Securing Caribbean networks
Bevil Wooding
Executive Director, CaribNOG
Securing Caribbean networks Bevil Wooding Executive Director, - - PowerPoint PPT Presentation
Securing Caribbean networks Bevil Wooding Executive Director, CaribNOG THE DIGITAL WORLD Explosion of Online Devices Explosion of Online Users Explosion of Online Data Dark Side To Digital Progress There are only two types of
Executive Director, CaribNOG
“There are only two types of companies:
Those that have been hacked, and those that will be.”
Today’s Cyber Criminals are:
and Highly EFFECTIVE!
Cybercriminals
targeted
motivated
sophisticated
Hactivists
destructive
motivations
sophisticated
Nation-States
multi-stage
collection
sophisticated with endless resources
Insiders
destructive
motivations
varies
2013 - TARGET 2015 - OPM 2017 – WannaCry Ransomwear 2014 - SONY
Major cyber attack disrupts internet service across the WORLD!
Compromised via a Third- Party Vendor (HVAC) Easy Reconnaissance; Ignored Initial Alerts Russian Crime Syndicate; 17 yr old wrote the malware
1
Internal Infrastructure Used Against Themselves
1 1 1
Internally Everything Destroyed; Whole World Saw Emails & Sensitive Information Most of the Company Had Too Much Access; Passwords were stored in files named ‘Passwords’ GUARDIANS OF PEACE (North Korean Government) Warning Signs were Ignored
1 1 1 1
Compromised Using Defense Contractor’s Credentials Encryption is great, but it doesn’t stop those who have passwords or credentials Chinese Government Data Stolen During Holiday When Staffing was Light.
1 1 1 1
Millions of Compromised Digital Video Cameras Unpatched IoT Devices Hackers - For Profit or Other Motive? Plenty of Individuals, Companies, and Vendors to Blame!
1 1 1 1
Hackers - Unknown
1 1 1
Ransom message asking for
after 3 days. After 7 days, files destroyed Estimated > 200,000 victims WORLDWIDE
CONTRIES AFFECTED
Securing National Development
Securing National Development
Securing National Development
W h i l e t h e r e i s n o s i l v e r b u l l e t s o l u t i o n w i t h c y b e r s e c u r i t y, a w e l l - i n f o r m e d , w e l l - s t r u c t u r e d , c o o r d i n a t e d , m u l t i - s t a k e h o l d e r a p p r o a c h c a n m a k e a b i g d i f f e r e n c e
Securing National Development
Securing National Development
Securing National Development
Securing National Development
Cybersecurity strategies should be holistic
Develop in collaboration with critical business units – embed security personnel into business units, so security strategy can be integrated not just tacked on Align to Business Goals – If you bring value with your strategy, security becomes a business differentiator and revenue generator, transforming security from cost center to a growth center.
Securing National Development
Cybersecurity strategies should be holistic.
Validate at the leadership level – Keeping organizational leaders informed and involved in data breach preparedness and response plans is essential for maintaining a sophisticated security posture. Dynamically managed – Threat actors continuously
like it is a living, breathing, constantly questing process. If you let it languish, your threat posture also suffers.
TRACK THE TREND LINES SUPORT PUBLIC-PRIVATE COOPERATION INVEST IN SECURITY TOOLS AND INFRASTRUCTUR ENCOURAGE AND TRAIN CYBER EXPERTS
“despite hard pressed budgets, cyber security needs to be seen as just as important as physical security and treated as core cost for businesses and governments.”
BEVIL M. WOODING
Internet Strategist, Packet Clearing House
non-profit research institute. He is also the Executive Director of the Caribbean Network Operators Group Twitter/Linked: @bevilwooding