Cyber-Attack and Security:
PUTTING THE AUDIT COMMITTEE ON HIGH ALERT
! Hello! Gavin Dennis Information Security Consultant Symptai - - PowerPoint PPT Presentation
Cyber-Attack and Security: PUTTING THE AUDIT COMMITTEE ON HIGH ALERT ! Hello! Gavin Dennis Information Security Consultant Symptai Consulting Ltd. & OpenWave Information Security Ltd. LETS FOCUS ON 1 EVERYONE IS IMPORTANT IN
Cyber-Attack and Security:
PUTTING THE AUDIT COMMITTEE ON HIGH ALERT
Hello!
Gavin Dennis Information Security Consultant Symptai Consulting Ltd. & OpenWave Information Security Ltd.
LET’S FOCUS ON…
EVERYONE IS IMPORTANT IN SECURITY
MAKE OR BUY, WHICH IS MORE FEASIBLE EMPHASIZE BUSINESS IMPACT AND VALUE
2016 INTERNATIONAL STATISTICS
THREAT ACTORS 62% INVOLVED EXTERNAL PARTIES
DATA COMPROMISED
41% PERSONAL 41% SECRETS 14% CREDENTIALS 9% MEDICAL
Source: Verizon DBIR 2017
21,239
INCIDENTS TARGETED PUBLIC SERVICES
239
WERE CONFIRMED BREACHES
= 58
INCIDENTS PER DAY
= 1%
OF ATTACKS ARE SUCCESSFUL
SOURCE: JIS (http://jis.gov.jm/everyone-risk- cybercrime) Published: October 12, 2017
Senior Advisor in the Ministry of Science, Energy and Technology, Trevor Forrest “The country lost US$100M (J$12.8B) due to cyber criminal activity” “…more than 230,000 threats were detected in the space of a month.” 230K x 12 months = 2.76M INCIDENTS p/yr
2016 LOCAL INCIDENT STATISTICS
1% of 2.76M = 27.6K BREACHES PER DAY
EXAMPLE – YAHOO – 1 BILLION USERS
Source: THE HACKER NEWS
EXAMPLE – EQUIFAX - 143M PII DATA
Source: http://www.fox5dc.com
EQUIFAX IS A CONSUMER CREDIT REPORTING AGENCY
CORE AREAS ANALYSED IN DBIR 2017
Web Application Attacks Cyber Espionage Miscellaneous Errors Denial
Service Crimeware Insider and Privilege Misuse Payment Card Skimmers Physical Theft and Loss
PUBLIC ADMINISTRATION WAS A TOP VICTIM IN 7 OF 8 MAIN CATEGORIES
TRUE STORY
5 - CLOSE 6 - REPEAT 3 - REPORT 1 - PLAN 2 - EXECUTE 4 - FOLLOW- UP
Source: THE HACKER NEWS
IT pressed for resources
2
Security not treated with priority
3
IT being uncooperative
1
Security Baseline Assessments
e.g. ISO 27K
Configuration Audit
Checks for weak configurations
Patch Audit
Identifies missing patches
Password Audit
Tests for weak passwords.
AUDITS TO CONSIDER
MEASURE AUDITEES’ MATURITY LEVEL
1 - INITIAL
2 - REPEATABLE 3 - DEFINED 4 - MANAGED 5 - OPTIMIZE