SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
CYBER STATE
                           Threats, Opportunities and the Future of Cyber Strategy at a National Level




                                                          Presented for:
                                  the Organization of American States
                                 Caribbean Telecommunications Union
                            9th Ministerial Strategic Seminar (Cyber Security)

Thursday, December 8, 11
Iftach Ian Amit

                  VP Consulting at Security-Art

                  16 years in the Security Industry

                  Cyber Defense at the Israeli Air-Force

                  Founding member - the Penetration Testing Execution Standard

                  SME for NATO’s Cyber Commons Strategy 2011 (CCD-COE)



Thursday, December 8, 11
Agenda
                  Review of the current state of Cyber Threats at a national level

                  Linking criminal efforts to state interests

                  National readiness - where are we?

                  Creating Cyber Capabilities - the right way

                       eGovernance

                       Partnerships

                       Public-Private

Thursday, December 8, 11
Cyber Threats
              Locality


               Global



              Regional



                 Local




Thursday, December 8, 11
Cyber Threats
              Locality     Threat Communities

               Global          Criminals



              Regional         Hacktivists



                 Local         Terrorists




Thursday, December 8, 11
Cyber Threats
              Locality     Threat Communities   Approach Vectors

               Global          Criminals             Public
                                                    Internet


              Regional         Hacktivists      Communication
                                                 Infrastructure


                 Local         Terrorists           Private
                                                   Networks



Thursday, December 8, 11
Cyber Threats
              Locality     Threat Communities   Approach Vectors

               Global          Criminals             Public
                                                    Internet


              Regional         Hacktivists      Communication
                                                 Infrastructure


                 Local         Terrorists           Private
                                                   Networks



Thursday, December 8, 11
Cyber Threats
              Locality     Threat Communities   Approach Vectors      Assets

               Global          Criminals             Public
                                                    Internet
                                                                        $
                                                                      Public
              Regional         Hacktivists      Communication
                                                                     Opinion
                                                 Infrastructure

                                                    Private            Critical
                 Local         Terrorists
                                                   Networks        Infrastructure



Thursday, December 8, 11
Cyber Threats
              Locality     Threat Communities   Approach Vectors      Assets

               Global          Criminals             Public
                                                    Internet
                                                                        $
                                                                      Public
              Regional         Hacktivists      Communication
                                                                     Opinion
                                                 Infrastructure

                                                    Private            Critical
                 Local         Terrorists
                                                   Networks        Infrastructure



Thursday, December 8, 11
Quick Summary:

                     Crime and War are
                           NOT FAIR


                           Deal with it!


Thursday, December 8, 11
CyberCrime




Thursday, December 8, 11
A-Symmetrical conflict


                  Crime enterprises are operating like global businesses

                  Legislation is behind ==> more freedom to run fraud

                  Law enforcement success is only at the low-end (small fish)

                  Defensive mechanisms focus on post-infection




Thursday, December 8, 11
Hacktivists




Thursday, December 8, 11
Links (crime-hacktivists)?




Thursday, December 8, 11
Links (crime-hacktivists)?




Thursday, December 8, 11
Links (crime-hacktivists)?




Thursday, December 8, 11
Cyber Terrorists
                  Much more disperse

                       Local

                       Regional

                       International

                  Focus on recruiting

                  Both physical actions, as well as Cyber actions


Thursday, December 8, 11
Thursday, December 8, 11
Thursday, December 8, 11
Thursday, December 8, 11
Thursday, December 8, 11
Links (crime-hacktivists-
                                    terror)




Thursday, December 8, 11
Links (crime-hacktivists-
                                    terror)




Thursday, December 8, 11
Russian
                                    Crime
                                                     Government
                      ESTDomains     ESTDom                  RBN

   Atrivo

                           McColo             UkrTeleGroup
                                                                   HostFresh




                                                13
Thursday, December 8, 11
Russian
                                    Crime
                                                       Government
                      ESTDomains     ESTDom                      RBN

   Atrivo

                           McColo             UkrTeleGroup
                                                                       HostFresh




                                                     Hosted by




                                                13
Thursday, December 8, 11
Russian
                                    Crime
                                                       Government
                      ESTDomains     ESTDom                      RBN

   Atrivo

                           McColo             UkrTeleGroup
                                                                       HostFresh




                                                     Hosted by
                                                     Customer



                                                13
Thursday, December 8, 11
Russian
                                    Crime
                                                       Government
                      ESTDomains     ESTDom                        RBN

   Atrivo

                           McColo             UkrTeleGroup
                                                                         HostFresh




                                                     Hosted by
                                                     Customer
                                                     Network provider


                                                13
Thursday, December 8, 11
Russian
                                    Crime
                                                       Government
                      ESTDomains     ESTDom                        RBN

   Atrivo

                           McColo             UkrTeleGroup
                                                                         HostFresh




                                                     Hosted by
                                                     Customer
                                                     Network provider


                                                13
Thursday, December 8, 11
National Readiness?

                  More focus on eGovernance

                  Financial systems are still exposed

                  Critical Infrastructure is behind a “feel good” solution

                  Capability building is lacking a strategic goal!

                  Lack of Intelligence and correlation of data



Thursday, December 8, 11
eGovernance
                  Developing outreach is great, efficient and transparent

                  Remember to THREAT MODEL when providing services

                  Threat communities may surprise you (examples: Mexico,
                  Colombia, Russia, South Korea)




Thursday, December 8, 11
eGovernance
                  Developing outreach is great, efficient and transparent

                  Remember to THREAT MODEL when providing services

                  Threat communities may surprise you (examples: Mexico,
                  Colombia, Russia, South Korea)




Thursday, December 8, 11
eGovernance
                  Developing outreach is great, efficient and transparent

                  Remember to THREAT MODEL when providing services

                  Threat communities may surprise you (examples: Mexico,
                  Colombia, Russia, South Korea)




Thursday, December 8, 11
eGovernance
                  Developing outreach is great, efficient and transparent

                  Remember to THREAT MODEL when providing services

                  Threat communities may surprise you (examples: Mexico,
                  Colombia, Russia, South Korea)




Thursday, December 8, 11
Public-Private Partnerships
                  You don’t own the Internet

                  A lot of critical infrastructure and communication is privately
                  owned or privately operated.

                  Symbiotic relationships are a MUST! (See US CyberStorm III)

                  Advantage (state): Access to more raw information, early warning

                  Advantage (private sector): More accessibility, broadening threat
                  community detection and intelligence (readiness)


Thursday, December 8, 11
Global Partnerships
                  Model after the CERT community

                  Global intelligence on threat communities

                  Early warning

                  Sample sharing

                  Proactive defense and incident handling

                       Helps to bypass legal/political issues


Thursday, December 8, 11
Strategic Approach
                  Start from the basics

                       No - advanced offensive capabilities come LAST!

                  Build an intelligence and correlation infrastructure

                       Early warning, feeds from multiple sources (open and closed)

                       Remember social media!

                  Defense is not a reactive practice. Push forward, place yourself in
                  “enemy” territory

Thursday, December 8, 11
Strategic Approach
                  Offensive capability building

                       Coupled with the defensive requirements

                       Focused on what is needed - not what everyone else is using...



                  Working alone == FAIL. Establish partnerships, work on
                  international legislation on crime/war treaties

                       NATO article 5 for the cyber commons?

Thursday, December 8, 11
Questions?
                                 Thank you!

                                 Iftach Ian Amit

                                 VP Consulting, Security-Art



                                 iamit@iamit.org

                                 www.iamit.org/blog


Thursday, December 8, 11

Más contenido relacionado

Similar a Cyber state

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Dni nato cyber panel via the intercept
Dni nato cyber panel via the interceptDni nato cyber panel via the intercept
Dni nato cyber panel via the interceptBaddddBoyyyy
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתDr. Anat Klumel
 
If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)Michael Scovetta
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...Lior Rotkovitch
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftSteph Cliche
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
 
Mist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo andoMist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo andoRuo Ando
 

Similar a Cyber state (19)

Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Dni nato cyber panel via the intercept
Dni nato cyber panel via the interceptDni nato cyber panel via the intercept
Dni nato cyber panel via the intercept
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Public Private Partnership - Combating CyberCrime
Public Private Partnership - Combating CyberCrime Public Private Partnership - Combating CyberCrime
Public Private Partnership - Combating CyberCrime
 
รายงาน
รายงานรายงาน
รายงาน
 
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגתעומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
עומר נגד עומאר תגרת ההאקטיביזם והרשת החברתית של זירת ההאקרים הדיגיטלית מצגת
 
If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)If You Don't Like the Game, Hack the Playbook... (Zatko)
If You Don't Like the Game, Hack the Playbook... (Zatko)
 
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week...
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
รายงาน
รายงานรายงาน
รายงาน
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Mist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo andoMist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo ando
 

Más de Iftach Ian Amit

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVIftach Ian Amit
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing KeynoteIftach Ian Amit
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk MetricsIftach Ian Amit
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and BackIftach Ian Amit
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and BlueIftach Ian Amit
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?Iftach Ian Amit
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?Iftach Ian Amit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itIftach Ian Amit
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python BytecodeIftach Ian Amit
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer GamesIftach Ian Amit
 
Telecommunication basics dc9723
Telecommunication basics dc9723Telecommunication basics dc9723
Telecommunication basics dc9723Iftach Ian Amit
 

Más de Iftach Ian Amit (20)

Cyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLVCyber Risk Quantification - CyberTLV
Cyber Risk Quantification - CyberTLV
 
Devsecops at Cimpress
Devsecops at CimpressDevsecops at Cimpress
Devsecops at Cimpress
 
BSidesTLV Closing Keynote
BSidesTLV Closing KeynoteBSidesTLV Closing Keynote
BSidesTLV Closing Keynote
 
Social Media Risk Metrics
Social Media Risk MetricsSocial Media Risk Metrics
Social Media Risk Metrics
 
ISTS12 Keynote
ISTS12 KeynoteISTS12 Keynote
ISTS12 Keynote
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Painting a Company Red and Blue
Painting a Company Red and BluePainting a Company Red and Blue
Painting a Company Red and Blue
 
"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?"Cyber" security - all good, no need to worry?
"Cyber" security - all good, no need to worry?
 
Armorizing applications
Armorizing applicationsArmorizing applications
Armorizing applications
 
Seeing Red In Your Future?
Seeing Red In Your Future?Seeing Red In Your Future?
Seeing Red In Your Future?
 
Hacking cyber-iamit
Hacking cyber-iamitHacking cyber-iamit
Hacking cyber-iamit
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Advanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done itAdvanced Data Exfiltration - the way Q would have done it
Advanced Data Exfiltration - the way Q would have done it
 
Infecting Python Bytecode
Infecting Python BytecodeInfecting Python Bytecode
Infecting Python Bytecode
 
Exploiting Second life
Exploiting Second lifeExploiting Second life
Exploiting Second life
 
Dtmf phreaking
Dtmf phreakingDtmf phreaking
Dtmf phreaking
 
Cheating in Computer Games
Cheating in Computer GamesCheating in Computer Games
Cheating in Computer Games
 
Telecommunication basics dc9723
Telecommunication basics dc9723Telecommunication basics dc9723
Telecommunication basics dc9723
 

Cyber state

  • 1. CYBER STATE Threats, Opportunities and the Future of Cyber Strategy at a National Level Presented for: the Organization of American States Caribbean Telecommunications Union 9th Ministerial Strategic Seminar (Cyber Security) Thursday, December 8, 11
  • 2. Iftach Ian Amit VP Consulting at Security-Art 16 years in the Security Industry Cyber Defense at the Israeli Air-Force Founding member - the Penetration Testing Execution Standard SME for NATO’s Cyber Commons Strategy 2011 (CCD-COE) Thursday, December 8, 11
  • 3. Agenda Review of the current state of Cyber Threats at a national level Linking criminal efforts to state interests National readiness - where are we? Creating Cyber Capabilities - the right way eGovernance Partnerships Public-Private Thursday, December 8, 11
  • 4. Cyber Threats Locality Global Regional Local Thursday, December 8, 11
  • 5. Cyber Threats Locality Threat Communities Global Criminals Regional Hacktivists Local Terrorists Thursday, December 8, 11
  • 6. Cyber Threats Locality Threat Communities Approach Vectors Global Criminals Public Internet Regional Hacktivists Communication Infrastructure Local Terrorists Private Networks Thursday, December 8, 11
  • 7. Cyber Threats Locality Threat Communities Approach Vectors Global Criminals Public Internet Regional Hacktivists Communication Infrastructure Local Terrorists Private Networks Thursday, December 8, 11
  • 8. Cyber Threats Locality Threat Communities Approach Vectors Assets Global Criminals Public Internet $ Public Regional Hacktivists Communication Opinion Infrastructure Private Critical Local Terrorists Networks Infrastructure Thursday, December 8, 11
  • 9. Cyber Threats Locality Threat Communities Approach Vectors Assets Global Criminals Public Internet $ Public Regional Hacktivists Communication Opinion Infrastructure Private Critical Local Terrorists Networks Infrastructure Thursday, December 8, 11
  • 10. Quick Summary: Crime and War are NOT FAIR Deal with it! Thursday, December 8, 11
  • 12. A-Symmetrical conflict Crime enterprises are operating like global businesses Legislation is behind ==> more freedom to run fraud Law enforcement success is only at the low-end (small fish) Defensive mechanisms focus on post-infection Thursday, December 8, 11
  • 17. Cyber Terrorists Much more disperse Local Regional International Focus on recruiting Both physical actions, as well as Cyber actions Thursday, December 8, 11
  • 22. Links (crime-hacktivists- terror) Thursday, December 8, 11
  • 23. Links (crime-hacktivists- terror) Thursday, December 8, 11
  • 24. Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh 13 Thursday, December 8, 11
  • 25. Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by 13 Thursday, December 8, 11
  • 26. Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by Customer 13 Thursday, December 8, 11
  • 27. Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by Customer Network provider 13 Thursday, December 8, 11
  • 28. Russian Crime Government ESTDomains ESTDom RBN Atrivo McColo UkrTeleGroup HostFresh Hosted by Customer Network provider 13 Thursday, December 8, 11
  • 29. National Readiness? More focus on eGovernance Financial systems are still exposed Critical Infrastructure is behind a “feel good” solution Capability building is lacking a strategic goal! Lack of Intelligence and correlation of data Thursday, December 8, 11
  • 30. eGovernance Developing outreach is great, efficient and transparent Remember to THREAT MODEL when providing services Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea) Thursday, December 8, 11
  • 31. eGovernance Developing outreach is great, efficient and transparent Remember to THREAT MODEL when providing services Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea) Thursday, December 8, 11
  • 32. eGovernance Developing outreach is great, efficient and transparent Remember to THREAT MODEL when providing services Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea) Thursday, December 8, 11
  • 33. eGovernance Developing outreach is great, efficient and transparent Remember to THREAT MODEL when providing services Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea) Thursday, December 8, 11
  • 34. Public-Private Partnerships You don’t own the Internet A lot of critical infrastructure and communication is privately owned or privately operated. Symbiotic relationships are a MUST! (See US CyberStorm III) Advantage (state): Access to more raw information, early warning Advantage (private sector): More accessibility, broadening threat community detection and intelligence (readiness) Thursday, December 8, 11
  • 35. Global Partnerships Model after the CERT community Global intelligence on threat communities Early warning Sample sharing Proactive defense and incident handling Helps to bypass legal/political issues Thursday, December 8, 11
  • 36. Strategic Approach Start from the basics No - advanced offensive capabilities come LAST! Build an intelligence and correlation infrastructure Early warning, feeds from multiple sources (open and closed) Remember social media! Defense is not a reactive practice. Push forward, place yourself in “enemy” territory Thursday, December 8, 11
  • 37. Strategic Approach Offensive capability building Coupled with the defensive requirements Focused on what is needed - not what everyone else is using... Working alone == FAIL. Establish partnerships, work on international legislation on crime/war treaties NATO article 5 for the cyber commons? Thursday, December 8, 11
  • 38. Questions? Thank you! Iftach Ian Amit VP Consulting, Security-Art iamit@iamit.org www.iamit.org/blog Thursday, December 8, 11