Security challenges within an Information System Directorate
DGD/DSID/Pôle Sécurité 25/04/2019 1
Works of the RWG’s 5th meeting on Computer Development
Security challenges within an Information System Directorate Works of - - PowerPoint PPT Presentation
Security challenges within an Information System Directorate Works of the RWGs 5th meeting on Computer Development 25/04/2019 DGD/DSID/Ple Scurit 1 Security challenges within an Information System Directorate 29/04/2019 DGD/DSID/Ple
DGD/DSID/Pôle Sécurité 25/04/2019 1
Works of the RWG’s 5th meeting on Computer Development
DGD/DSID/Pôle Sécurité 29/04/2019 2
DGD/DSID/Pôle Sécurité 25/04/2019 3
CONTEXT VULNERABILITIES IS THREAT VECTORS HACKERS PROFILES CYBERATTACKS EXAMPLE CYBERSECURITY GOUVERNANCE
25/04/2019 DGD/DSID/Pôle Sécurité
Strong IT dependency Partnership
Digitalization Protection of the economy Contribution to the State budget Trade security Business facilitation
25/04/2019 DGD/DSID/Pôle Sécurité
RESPECT OF INTERNATIONAL AGREEMENTS AND TREATIES Legislation ( Customs Code, cyber criminality, personal data protection, Code of Telecoms, e‐ transactions, etc ) Standards(ISO 270XX, 900X, PCI‐ DSS, SANS, OWASP, NIST, CC, Bale II‐III )
25/04/2019 DGD/DSID/Pôle Sécurité 6
Technical Vulnerabilities
adaptés aux menaces
technologies utilisées
configuration
Ebios, 27005
Organizational Vulnerabilities
GIS, audit, etc )
and responsabilities
security
Mehari vulnerabilities database, Ebios, 27005
Human ressources Vulnerabilities
ressources
procedures
vulnerabilities database, Ebios, 27005
25/04/2019 DGD/DSID/Pôle Sécurité/Team Pentest 7
personne de révéler une information confidentielle
information
information sharing) within collaborators without the need of the CIO
29/04/2019 Verizon‐DBIR_2018‐Main_report.pdf 8
29/04/2019 DGD/DSID/Pôle Sécurité 9
PROFILES MOTIVATIONS
Expert commissioned Financial Sabotage Hacktivists Ideology Cyber‐soldiers State interests Malicious user Financial Malicious staff None (nuisance by mistake) Sabotage Financial Furniture Provider Financial Service provider Financial partners Espionnage Cybercriminals Renommée Financières
29/04/2019 Verizon‐DBIR_2018‐Main_report.pdf 10
25/04/2019 DGD/DSID/Pôle Sécurité 11
Military Sealift Command
shuttle of the Military Sealift Command : many systems would have been compromised by the chineses armyaccording to a report from the American Senate.
Anvers’ Port
June 2011 and were commissioned by a drug squad trying to high‐jack containers and to circulate drug coming from Latin America by stealing agents’ passcodes.
IRISL (Islamic Republic
august 2011 and all the date the company had on its cargos were deleted. The commissioner remains unknown.
MAERSK
by the end of June 2017 and was done by a group
nearly 300 millions dollars because of this attack.
25/04/2019 DGD/DSID/Pôle Sécurité 12
25/04/2019 cisecurity.org/controls 13
29/04/2019 DGD/DSID/Pôle Sécurité 14
Ressources humaines Process