SlideShare a Scribd company logo
1 of 24
1
Cybersecurity: What’s
at Stake?
22 July 2015
Prepared by: Spire Research and Consulting
Presented by: Leon Perera, CEO
Spire Research and Consulting Group
2
Presentation Outline:
1. The evolution of cyber threats
2. Imminent risks to businesses
3. Why CEOs and senior management need to invest
seriously in a cyber strategy– and how to measure ROI
Cyber Insecurity
3
Spire Research and Consulting
The leading research-based consultancy in emerging markets
We were founded in the year 2000.
We have 100 employees in eight full-service offices.
We serve Global Fortune 1000 firms, governments and other
leading organizations.
Our opinions frequently appear in print, television and radio
media.
We provide a broad spectrum of research and consulting
solutions for market growth and entry.
4
Cyber threat evolution
Advanced threats exist today that were unknown in the 1990s and
2000s
In the past, antivirus was the main weapon of defense needed
Hacking was uncommon, and centralized data was not nearly as
abundant and critical
Mission-critical systems were not as developed, business was not as
dependent on IT as it is today
Business was not as networked and less vulnerable to cyber crimes
5
What are the risks?
What are significant risks today?
Data theft, e.g. through more sophisticated phishing and hacking
Malware that destroys data and renders systems unworkable, e.g. Stuxnet
Denial of service attacks, e.g. through zombie agents
Reputational attacks, e.g. defacing or rerouting public websites
Risks can come from external or internal sources
6
What are the risks?
What is at stake with these risks?
Confidentiality: could erode market share & brand equity as well as trigger
litigation and fines
Integrity: compromising the completeness of information needed to make
business decisions
Availability: continuity of core business processes
Reputation: which affects customer and employee loyalty
7
Change in cyber crime tactics
Why has the landscape changed?
More networked organizations and larger, unregulated cross-border
cyberspaces make cyber-crime more lucrative
Cyber crime is increasingly easy and cheap to commit
An effective botnet can be established for as little as USD700, or can be rented for
just USD535 per week
TOR rooms and other platforms to help link buyers and sellers of threats
Organized syndicates have emerged, e.g. DefCon, Darknet.org.uk
State actors sponsor some activity in this area
8
Statistics on Incidence of Risk:
42.8 Million cyber security attacks in 2014 were detected and reported.
That comes out to an average of 117,339 incoming attacks every day, or a
48 percent increase from 2013. (PWC 2015)
65% attacks come from the Inside: With 35% coming from current
employees and 30% from past employees, internal threats are by far the
leading cause for concern. (PWC 2015)
On average there are 5,768 daily malware attacks on Android Google’s
operating system alone, as measured over a six-month period, (CYREN’s
Security Report 2013.)
Cyber Insecurity
9
Cyber Insecurity
How are businesses vulnerable?
10
What is at stake?
Cyber-threats can be devastating for a company’s finances, reputation
and employee confidence
Case Study #1: As strong as your weakest link
In October 2014, JP Morgan’s account data for 76 million individuals and
7 million small businesses was stolen
The bank had been spending USD250 million a year on cybersecurity
However, the failure arose due to the bank’s negligence in upgrading one
server, which was part of a company that JP Morgan had acquired
This single-point-of-failure created the perfect weakness for the hackers to
exploit
11
What is at stake?
Case Study #2: Denial of services cripples the bottom
line today just as work stoppages did in the 20th century
In the evening on 11 May 2015, NetEase, a Chinese Internet company was
attacked causing several of its internet products to be unable to connect
to the server.
By the next morning (12 May 2015) all affected products recovered
Lost revenues do its game products alone caused a loss of ~USD 2.5 million
to NetEase over that one night of outage.
NetEase claimed the reason was its backbone network had been attacked
by hacker(s)
12
Cyber Insecurity
What are the types of security threats?
13
Types of security threats
Hacking:
Hackers exploit weaknesses in a computer system or network
First, hackers obtain information about their intended target
Then, they identify weaknesses and potential attack approaches
Finally, they execute on the attack plan
For example:
• In recent years, several movies from Sony Pictures have been stolen in
cyber attacks, including "Fury“, "Annie" and “Still Alice.” These movies
appeared on file-sharing sites prior to their box office release dates.
• In June & July 2015, private information of 21.5 million people were stolen
via two hacks at the Office of Personnel Management of the Obama
administration, leading to the resignation of its Director on 10 July.
• In 2013 a British hacker accessed information on current and former
employees of the US Department of Energy
14
Types of security threats
Phishing:
Phishers try to acquire sensitive information such as usernames,
passwords, credit card details and intellectual property; and to
impair the operations of a website or service
They do this by masquerading as a trustworthy entity in an electronic
communication
For example:
Scoular Co. has international business interests and uses wire transfers
frequently. Scoular did not raise a red flag when it’s controller received
three emails to wire a total of USD17.2 million to a Chinese bank- Shanghai
Pudong Development Bank in June 2014. The emails purportedly were sent
by the CEO (they were actually not). During the investigation of the affair,
the controller told the FBI that he ‘was not suspicious of the three wire
transfer requests’ because there was an element of truth to all of it.”
15
Types of security threats
MITM:
‘Man in the middle attack’ where a middleman impersonates each
endpoint and is thus able to manipulate both victims.
For Example:
Customers of a major financial services firm have been targeted with a
man-in-the-middle attack (a variant of Zeus) that will install malware
designed to intercept passcodes sent to BlackBerry and Symbian devices
via SMS as part of a two-factor authentication scheme.
16
Types of security threats
Malware that destroys systems:
Cyber criminals operate remotely in what is called ‘automation at a
distance’ using various means of attack. These include:
Viruses
Worms
Spyware/Adware
Trojans
For Example:
The Stuxnet worm, reportedly a joint US-Israeli project, is said to have destroyed a fifth
of Iran’s nuclear centrifuges. It was delivered into Iran’s Natanz nuclear plant via an
employee’s thumb drive.
The United States government has warned iPhone and iPad users about the "Masque
Attack" vulnerability, a security flaw that can allow malicious third-party iOS apps to
masquerade as legitimate apps via iOS enterprise provision profiles.
17
Types of security threats
Botnets that slow systems down:
The term “bot” in the phrase BOT networks is the short form for robot
When a computer is infected with BOT malware, it performs automated
tasks over the internet without the owners’ knowledge or consent
For example:
Many high-profile targets such as Citigroup, the US Senate, the International
Monetary Fund, Sony, Northrup Grumman, Lockheed Martin and RSA have
all been victims of botnet attacks
The source code for the builder and control panel of ZeusVM version 2.0.0.0
was leaked in June 2015, according to malware research agency MMD.
This could cause a surge in botnets in the months ahead.
18
Types of security threats
Denial of service (DoS):
The purposeful overload of a device, with the aim of making the device or
a service provided by that device unavailable to users.
A DoS usually originates from large numbers of bots or zombie PCs which
are under the control of a botnet
For example:
Stacheldraht is a typical Denial-of-Service agent
The attacker uses a client program to connect to compromised
systems that issue commands to the zombie agents
Agents in turn facilitate the DoS attack
19
Types of security threats
Reputational risk attacks – website defacement, rerouting
For example:
In October and November 2013, several Singapore government
websites were hacked and defaced by “The Messiah”, including
websites of the Istana, the PCF and Ang Mo Kio Town Council.
20
Types of security threats
The new risk landscape with the Internet of Things (IoT):
Physical devices become connected through the Internet of Things (IoT)
Internet of Things (IoT) devices are riddled with basic security flaws, such as
weak passwords, unencrypted network services, insecure interfaces and
cross-site scripting risks
Many devices collect personal information such as name, address, date of
birth, health information and even credit card numbers
Concerns about security and privacy are multiplied when you add in cloud
services and mobile applications that work alongside the device
For example:
Cisco, a technology company, predicts that 50 billion connected devices
will be in circulation by the end of the decade, up from 11 billion last year
21
Cyber Insecurity
Cybersecurity management practices
22
Managing cybersecurity threats
ROI measurement for investing:
Calculating ROI is critical to analyze IT security’s value to the company
Be clear about how and where money is being spent on security
Funding for a specific project can be identified but funding for on-going security
is often scattered throughout programs
Many Security Tools have a short Half-Life; choose those less prone to
countermeasures
Eliminating Software Vulnerabilities Leads to Major Cost Reductions
23
Managing cybersecurity threats
Do’s and don’ts
Senior management should provide ultimate leadership on cybersecurity,
not the IT department
Sensible cost-benefit analysis is key – don’t just let the fox run the henhouse
Ensure silo-less co-operation and decision-making in an emergency
Engage external auditors to “stress-test” security infrastructure
Ensure emergency preparedness and contingency planning with real drills
Ensure timely notification to central authority of any data leaks or break-ins
Investing in the Workforce leads to less cost over time
24
Tel: (65) 6838 5355
Fax: (65) 6838 5855
78 Shenton Way #20-01
Singapore 079120
sg.info@spireresearch.com
www.spireresearch.com

More Related Content

What's hot

Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacksGFI Software
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014EMC
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 

What's hot (19)

Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014RSA Monthly Online Fraud Report -- February 2014
RSA Monthly Online Fraud Report -- February 2014
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 

Viewers also liked

Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting!
Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting! Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting!
Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting! Spire Research and Consulting
 
Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...
Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...
Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...Spire Research and Consulting
 
161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...
161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...
161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...Spire Research and Consulting
 
160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...
160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...
160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...Spire Research and Consulting
 
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!Spire Research and Consulting
 
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!Spire Research and Consulting
 
150409_Indonesia Automotive Insight: The New Era of LCGC/LEC
150409_Indonesia Automotive Insight: The New Era of LCGC/LEC150409_Indonesia Automotive Insight: The New Era of LCGC/LEC
150409_Indonesia Automotive Insight: The New Era of LCGC/LECSpire Research and Consulting
 
160922_The Spire Story_How a boutique consultancy grew an international network
160922_The Spire Story_How a boutique consultancy grew an international network160922_The Spire Story_How a boutique consultancy grew an international network
160922_The Spire Story_How a boutique consultancy grew an international networkSpire Research and Consulting
 
Spire wishes everyone a very Happy and colorful Holi!
Spire wishes everyone a very Happy and colorful Holi!Spire wishes everyone a very Happy and colorful Holi!
Spire wishes everyone a very Happy and colorful Holi!Spire Research and Consulting
 
150527_Healthcare in Indonesia: Future Growth Opportunities
150527_Healthcare in Indonesia:  Future Growth Opportunities 150527_Healthcare in Indonesia:  Future Growth Opportunities
150527_Healthcare in Indonesia: Future Growth Opportunities Spire Research and Consulting
 
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet TrendsSpire Research and Consulting
 

Viewers also liked (20)

Spire wishes everyone Happy New Year 2017!
Spire wishes everyone Happy New Year 2017!Spire wishes everyone Happy New Year 2017!
Spire wishes everyone Happy New Year 2017!
 
Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting!
Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting! Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting!
Spire wishes everyone a Happy Mid-Autumn Festival! Happy harvesting!
 
Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...
Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...
Spire wishes everyone a Happy Thanksgiving! May you enjoy a bountiful Thanksg...
 
Spire wishes you a Happy 71st Independence Day!
Spire wishes you a Happy 71st Independence Day!Spire wishes you a Happy 71st Independence Day!
Spire wishes you a Happy 71st Independence Day!
 
Spire wishes everyone a Happy Independence Day!
Spire wishes everyone a Happy Independence Day!Spire wishes everyone a Happy Independence Day!
Spire wishes everyone a Happy Independence Day!
 
Spire wishes everyone a Happy National Day!
Spire wishes everyone a Happy National Day!Spire wishes everyone a Happy National Day!
Spire wishes everyone a Happy National Day!
 
161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...
161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...
161004-06_India's ICT Sector_Vendors' and Customers' Perspective_E-commerce a...
 
Spire wishes everyone a Happy Mid-Autumn Festival!
Spire wishes everyone a Happy Mid-Autumn Festival!Spire wishes everyone a Happy Mid-Autumn Festival!
Spire wishes everyone a Happy Mid-Autumn Festival!
 
Spire wishes you a very Happy Idul Fitri!
Spire wishes you a very Happy Idul Fitri!Spire wishes you a very Happy Idul Fitri!
Spire wishes you a very Happy Idul Fitri!
 
Spire wishes everyone a Happy New Year 2016!
Spire wishes everyone a Happy New Year 2016!Spire wishes everyone a Happy New Year 2016!
Spire wishes everyone a Happy New Year 2016!
 
Spire wishes you a happy Lunar New Year 2016!
Spire wishes you a happy Lunar New Year 2016!  Spire wishes you a happy Lunar New Year 2016!
Spire wishes you a happy Lunar New Year 2016!
 
160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...
160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...
160308_Logistics Experience for E-commerce Users in Indonesia_E-commerce Logi...
 
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
 
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
Spire wishes everyone a Happy Diwali! दीपावली की हार्दिक शुभकामनाये!
 
150409_Indonesia Automotive Insight: The New Era of LCGC/LEC
150409_Indonesia Automotive Insight: The New Era of LCGC/LEC150409_Indonesia Automotive Insight: The New Era of LCGC/LEC
150409_Indonesia Automotive Insight: The New Era of LCGC/LEC
 
160922_The Spire Story_How a boutique consultancy grew an international network
160922_The Spire Story_How a boutique consultancy grew an international network160922_The Spire Story_How a boutique consultancy grew an international network
160922_The Spire Story_How a boutique consultancy grew an international network
 
Spire wishes you a Happy Lunar New Year 2017!
Spire wishes you a Happy Lunar New Year 2017!Spire wishes you a Happy Lunar New Year 2017!
Spire wishes you a Happy Lunar New Year 2017!
 
Spire wishes everyone a very Happy and colorful Holi!
Spire wishes everyone a very Happy and colorful Holi!Spire wishes everyone a very Happy and colorful Holi!
Spire wishes everyone a very Happy and colorful Holi!
 
150527_Healthcare in Indonesia: Future Growth Opportunities
150527_Healthcare in Indonesia:  Future Growth Opportunities 150527_Healthcare in Indonesia:  Future Growth Opportunities
150527_Healthcare in Indonesia: Future Growth Opportunities
 
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
160928-27_4th Annual Mobile Wallet Conference 2016_Mobile Wallet Trends
 

Similar to 220715_Cybersecurity: What's at stake?

7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdfPhD Assistance
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 

Similar to 220715_Cybersecurity: What's at stake? (20)

7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 

More from Spire Research and Consulting

Spire wishes all in Malaysia a Happy 62nd National Day!
Spire wishes all in Malaysia a Happy 62nd National Day!Spire wishes all in Malaysia a Happy 62nd National Day!
Spire wishes all in Malaysia a Happy 62nd National Day!Spire Research and Consulting
 

More from Spire Research and Consulting (20)

Uncaged : Indian E-Commerce Logistics Industry
Uncaged : Indian E-Commerce Logistics IndustryUncaged : Indian E-Commerce Logistics Industry
Uncaged : Indian E-Commerce Logistics Industry
 
Spire story
Spire storySpire story
Spire story
 
Happy lunar new year 2020
Happy lunar new year 2020Happy lunar new year 2020
Happy lunar new year 2020
 
Digital marketing outlook IDMC
Digital marketing outlook IDMCDigital marketing outlook IDMC
Digital marketing outlook IDMC
 
Happy new year 2020
Happy new year 2020Happy new year 2020
Happy new year 2020
 
Vietnam ict sector report spire
Vietnam ict sector report  spire Vietnam ict sector report  spire
Vietnam ict sector report spire
 
The changing aftermarket industry in india
The changing aftermarket industry in indiaThe changing aftermarket industry in india
The changing aftermarket industry in india
 
Thanksgiving
ThanksgivingThanksgiving
Thanksgiving
 
Happy Diwali!
Happy Diwali!Happy Diwali!
Happy Diwali!
 
It’s World Food Day!
It’s World Food Day!It’s World Food Day!
It’s World Food Day!
 
It's Dussehra!
It's Dussehra!It's Dussehra!
It's Dussehra!
 
Let’s celebrate World Teacher’s Day!
Let’s celebrate World Teacher’s Day!Let’s celebrate World Teacher’s Day!
Let’s celebrate World Teacher’s Day!
 
Spire wishes you a Happy Ganesh Chaturthi!
Spire wishes you a Happy Ganesh Chaturthi!Spire wishes you a Happy Ganesh Chaturthi!
Spire wishes you a Happy Ganesh Chaturthi!
 
Spire wishes all in Malaysia a Happy 62nd National Day!
Spire wishes all in Malaysia a Happy 62nd National Day!Spire wishes all in Malaysia a Happy 62nd National Day!
Spire wishes all in Malaysia a Happy 62nd National Day!
 
Spire wishes you a Happy 74th Independence Day!
Spire wishes you a Happy 74th Independence Day!Spire wishes you a Happy 74th Independence Day!
Spire wishes you a Happy 74th Independence Day!
 
Spire wishes you a Happy 73rd Independence Day!
Spire wishes you a Happy 73rd Independence Day!Spire wishes you a Happy 73rd Independence Day!
Spire wishes you a Happy 73rd Independence Day!
 
Let’s celebrate Bon-Odori!
Let’s celebrate Bon-Odori!Let’s celebrate Bon-Odori!
Let’s celebrate Bon-Odori!
 
Let’s celebrate Eid-Ul-Adha!
Let’s celebrate Eid-Ul-Adha!Let’s celebrate Eid-Ul-Adha!
Let’s celebrate Eid-Ul-Adha!
 
Celebrating Bastille Day!
Celebrating Bastille Day!Celebrating Bastille Day!
Celebrating Bastille Day!
 
Let’s celebrate World Chocolate Day!
Let’s celebrate World Chocolate Day!Let’s celebrate World Chocolate Day!
Let’s celebrate World Chocolate Day!
 

Recently uploaded

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 

Recently uploaded (20)

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 

220715_Cybersecurity: What's at stake?

  • 1. 1 Cybersecurity: What’s at Stake? 22 July 2015 Prepared by: Spire Research and Consulting Presented by: Leon Perera, CEO Spire Research and Consulting Group
  • 2. 2 Presentation Outline: 1. The evolution of cyber threats 2. Imminent risks to businesses 3. Why CEOs and senior management need to invest seriously in a cyber strategy– and how to measure ROI Cyber Insecurity
  • 3. 3 Spire Research and Consulting The leading research-based consultancy in emerging markets We were founded in the year 2000. We have 100 employees in eight full-service offices. We serve Global Fortune 1000 firms, governments and other leading organizations. Our opinions frequently appear in print, television and radio media. We provide a broad spectrum of research and consulting solutions for market growth and entry.
  • 4. 4 Cyber threat evolution Advanced threats exist today that were unknown in the 1990s and 2000s In the past, antivirus was the main weapon of defense needed Hacking was uncommon, and centralized data was not nearly as abundant and critical Mission-critical systems were not as developed, business was not as dependent on IT as it is today Business was not as networked and less vulnerable to cyber crimes
  • 5. 5 What are the risks? What are significant risks today? Data theft, e.g. through more sophisticated phishing and hacking Malware that destroys data and renders systems unworkable, e.g. Stuxnet Denial of service attacks, e.g. through zombie agents Reputational attacks, e.g. defacing or rerouting public websites Risks can come from external or internal sources
  • 6. 6 What are the risks? What is at stake with these risks? Confidentiality: could erode market share & brand equity as well as trigger litigation and fines Integrity: compromising the completeness of information needed to make business decisions Availability: continuity of core business processes Reputation: which affects customer and employee loyalty
  • 7. 7 Change in cyber crime tactics Why has the landscape changed? More networked organizations and larger, unregulated cross-border cyberspaces make cyber-crime more lucrative Cyber crime is increasingly easy and cheap to commit An effective botnet can be established for as little as USD700, or can be rented for just USD535 per week TOR rooms and other platforms to help link buyers and sellers of threats Organized syndicates have emerged, e.g. DefCon, Darknet.org.uk State actors sponsor some activity in this area
  • 8. 8 Statistics on Incidence of Risk: 42.8 Million cyber security attacks in 2014 were detected and reported. That comes out to an average of 117,339 incoming attacks every day, or a 48 percent increase from 2013. (PWC 2015) 65% attacks come from the Inside: With 35% coming from current employees and 30% from past employees, internal threats are by far the leading cause for concern. (PWC 2015) On average there are 5,768 daily malware attacks on Android Google’s operating system alone, as measured over a six-month period, (CYREN’s Security Report 2013.) Cyber Insecurity
  • 9. 9 Cyber Insecurity How are businesses vulnerable?
  • 10. 10 What is at stake? Cyber-threats can be devastating for a company’s finances, reputation and employee confidence Case Study #1: As strong as your weakest link In October 2014, JP Morgan’s account data for 76 million individuals and 7 million small businesses was stolen The bank had been spending USD250 million a year on cybersecurity However, the failure arose due to the bank’s negligence in upgrading one server, which was part of a company that JP Morgan had acquired This single-point-of-failure created the perfect weakness for the hackers to exploit
  • 11. 11 What is at stake? Case Study #2: Denial of services cripples the bottom line today just as work stoppages did in the 20th century In the evening on 11 May 2015, NetEase, a Chinese Internet company was attacked causing several of its internet products to be unable to connect to the server. By the next morning (12 May 2015) all affected products recovered Lost revenues do its game products alone caused a loss of ~USD 2.5 million to NetEase over that one night of outage. NetEase claimed the reason was its backbone network had been attacked by hacker(s)
  • 12. 12 Cyber Insecurity What are the types of security threats?
  • 13. 13 Types of security threats Hacking: Hackers exploit weaknesses in a computer system or network First, hackers obtain information about their intended target Then, they identify weaknesses and potential attack approaches Finally, they execute on the attack plan For example: • In recent years, several movies from Sony Pictures have been stolen in cyber attacks, including "Fury“, "Annie" and “Still Alice.” These movies appeared on file-sharing sites prior to their box office release dates. • In June & July 2015, private information of 21.5 million people were stolen via two hacks at the Office of Personnel Management of the Obama administration, leading to the resignation of its Director on 10 July. • In 2013 a British hacker accessed information on current and former employees of the US Department of Energy
  • 14. 14 Types of security threats Phishing: Phishers try to acquire sensitive information such as usernames, passwords, credit card details and intellectual property; and to impair the operations of a website or service They do this by masquerading as a trustworthy entity in an electronic communication For example: Scoular Co. has international business interests and uses wire transfers frequently. Scoular did not raise a red flag when it’s controller received three emails to wire a total of USD17.2 million to a Chinese bank- Shanghai Pudong Development Bank in June 2014. The emails purportedly were sent by the CEO (they were actually not). During the investigation of the affair, the controller told the FBI that he ‘was not suspicious of the three wire transfer requests’ because there was an element of truth to all of it.”
  • 15. 15 Types of security threats MITM: ‘Man in the middle attack’ where a middleman impersonates each endpoint and is thus able to manipulate both victims. For Example: Customers of a major financial services firm have been targeted with a man-in-the-middle attack (a variant of Zeus) that will install malware designed to intercept passcodes sent to BlackBerry and Symbian devices via SMS as part of a two-factor authentication scheme.
  • 16. 16 Types of security threats Malware that destroys systems: Cyber criminals operate remotely in what is called ‘automation at a distance’ using various means of attack. These include: Viruses Worms Spyware/Adware Trojans For Example: The Stuxnet worm, reportedly a joint US-Israeli project, is said to have destroyed a fifth of Iran’s nuclear centrifuges. It was delivered into Iran’s Natanz nuclear plant via an employee’s thumb drive. The United States government has warned iPhone and iPad users about the "Masque Attack" vulnerability, a security flaw that can allow malicious third-party iOS apps to masquerade as legitimate apps via iOS enterprise provision profiles.
  • 17. 17 Types of security threats Botnets that slow systems down: The term “bot” in the phrase BOT networks is the short form for robot When a computer is infected with BOT malware, it performs automated tasks over the internet without the owners’ knowledge or consent For example: Many high-profile targets such as Citigroup, the US Senate, the International Monetary Fund, Sony, Northrup Grumman, Lockheed Martin and RSA have all been victims of botnet attacks The source code for the builder and control panel of ZeusVM version 2.0.0.0 was leaked in June 2015, according to malware research agency MMD. This could cause a surge in botnets in the months ahead.
  • 18. 18 Types of security threats Denial of service (DoS): The purposeful overload of a device, with the aim of making the device or a service provided by that device unavailable to users. A DoS usually originates from large numbers of bots or zombie PCs which are under the control of a botnet For example: Stacheldraht is a typical Denial-of-Service agent The attacker uses a client program to connect to compromised systems that issue commands to the zombie agents Agents in turn facilitate the DoS attack
  • 19. 19 Types of security threats Reputational risk attacks – website defacement, rerouting For example: In October and November 2013, several Singapore government websites were hacked and defaced by “The Messiah”, including websites of the Istana, the PCF and Ang Mo Kio Town Council.
  • 20. 20 Types of security threats The new risk landscape with the Internet of Things (IoT): Physical devices become connected through the Internet of Things (IoT) Internet of Things (IoT) devices are riddled with basic security flaws, such as weak passwords, unencrypted network services, insecure interfaces and cross-site scripting risks Many devices collect personal information such as name, address, date of birth, health information and even credit card numbers Concerns about security and privacy are multiplied when you add in cloud services and mobile applications that work alongside the device For example: Cisco, a technology company, predicts that 50 billion connected devices will be in circulation by the end of the decade, up from 11 billion last year
  • 22. 22 Managing cybersecurity threats ROI measurement for investing: Calculating ROI is critical to analyze IT security’s value to the company Be clear about how and where money is being spent on security Funding for a specific project can be identified but funding for on-going security is often scattered throughout programs Many Security Tools have a short Half-Life; choose those less prone to countermeasures Eliminating Software Vulnerabilities Leads to Major Cost Reductions
  • 23. 23 Managing cybersecurity threats Do’s and don’ts Senior management should provide ultimate leadership on cybersecurity, not the IT department Sensible cost-benefit analysis is key – don’t just let the fox run the henhouse Ensure silo-less co-operation and decision-making in an emergency Engage external auditors to “stress-test” security infrastructure Ensure emergency preparedness and contingency planning with real drills Ensure timely notification to central authority of any data leaks or break-ins Investing in the Workforce leads to less cost over time
  • 24. 24 Tel: (65) 6838 5355 Fax: (65) 6838 5855 78 Shenton Way #20-01 Singapore 079120 sg.info@spireresearch.com www.spireresearch.com

Editor's Notes

  1. Viruses: A small piece of software program that can replicate itself and spread from one computer to another by attaching itself to another computer file. It aims to gain access to, steal, modify and/or corrupt information and files from a targeted computer system. Worms: Worms are self-replicating and do not require a program to attach themselves to. Worms continually look for vulnerabilities and report back to the worm author when weaknesses are discovered. By exploiting weaknesses in operating systems, worms seek to damage networks and often deliver payloads which allow remote control of the infected computer. Spyware/Adware: By opening attachments, clicking links or downloading infected software, spyware/adware is installed on your computer. It aims to take control of your computer and/or to collect personal information without your knowledge. Trojans: A software program appears to perform one function (for example, virus removal) but actually acts as something else. To create a ‘backdoor’ on your computer by which information can be stolen and damage caused.