CYBER SECURITY
Nick Kervin – Partner, IT Advisory
Page 1
CYBER SECURITY Nick Kervin Partner, IT Advisory August 2017 Page - - PowerPoint PPT Presentation
CYBER SECURITY Nick Kervin Partner, IT Advisory August 2017 Page 1 CYBER SECURITY Overview 1. What is at risk? 2. Global industry trends 3. BDO/AusCERT survey 4. Recent cyber case studies 5. Cyber risk mitigation strategies Page
Page 1
Page 2
Page 3
Page 4
S
Adversary Motives Targets Impact Hacktivists
social change
t heir pract ices
ensit ive business information
execut ives, employees, cust omers & business part ners
act ivities
Cyber criminals
fut ure financial gains
information
and penalt ies
lawsuit s
Nation state
milit ary advantage
ensit ive business information
advant age
infrast ruct ure Insiders
monet ary gain
ales, deals, market st rat egies
, R&D
Page 5
Page 6
Cyber criminals Hacktivists Nation state Insiders
Motives and tactics evolve and what adversaries target vary depending
Emerging technologies Energy data Advanced materials and manufacturing techniques Healthcare, pharmaceuticals, and related technologies Business deals information Health records and other personal data Industrial Control S ystems (S CADA) R&D and / or product design data Payment card and related information / financial markets Information and communication technology and data
Page 7
Page 8
S
Page 9
S
Cyber attacks are on the rise The est imat ed annual cost of cyber-at t acks t o t he global economy was more t han $500 billion in 2015 wit h $230 billion in AP AC World Economic Forum recognise cyber breaches as one of the top threats to stability of global economy Cost of dat a breaches and malware infect ions will cost t he global economy $2.1 t rillion by 2019 Cyber threats are Boards’ fastest-growing concern, but investments are not keeping track with breach costs $75 billion spend on cyber securit y in 2015 Estimated spend on Cyber Security by 2020 will be $175 billion Cyber spend will more t han double over t he next five years wit h Cyber insurance expect t o grow t o $2.5 billion by 2020
Page 10
$500 billion $175 billion $2.1 trillion $75 billion
S
Solid growth in cyber security job market 1 million unfilled cyber security j obs globally in 2015 which is a 75% increase in the last five years Cyber security jobs in demand as investments increase There will be shortage in cyber security skills as the market is expected to grow to 6 million j obs by 2019 with a shortage of 2 million j obs Cyber job market in ANZ region is growing The demand for cyber security skills in ANZ market will grow 21%
with expected shortage of 10,000 people by 2019
Page 11
1 million 21% 6 million
S
Page 12
Australian Respondents by state NZ Respondents by region
Page 13
Queensland
0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% Accommodation and food services Administ rative and support services Agriculture, forest ry and fishing Art s and recreation services Const ruct ion Educat ion and t raining Elect ricit y, gas, wat er and waste services Financial and insurance services Health care and social assist ance Information media and telecommunicat ions Manufact uring Mining Other Professional, scientific and t echnical services Public administ ration and safet y Rental, hiring and real est at e services Retail t rade Transport, post al and warehousing Wholesale trade S t at e Government Federal Government Local/ regional Government Not -for-profit Private limit ed company Public listed company S
Page 14
0% 5% 10% 15% 20% 25% 30% 35% Dat a breach and t hird part y provider / supplier Dat a loss / t heft of confident ial informat ion Denial of service att ack Brute force at t ack Email addresses or websit e(s) blacklist ed Malware / troj an infect ions Phishing / t arget ed malicious e-mails Ransomware Theft of lapt ops or mobile devices Unaut horised access t o informat ion by external user Unaut horised access t o informat ion by int ernal user Unaut horised modificat ion of informat ion Websit e defacement Healthcare All Respondents
Page 15
0.00% 5.00% 10.00% 15.00% 20.00% 25.00% Dat a breach and t hird part y provider / supplier Dat a loss / t heft of confident ial informat ion Denial of service att ack Brute force at t ack Email addresses or websit e(s) blacklist ed Malware / troj an infect ions Phishing / t arget ed malicious e-mails Ransomware Theft of lapt ops or mobile devices Unaut horised access t o informat ion by external user Unaut horised access t o informat ion by int ernal user Unaut horised modificat ion of informat ion Websit e defacement Healthcare All Respondents
Page 16
Page 17
Suppliers / business partners 4% Customers 4% Competitors 6% Former employees 8% Foreign Governments / Nation States 10% Third party hosting provider 10% Activists 12% Insiders / current employees 13% Cyber criminals /
33%
Page 18
0% 5% 10% 15% 20% 25% 30% 35% Act ivist s Compet it ors Cust omers Cyber criminals / organised crime Foreign Government s / Nat ion S t at es Former employees Insiders / current employees S uppliers / business part ners Third part y hosting provider All Respondents Healthcare
Page 19
0% 10% 20% 30% 40% 50% Ransomware Phishing Malware/ Troj an All Other
All Respondents
Page 20
0% 10% 20% 30% 40% Ransomware Phishing Malware/ Troj an All Other
All Respondents
Page 21
No - we feel we don't need to 11% No - we don't know if such a network exists 39% No - it doesn’ t provide us value 4% Yes - but its usefulness is limited 18% Yes - but the process is overly expensive/ time consuming 5% Yes - we gain a great deal of value from doing so 23%
Page 22 14% 9% 5% 25% 18% 9% 12% 8% Yes - we have this cover as an extension to another insurance policy Yes - we have a standalone cyber policy Yes - but do not know how the policy was arranged Not yet - we are considering it No - we were not aware of this type of insurance No - we self-insure No - we don't feel we need it
Page 23
Page 24
X 100 Cyber Health Check is the first attempt to gauge how the boards of Australia’s largest publicly listed companies view and manage their exposure to the rapidly evolving cyber world
X 100 responded to the survey
customers and investors about their approach to cyber security
urvey is available at: www.asx.com.au/ AS X100-Cyber
Page 25
1. More needs to be done around proactive detection 2. The rise of the S OC 3. Who has an Incident Response Plan 4. Do you know what your breach reporting obligations are?
Page 26
1. Very large percentage admits that there is more to do 2. Only 20% have a standalone cyber budget 3. 20%
with cyber expertise
Page 27
Page 28
Early Sept ‘16: Donor information accessible via website 25 Oct ’16: Troy Hunt contact AusCERT who then notifies Red Cross 24 Oct ’16: Data set discovered by anonymous source and notified Troy Hunt 26 Oct ’16: Red Cross learns of file containing donor information 14 Nov ’16: Forensic investigation concludes,
accessed the file 28 Oct ’16: Red Cross chief executive Shelly Park makes public statement
Page 29
27 November - 15 December ‘ 13: Malware installed to infect Target’ s POS system - personal information of customers are exposed to fraud 14 December ’ 13: Target hires Verizon to investigate the hack 13 December ’ 13: Department of Justice notifies Target of the breach 15 December ’ 13: Target removes malware from “ virtually all” registers in U.S . stores 19 December ’ 13: Target publicly acknowledges the breach 18 December ’ 13: Data and security blog KrebOnS ecurity reports the data breach 20 December ’ 13: Target says they believe few credit cards were compromised,
discount in store
Page 30
23 December ’ 13: Target’ s general counsel, Tim Baer, hosts 30-minute conference call with state attorneys general 10 January ’ 14: Target says an additional 70m customers had data stole 27 December ’ 13: Ongoing investigation finds that encrypted debit card PIN information was accessed during the breach – Target believes the PIN numbers remain secure 22 January ’ 14: Target lays
headquarters and leaves another 700 positions unfilled 18 February ’ 14: Costs associated with the data breach topped $200m, according to report from the Consumer Bankers Association and Credit Union National Association 4 February ’ 14: Target CFO John Mulligan testifies before the U.S . S enate Judiciary Committee 30 April ’ 14: Target says it has committed $100m to update technology 5 May ’ 14: Bob DeRodes takes over as Target’ s
S teinhafel resigns.
Page 31
Historical IT Security Perspectives Today’s Leading Cyber security Insights Scope of the challenge
extended enterprise
pans your interconnected global business ecosystem Ownership and accountability
board accountable Adversaries’ characteristics
by notoriety, technical challenge, and individual gain
motivated by economic, monetary and political gain Information asset protection
Defense posture
attacked
attacked Security intelligence and information sharing
with industry working groups
Page 32
Page 33
S
ecurit y”
Page 34
NEED MORE INFORMATION?
Nick Kervin Download the report: nick.kervin@ bdo.com.au ht t p:/ / bdoaus.co/ 2gJ5aQu
Page 35