASTRUCTURE SECTORS

Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors

1. CHEMICAL2. COMMERCIAL FACILITIES3. COMMUNICATIONS SECTOR4. CRITICAL MANUFACTURING5. DAMS6. DEFENSE INDUSTRIAL BASE7. EMERGENCY SERVICES8. ENERGY

9. FINANCIAL SERVICES 10. FOOD AND AGRICULTURE 11. GOVERNMENT FACILITIES12. HEALTHCARE AND PUBLIC HEALTH 13. INFORMATION TECHNOLOGY14. NUCLEAR REACTORS, MATERIALS, AND WASTE15. TRANSPORTATION SYSTEMS16. WATER AND WASTEWATER

DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT RISK TO CYBER ATTACKS

Page 4: Critical Infrastructure and Cyber Threat

CRITICAL INFRASTRUCTURE AND CYBER THREAT

INTERCONNECTED SYSTEMS

• The continued increase of interconnected systems and devices provide cyber criminals limitless attack vectors. 25 billion networked devices are projected by 2020.

Source: ITU’s Trends in Telecommunication Reform 2015, http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf

Page 5: Critical Infrastructure and Cyber Threat

CRITICAL INFRASTRUCTURE AND CYBER THREAT

MALWARE OUTBREAK• 1 million new malware instances released every day• Ransomware attacks soared 113% in prior year• Increasing number of zero day attacks

Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp

Page 6: Critical Infrastructure and Cyber Threat

UNAUTHORIZED CONNECTIONSCRITICAL INFRASTRUCTURE SECTORS TOP THE LIST

Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jspPWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf

*Risk Ratio of Spear-Phishing Attacks by Industry

CRITICAL INFRASTRUCTURE AND CYBER THREAT

INDUSTRY RISK RATIO* INDUSTRY RISK RATIO”

Mining

Wholesale

Manufacturing

Transportation, Communications, Electric, Gas & Sanitary Services

Public Administration(Government)

Finance, Insurance & Real Estate

44%

34%

33%

29%

21%

21%

1 in 3.41 in 2.3

1 in 2.9

1 in 3.0

1 in 3.4

1 in 4.8

Page 7: Critical Infrastructure and Cyber Threat

CRITICAL INFRASTRUCTURE AND CYBER THREAT

SOURCE:, InformationWeek's 2013 enterprise security survey, http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic-Security-Survey.html

BRING YOUR OWN DEVICE (BYOD)

• 45% of organizations have had a mobile device containing

enterprise data reported missing

• 11% have experienced a data breach requiring public disclosure

Page 8: Critical Infrastructure and Cyber Threat

SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft-subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html

IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras-installed-globally-in-2014

CRITICAL INFRASTRUCTURE AND CYBER THREAT

FIXED CAMERA

• More than 210 million CCTV cameras worldwide

• 73,011 locations with unsecured cameras in 256 countries

Page 9: Critical Infrastructure and Cyber Threat

INSIDER THREAT• 55% of threats come from insider abuse or misuse

• 32% of organizations report insider crimes are more costly or damaging than incidents caused by outsiders

SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf

CRITICAL INFRASTRUCTURE AND CYBER THREAT

Page 10: Critical Infrastructure and Cyber Threat

Motorola Solutions has in depth experience, expertise and robust capability to assist with today's cyber risk challenges.We take a comprehensive approach to help customers

• Evaluate Environment• Assess Threats• Manage Risk

Unique to each customer's operational setting. Visit us at motorolasolutions.com/cybersecurity

CRITICAL INFRASTRUCTURE AND CYBER THREAT

Page 11: Critical Infrastructure and Cyber Threat

THANK YOU!