The Evolving Cyber Threat
and what businesses can do about it
Larry Clinton, President
Direct 703/907-7028 lclinton@isalliance.org
Founders ISA Board of Directors J. Michael Hickey, 2nd Vice Chair - - PowerPoint PPT Presentation
The Evolving Cyber Threat and what businesses can do about it Larry Clinton, President Direct 703/907-7028 lclinton@isalliance.org Founders ISA Board of Directors J. Michael Hickey, 2nd Vice Chair Ken Silva, Chairman VP Government Affairs,
Direct 703/907-7028 lclinton@isalliance.org
Ken Silva, Chairman
CSO Verisgn
Ty Sagalow, Esq. 1st Vice Chair
President Product Development, AIG
Association of Manufacturers
Sciences
VP Government Affairs, Verizon
Exec VP, Tata Consulting Services
Source: http://cm.bell-labs.com/who/ches/map/gallery/index.html
Source: Hancock, Cutter Technology Journal 06
4,129 2,437 171 345 311 262 417 1,090
500 1,000 1,500 2,000 2,500 3,000 3,500 4,000 4,500
1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 132 110,000 55,100 21,756 9,859 3,734 2,134 2,573 2,412 2,340 1,334 773 406 252 6
20000 40000 60000 80000 100000 120000
Chen-Ing Hau CIH Virus Joseph McElroy Hacked US Dept of Energy Jeffrey Lee Parson Blaster-B Copycat
Andrew Schwarmkoff Russian Mob Phisher Jay Echouafni Competitive DDoS Jeremy Jaynes $24M SPAM KING
Organized criminals, corporate spies, disgruntled employees, terrorists Who: Kids, researchers, hackers, isolated criminals
Why: Seeking fame & glory, use widespread attacks for maximum publicity Seeking profits, revenge, use targeted stealth attacks to avoid detection Risk Exposure: Downtime, business disruption, information loss, defacement Direct financial loss via theft and/or embezzlement, breach disclosure, IP compromised, business disruption, infrastructure failure
Multilayer pre-emptive and behavioral systems Defense: Reactive AV signatures
Recovery: Scan & remove System wide, sometimes impossible without re-image of system Type: Virus, worm, spyware Targeted malware, root kits, spear phishing, ransomware, denial of service, back door taps, trojans, IW
Source: PricewaterhouseCoopers survey of 7,000 companies 9/06
136 86 34 20 40 60 80 100 120 140 2004 2005 2006
Average Number of Security Incidents Per Participant Percentage That Experienced Losses as a Result
25 56 28 55 40 63 20 40 60 80 100 2004 2005 2006 financial
41 39 55 20 40 60 80 100 2004 2005 2006
In 2006 insiders committed more theft of IP & proprietary information and sabotage than outsiders! Total (%) Insider (%) Outsider (%) Theft of IP 30 63 45 Theft of Proprietary Info. 36 56 49 Sabotage 33 49 41 Most common insider incidents in 2006 survey:
Source: US Congressional Research Service 2004
Source Carnegie Mellon CyLab 2007
Source:PricewatterhouseCoopers 2006
#1: Institute periodic enterprise-wide risk assessments. #2: Institute periodic security awareness training for all employees. #3: Enforce separation of duties and least privilege. #4: Implement strict password and account management policies and practices. #5: Log, monitor, and audit employee online actions. #6: Use extra caution with system administrators and privileged users. #7: Actively defend against malicious code. #8: Use layered defense against remote attacks.
#9: Monitor and respond to suspicious or disruptive behavior. #10: Deactivate computer access following termination. #11: Collect and save data for use in investigations. #12: Implement secure backup and recovery processes. #13: Clearly document threat controls.
PricewaterhoseCoopers, September 2006
BUS/OPERATIONAL LEGAL/REG TECH/R&D POLICY PROBLEM / ISSUE
On Privacy and Compliance with Application to Healthcare Anupam Datta, CyLab Research Scientist, CMU Psychological Profiling Software to Aid in Forensic Investigation, Insider Detection and Relationship Management Eric Shaw, Clinical Psychologist & Visiting Scientist, SEI, CERT Outsourcing Risk Management: Legal Considerations Jody Westby, CEO, Global Cyber Risk Privacy and Security, it isn't Either/Or, it's Both/And Jon Callas, PGP Corporation Software Assurance in the Software Supply Chain Bill Scherlis, Professor, School of Computer Science, Director,
ISRI and director of CMU's PhD Program in Software Engineering