breakfast business seminars autumn 2015
play

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - PowerPoint PPT Presentation

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


  1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cyber Security: Protecting your business from attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Breakfast Business Seminars, Autumn 2015 . . . . . . . . . . . Wednesday 14 October 2015 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

  2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Build your business with our Autumn seminars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Wednesday 14 October: Cyber Security . . . . . . . . . . . Wednesday 11 November: Social Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . cranfieldtechnologypark.co.uk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

  3. . . . . . . . . . . . Cyber Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Phil Cobley . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Regional Cyber Protect Coordinator . . . . . . . . . . . . . . . . . . . . . . ERSOU (East Region Special Operations Unit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

  4. Cyber Security and Cyber Criminality: The Facts Sergeant Phil Cobley Regional Cyber Crime Unit

  5. What we shall discuss … n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime Investigations? n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute

  6. Firstly … who is this guy?! n 10 years experience in the Police n Was previously the Digital Forensics Manager and Cyber Crime Investigations Manager at Bedfordshire Police n Now the Regional Cyber Protect Coordinator n Qualified Digital Forensics Practitioner and Network Investigator n Currently studying BSc Software Development n Force Practitioner Lead on Cybercrime n Guest Lecturer at University of Bedfordshire on Cyber Crime n Sit on the National ISO 17025 Standards Expert Network n Published in the law Journal ‘ Cyber Security Law & Practice ’ n Co-authored the recently released eBook produced by the NCCR – “ A Practical Guide to Coping with Cyberstalking ”

  7. What is Cyber Crime?

  8. Cyber crime IS crime … The adopted definition of Cyber Crime is: • Cyber Dependent Crimes , where a digital system is the target as well as the means of attack. These include attacks on computer systems to disrupt IT infrastructure, and stealing data over a network using malware (the purpose of the data theft is usually to commit further crime). • Cyber Enabled Crimes . ‘Existing’ crimes that have been transformed in scale or form by their use of the Internet. The growth of the Internet has allowed these crimes to be carried out on an industrial scale. • The use of the Internet to facilitate drug dealing, people smuggling and many other 'traditional' crime types.

  9. Think Digital

  10. Think Digital

  11. Which of these is a cyber threat? Common house hold ‘smart’ goods are now being hacked and used in Spam and DDOS activity

  12. Is it really such a big deal?

  13. We live our lives online 3bn people will be using the internet worldwide by 2016 and by the end of the year, networked devices will outnumber people by six to one On average each household has 3 internet enabled devices and 2/5 adults have smart phones 8% of GDP generated through the internet economy £121bn in 2010 with Household annual retail sales worth £2.6bn with 30% year on year growth

  14. Estimated cost of Cyber Crime … £27billion – 2% GDP (Detica 2011) £21 billion to business n £2.2 billion to government n £3.1 billion to ‘Jo Public’ n 44m cyber attacks in 2011 in UK n National Security Strategy Tier 1 threat

  15. Crime Survey for England & Wales 2012 n One in three adults suffered online crime in the previous 12 months n One in five suffered offline crime Federation of Small Business (21/05/12) 41% of members suffered cyber crime In the last 12 months cost of £800m 20% had taken no steps to protect themselves

  16. Regional & Local Capabilities within Law Enforcement

  17. National Regional Organised Crime Units (ROCUs) (NEROCU) (ODYSSEY) (TITAN) (EMSOU) (ERSOU) (TARIAN) (London ROCU) (WMROCU) (SEROCU) (ZEPHYR)

  18. National Structure National/ International NCA Regional Organised Crime Cross Border Units (ERSOU) Local Forces First Responders & Local Investigations (Beds, Herts, Cambs, Norfolk, Suffolk & Essex)

  19. Some Examples Local Investigation: n SME n Insider Threat n Data deletion / Website Defaced / Malicious Transactions Regional Investigation: n Large Corporation n £14m worth of data extracted over several months n Multiple offenders across several regions working as a gang n Numerous attack vectors

  20. Ask yourself … n Do you know the value of your data? n Reputational Damage/IP/Trust…what if these were effected? n Do you know where you data is stored? n Who has access to your data? n Do you have backups? n Do you really know your employees? n Do you have suitable business continuity and disaster recovery in place? n What would you do if you lost all your data tonight? n Do you know what your responsibilities are if you have a data breach?

  21. What support is out there?

  22. Resources – Get Safe Online

  23. Resources – Cyber Streetwise

  24. Resources – CESG – 10 Steps

  25. Resources – Cyber Essentials

  26. Innovation Vouchers https://interact.innovateuk.org/competition-display-page/-/asset_publisher/RqEt2AKmEBhi/content/cyber-security- innovation-vouchers-round-13#

  27. CiSP Cyber Information Sharing Partnership

  28. CiSP Cyber Information Sharing Partnership What is the Cyber-security Information Sharing Partnership (CiSP)? n CiSP is a joint industry and government scheme based in CERT-UK. CiSP is an online social networking tool and enables its members to exchange information on threats and vulnerabilities as they occur in real time.

  29. Basic steps to stay in control

  30. What we discussed … n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime Investigations? n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute

  31. Questions? Thank you for coming! Sergeant Phil Cobley Regional Cyber Protect Coordinator Eastern Region Cyber Crime Unit ERSOU phil.cobley@ersou.pnn.police.uk

  32. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Autumn Seminars 2015 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . cranfieldtechnologypark.co.uk . . . . . . . . . . . info@cranfieldtechnologypark.co.uk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend