project showcase 15 november 2019
play

Project Showcase 15 November 2019 Introductory remarks by OCSC - PowerPoint PPT Presentation

Project Showcase 15 November 2019 Introductory remarks by OCSC Chairman Cameron Boardman The Threat and Global Trends 34% of all cyber attacks involved internal actors 43% of the breaches involved small business victims, 16% were of


  1. Project Showcase 15 November 2019 Introductory remarks by OCSC Chairman Cameron Boardman

  2. The Threat and Global Trends • 34% of all cyber attacks involved internal actors • 43% of the breaches involved small business victims, 16% were of public sector entities, 15% in Healthcare, and 10% of financial services entities • 23% involved nation-state or affiliated actors • Only 71% were financially motivated while 25% were espionage • 56% took months to discover # • Information theft is the most expensive and fastest rising consequence of cybercrime—but data is not the only target. Core systems, such as industrial control systems, are being hacked in a powerful move to disrupt and destroy • Cybercriminals are adapting their attack methods. They are using the human layer—the weakest link—as a path to attacks, through increased phishing and malicious insiders. Other techniques, such as those employed by nation-state attacks to target commercial businesses, are changing the nature of recovery, with insurance companies trying to classify cyberattacks as an “act of war” issue • Cyberattackers have slowly shifted their attack patterns to exploit third and fourth-party supply chain partner environments to gain entry to target systems—including industries with mature cybersecurity standards, frameworks, and regulations • The global average total cost of cybercrime for each compromised company increased from US$11.7 million in 2017 to a new high of US$13.0 million—a rise of 12 percent* #2019 Data Breach Investigations Report from Verizon * The ninth annual cost of cybercrime study is from accenturesecurity and conducted by the Ponemon Institute

  3. Australian situation

  4. Notifiable Data Breaches Scheme 12-month insights report

  5. Notifiable Data Breaches Scheme 12-month insights report

  6. Notifiable Data Breaches Scheme 12-month insights report

  7. Department of Home Affairs Cyber security is important for Australia’s national security, innovation, and prosperity. We need to keep our information safe, working as a nation to secure our networks and systems.

  8. The Oceania Cyber Security Centre Attaining Collaboration for Complex Solutions and Innovation • Linking industry with research experts to solve problems • Anticipating future problems and identifying solutions • Developing best in class processes to improve preparedness and responses to cyber threats

  9. Cyber Maturity Model (CMM) The CMM considers national cybersecurity to include 5 dimensions: 1. Cybersecurity Policy and Strategy 2. Cyber Culture and Society 3. Cybersecurity Education, Training and Skills 4. Legal and Regulatory Frameworks 5. Standards, Organisations, and Technologies

  10. A CMM review is an important first step to strengthening a nation's cyber security posture. Understanding where the gaps are is critical to lessening the ability of bad actors or cyber criminals to attack a nation, its peoples and their allies.

  11. CMM Program • The CMM has been deployed to more than 80 countries across the globe by the GCSCC and partners, with the OCSC as THE partner for the region. • 5 CMMs conducted so far: • Samoa • Tonga • Vanuatu • PNG • Kiribati

  12. CMM Outcome In our digitally interconnected world, cybersecurity is everyone’s problem. The CMM review is the first step towards strengthening a country’s cybersecurity capacity. We don’t deliver the report and leave. We are committed to working together with countries and the community to build capacity and strengthen cybersecurity in the region.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend