hello gavin dennis information security consultant
play

! Hello! Gavin Dennis Information Security Consultant Symptai - PowerPoint PPT Presentation

Cyber-Attack and Security: PUTTING THE AUDIT COMMITTEE ON HIGH ALERT ! Hello! Gavin Dennis Information Security Consultant Symptai Consulting Ltd. & OpenWave Information Security Ltd. LETS FOCUS ON 1 EVERYONE IS IMPORTANT IN


  1. Cyber-Attack and Security: PUTTING THE AUDIT COMMITTEE ON HIGH ALERT !

  2. Hello! Gavin Dennis Information Security Consultant Symptai Consulting Ltd. & OpenWave Information Security Ltd.

  3. LET’S FOCUS ON… 1 EVERYONE IS IMPORTANT IN SECURITY 2 MAKE OR BUY, WHICH IS MORE FEASIBLE 3 EMPHASIZE BUSINESS IMPACT AND VALUE

  4. 2016 INTERNATIONAL STATISTICS THREAT DATA COMPROMISED ACTORS 239 21,239 = 58 = 1% WERE INCIDENTS INCIDENTS OF ATTACKS 41% 62% INVOLVED CONFIRMED TARGETED PER DAY ARE EXTERNAL PERSONAL BREACHES PUBLIC SUCCESSFUL PARTIES SERVICES 41% SECRETS 14% CREDENTIALS Source: Verizon DBIR 2017 9% MEDICAL

  5. 2016 LOCAL INCIDENT STATISTICS Senior Advisor in the Ministry of Science, Energy and Technology, Trevor Forrest “The country lost US $100M ( J$12.8B ) due to cyber criminal activity” “…more than 230,000 threats were detected in the space of a month.” SOURCE: JIS (http://jis.gov.jm/everyone-risk- cybercrime) 230K x 12 months = 2.76M INCIDENTS p/yr Published: October 12, 2017 1% of 2.76M = 27.6K BREACHES PER DAY

  6. EXAMPLE – YAHOO – 1 BILLION Source: THE HACKER USERS NEWS

  7. EXAMPLE – EQUIFAX - 143M PII DATA Source: http://www.fox5dc.com EQUIFAX IS A CONSUMER CREDIT REPORTING AGENCY

  8. CORE AREAS ANALYSED IN DBIR 2017 PUBLIC ADMINISTRATION WAS A TOP VICTIM IN 7 OF 8 MAIN CATEGORIES Web Crimeware Cyber Denial Application Espionage of Attacks Service Insider and Miscellaneous Payment Card Physical Privilege Errors Skimmers Theft and Misuse Loss

  9. TRUE STORY

  10. 6 - 1 - PLAN REPEAT AUDIT PROCES 5 - 2 - CLOSE EXECUTE S 4 - FOLLOW- 3 - UP REPORT

  11. 1 PLAN

  12. EMPOWER YOUR TEAM!

  13. 2 EXECUTE

  14. IT being uncooperative 1 Source: THE HACKER NEWS 2 IT pressed for resources Security not treated with 3 priority

  15. AUDITS TO CONSIDER Security Baseline Patch Audit Identifies missing patches Assessments e.g. ISO 27K Password Audit Configuration Audit Tests for weak Checks for weak passwords. configurations

  16. 3 REPORT

  17. MEASURE AUDITEES’ MATURITY LEVEL 5 - OPTIMIZE 1 - INITIAL 3 - DEFINED 2 - 4 - MANAGED REPEATABLE

  18. 4 FOLLOW- UP

  19. 5 CLOSE

  20. 6 REPEAT

  21. Q&A! EXPRESS YOURSELF

  22. Thank You wholeheartedly ! Now go forth and be great!

Recommend


More recommend