CRITICAL INFORMATICS
Our stuff keeps your stuff from becoming their stuff
www.criticalinformatics.com CRITICAL INFORMATICS January 31, 2018
CRITICAL INFORMATICS Our stuff keeps your stuff from becoming their - - PowerPoint PPT Presentation
CRITICAL INFORMATICS www.criticalinformatics.com January 31, 2018 CRITICAL INFORMATICS Our stuff keeps your stuff from becoming their stuff CRITICAL INFORMATICS www.criticalinformatics.com Page 2 UW UW T Tec ech h Co Conn nnec ect
Our stuff keeps your stuff from becoming their stuff
www.criticalinformatics.com CRITICAL INFORMATICS January 31, 2018
Page 2 www.criticalinformatics.com CRITICAL INFORMATICS
www.criticalinformatics.com Page 3 CRITICAL INFORMATICS
multiple millions elsewhere
critical services
www.criticalinformatics.com Page 4 CRITICAL INFORMATICS
www.criticalinformatics.com Page 5 CRITICAL INFORMATICS
www.criticalinformatics.com Page 6 CRITICAL INFORMATICS
www.criticalinformatics.com Page 7 CRITICAL INFORMATICS
www.criticalinformatics.com Page 8 CRITICAL INFORMATICS
immediate takeover
www.criticalinformatics.com Page 9 CRITICAL INFORMATICS
produce products that are certified as free of known security defect
require any attestation of product security as a requirement for purchase
Integrators – do not install products with security controls
ions – does not address roles and responsibilities delineation for security
www.criticalinformatics.com Page 10 CRITICAL INFORMATICS
https://bol.bna.com/threats-of-litigation-after-data-breaches-at-major-law- firms/ https://www.rawstory.com/2016/09/yahoo-sued-for-gross-negligence-over- cyber-attack-that-exposed-500-million-accounts/ https://www.scmagazine.com/after-the-breach-settlement-expected-for-50m- home-depot-customers/article/529135/ http://www.bizjournals.com/phoenix/blog/health-care-daily/2016/08/class- action-cyber-attack-lawsuit-against-banner.html
www.criticalinformatics.com Page 11 CRITICAL INFORMATICS
Another key area to focus on is litigation exposure. While this area of law is still developing, breaches ca can giv ive rise to to co consumer lit litigation, se securi rities fr fraud lit litigation, even li liability for for co corp rporate dire irectors under r De Delaware law law. […] The markets are becoming much more sophisticated in their understanding of the financial consequences of breaches that result in the loss of key intellectual property, and legal exposure is also expanding rapidly, especially on the consumer front. Som
court rts are re st start rting to to perm rmit co consumers to to bri ring ca cases based on
the fe fear of
fraud th that th they su suff ffer aft fter th their data is is st stolen—even with ithout being able to to sh show th that anybody has act ctually tri tried to to use se th their data. As we start to see share prices drop after news of previously undisclosed breaches emerges, I think we will be seeing more securities fraud suits as well.
http://www.forbes.com/sites/christopherskroupa/2016/10/27/exposing-litigation-the-hidden-risks-of-cyber-breach/#6f4f218f1988
www.criticalinformatics.com Page 12 CRITICAL INFORMATICS
www.criticalinformatics.com Page 13 CRITICAL INFORMATICS
www.criticalinformatics.com Page 14 CRITICAL INFORMATICS
“This ability enables an agency to instantly disable or destroy a target. Cyber strike capability is an ‘always online weapon’ that can be fired at any IP connected terminal with power to disable or destroy a target permanently,” a copy of the brochure reads, referring to Aglaya’s self-described ‘Cyber Strike’ product. “This weapon is comparable to a Nuclear Strike that can destroy ci city wid ide Cyber in infra rastructure re or
county wid ide IP co communications in ineffective,” the brochure adds.
source: https://motherboard.vice.com/en_us/article/59weqb/a-spyware-company-audaciously-offers-cyber-nukes
www.criticalinformatics.com Page 15 CRITICAL INFORMATICS
Arbor believes that we’ve entered a new era in which Tb/s DDoS attacks will be common, whether it’s through memcached server vulnerabilities or through other vulnerabilities attackers may be able to find later.
www.criticalinformatics.com Page 16 CRITICAL INFORMATICS
https://phys.org/news/2018-03-exposing-biggest-chip-vulnerability.html
www.criticalinformatics.com Page 17 CRITICAL INFORMATICS
https://www.eff.org/deeplinks/2018/02/cloud-act-dangerous-expansion-police-snooping-cross-border-data
www.criticalinformatics.com Page 18 CRITICAL INFORMATICS
www.criticalinformatics.com Page 19 CRITICAL INFORMATICS
SADLY
extortion tool
and health sectors
BUT ALSO
www.criticalinformatics.com Page 20 CRITICAL INFORMATICS
Mike Hamilton Michael.Hamilton@criticalinformatics.com @critinformatics – Company Tweets @seattlemkh – Unvarnished Opinions The IT Security News Blast https://criticalinformatics.com/resources/it-security-news/
Our stuff keeps your stuff from becoming their stuff
www.criticalinformatics.com CRITICAL INFORMATICS January 31, 2018
info@criticalinformatics.com Twitter @seattlemkh @critinformatics