founders our partners the old web the web today
play

Founders Our Partners The Old Web The Web Today Source: - PowerPoint PPT Presentation

The Evolving Cyber Threat and what businesses can do about it Larry Clinton, President Direct 703/907-7028 lclinton@isalliance.org Founders Our Partners The Old Web The Web Today Source:


  1. The Evolving Cyber Threat and what businesses can do about it Larry Clinton, President Direct 703/907-7028 lclinton@isalliance.org

  2. Founders

  3. Our Partners

  4. The Old Web

  5. The Web Today Source: http://cm.bell-labs.com/who/ches/map/gallery/index.html

  6. The Earlier Threat: Growth in vulnerabilities (CERT/cc) 4,500 4,129 4,000 3,500 3,000 2,437 2,500 2,000 1,090 1,500 1,000 417 345 500 311 262 171 0 1995 2002

  7. The Earlier Threat: Cyber incidents 120000 110,000 100000 80000 55,100 60000 40000 21,756 20000 9,859 2,340 2,412 2,573 132 2,134 3,734 252 6 406 1,334 773 0 1992 1993 1994 1995 1996 1997 1988 1989 1990 1991 1998 1999 2000 2001 2002

  8. The Changing Threat A fast-moving virus or worm pandemic is not the threat it was... • 2002-2004 almost 100 medium-to-high risk attacks (“Slammer”; “SoBig”). • 2005, there were only 6 • 2006 and 2007 ……… .. Zero

  9. The Threat Landscape is Changing Early Attacks New Era Attacks Organized criminals, corporate Who : Kids, researchers, spies, disgruntled employees, hackers, isolated terrorists criminals Why : Seeking fame & glory, Seeking profits, revenge, use use widespread attacks for targeted stealth attacks to avoid maximum publicity detection Direct financial loss via theft and/or Risk Exposure : Downtime, embezzlement, breach disclosure, IP business disruption, compromised, business disruption, information loss, defacement infrastructure failure

  10. The Threat Landscape is Changing Early Attacks New Era Attacks Defense : Reactive AV Multilayer pre-emptive and signatures behavioral systems Recovery : Scan & remove System wide, sometimes impossible without re-image of system Type : Virus, worm, spyware Targeted malware, root kits, spear phishing, ransomware, denial of service, back door taps, trojans, IW

  11. Maybe Not Digital Defense? • 29% of Senior Executives “acknowledged” that they did not know how many negative security events they had in the past year • 50% of Senior Executives said they did not know how much money was lost due to attacks Source: PricewaterhouseCoopers survey of 7,000 companies 9/06

  12. Digital Defense Not So Much • 23% of CTOs did not know if cyber losses were covered by insurance. • 34% of CTOs thought cyber losses would be covered by insurance----and were wrong. • “The biggest network vulnerability in American corporations are extra connections added for senior executives without proper security.” ---Source: DHS Chief Economist Scott Borg

  13. Percentage of Participants Who Experienced an Insider Incident 100 80 55 60 41 39 40 20 0 2004 2005 2006

  14. Insider Incidents - 2006 Total (%) Insider (%) Outsider (%) Theft of IP 30 63 45 Theft of Proprietary Info. 36 56 49 Sabotage 33 49 41 Most common insider incidents in 2006 survey: • rogue wireless access points (72%), • theft of IP (64%), • exposure of sensitive or confidential information (56%) In 2006 insiders committed more theft of IP & proprietary information and sabotage than outsiders!

  15. Economic Effects of Attacks • 25% of our wealth- --$3 trillion- --is transmitted over the Internet daily • FBI: Cyber crime cost business $26 billion (probably LOW estimate) • Financial Institutions are generally considered the safest---their losses were up 450% in the last year • There are more electronic financial transfers than paper checks now: Only 1% of cyber crooks are caught.

  16. Cyber Attacks Effect Stock Price “Investigations into the stock price impact of cyber attacks show that identified target firms suffer losses of one to five percent in the days after an attack. For the average NYSE corporation, price drops of these magnitudes translate into shareholder losses between $50 and $200 million.” Source: US Congressional Research Service 2004

  17. Indirect Economic Effects “While the tangible effects of a security incident can be measured in terms of lost productivity and staff time to recover and restore systems, the intangible effects can be of an order of magnitude larger. Intangible effects include the impact on an organizations trust relationships, harm to its reputation, and loss of economical and society confidence” Source Carnegie Mellon CyLab 2007

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend