SlideShare a Scribd company logo
Unifying the
Global Response
to Cybercrime
Cyber Security – awareness,
vulnerabilities and solutions
Prof. Manel Medina
Scientific Coordinator of APWG.eu
Founder of esCERT-inLab-UPC
Director MsC Cibersecurity – UPC-Talent
manel@apwg.eu – medina@escert.upc.edu
Content
2
• Awareness
– Threats to IoT/ICS/SCADA, CIIP:
• CPS, Protocols, supply chain, dependencies
– Threats from IoT:
• DDoS, cascade effects
• Vulnerabilities
– Resilience of IoT platforms:
• Access control, identification, back doors, malware…
• Solutions
– Response to cyber-attacks:
• Recovery, Restore
• Conclusions
AWARENESS
3
4
Threats to IoT: Who?
• Script kiddies: no money interest, no professionals,
repeated errors.
• GrayHats: shared criminal and not criminal activities.
SPAMmers spread any kind of emails
• Blackhats: experts, toolkits, business models, unique and
novel,
• States Sponsored: economic and security interest.
Technical
• Hacktivists
• Leaks: criminals that have patience and technical
expertise. Wait years to rob the information they want.
Apply to industry and government. Regional business.
5
Threats to IoT: Why?
• Script kiddies: Show their skills and our weakiness.
• GrayHats: 3rd part services: Politics, socials, cultural
• Blackhats: Economics
• States Sponsored: Steal estrategic Information
• Hacktivists: same as above
• Leaks: criminals that have patience and technical
expertise, wait years to rob the information they
want. Apply to industry and government. Regional
business
6
7
Tendencies: long term  Cyber-war
• Cyber-guns: Hacking Team
• Department of Defense Concludes Three-Weeks of Cyber War Games
http://bit.ly/1uLsdsS http://bit.ly/1eGaGPA
• Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says -
SC Magazine http://ow.ly/PmQyO
• 3 dangerous habits that make companies less #cyber secure:
http://lmt.co/1Ga2v7w #GartnerSEC (by @LM_AngelaHeise)
• How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber
Attacks. by @jcmason http://entm.ag/1Af8Cbu via @Entrepreneur
• Cibercrimen: https://www.amazon.es/CIBERCRIMEN-Manel-Medina-
ebook/dp/B010GJOUDM
8
Threats to IoT: What?
• CIIP: IoT/ICS/SCADA:
– CPS,
– Protocols,
– supply chain,
– Dependencies of IoT from service providers
• Defcon conf.: hacking an electronic wheelchair or
bluetooth lock from a quarter-mile away
• Hack a real car
• Intercept flying airplane communications
9
Threats to IoT: What?
10
Threats FROM IoT: What?
11
• 6.8B devices
• 20 B by 2020
• 50 families
• 3 attacks in
3 weeks
• Just PoC
Threats FROM IoT: What?
• DDoS:
– Authentication
– Malware
– Protocol bugs
• Cascade effects
– supply chain,
– Dependencies of CI from IoT
12
VULNERABILITIES
13
Who do we trust?
14
• 90% of incidents start from inside the
organization
– Spear-phishing
– Ransomware
– Lack of skills or capabilities
– Lack of awareness
– Human Errors
• Internal Audit: Readiness
So, what? Cybersecurity life cycle
15
• Plan:
– Goals, Strategy, Timeframe, Resources
• Do:
– Assets, Threats & Vulnerability identification
– Risk Analysis (evaluation), Management
• Check
– Measure: people, cybersecurity tools,
– Monitor: network, CPS, behaviour
• Act:
– Response, Recovery, Restore, (minimise impact)
– Learn, Report (internal & external), Review/update
External support
16
• CISO
– Business aware
• External providers
– Learn from others’ errors
– Intelligence information
– New Attack patterns
SOLUTIONS TO CYBER ATTACKS
17
Cooperation & coordination Plan
• Risk & impact evaluation & analysis
• Personnel roles & responsibilities
• Cooperation opportunities & covert channels
• Plan ciber-exercises & training.
• Document lessons learnt
• Schedule plan’s updates.
18
Risk Management: Resilience
• Impact on Organization’s mission: Business
continuity
– Identify areas of risk
– Incident response capabilities
• Risk tolerance: Regulatory environment
• Budget: ROSI, implementation Phases, priorities
• Policy adoption & Procedures implementation.
– Early Detection
– Quick response
– Identification & selection of controls
19
Risk Response Strategy
• Probability:
– Avoidance,
– Perimeter,
– Training,
– Readiness,
– Resilience.
• Impact:
– Detection,
– Mitigation,
– Response,
– Recovery
• Risk Acceptance &
Transfer
20
Resilience Assessment Summary
• Where: Available / Collectable data
• What: Scope: Scenario (set of assets)
• How: Time-frame: rigorousness, meaningful.
• Aim: Co. Social responsibility: risk culture
• Who: Compliance & sectorial regulation
• When: Changing environment: external
(hacktivism), internal (infrastructure, asset values),
growth, customers sensitivity
22
Roadmap 2018
• Cybersecurity culture: raise awareness
• Risk measurement and analysis
• Protection: risk reduction and impacts
mitigation
• Detection and management of events
• Collaboration and coordination
• Research, Development and Innovation
• Continuing and efficient training and education
23
Short-term corporative strategy
• Cyber- Responsibility:
– Cyber-risk
– Cyber-trust
– Cyber-insurance
– Hiring of cyber-security profiles
• 3 levels education
– Corporate management
– Cybersecurity management and operations
– ICT Operations
– Final end-user
24
Education and awareness
Continuous training TITULACIÓN Oficial
LE Operations and maintenance (on-line, in-house) Continuous education (PsG)
SME Operations (capsule, education module) Experts (MsC)
25
Shared (or not) responsibilities:
- Data Protection Officer
- Chief Information Security Officer
- Intelligence Officer
- Information Systems Auditor
- Computer Sec. Incident Coordinator
- Data breach communication advisor
- Operation…
- Training…
CORPORATE PROTECTION
TOOLS & STRATEGIES
26
5 essential cybersecurity measures
• Perimeter: Firewall & gateways
• Safe Configuration
• Access Control
• Anti-malware Protection
• Patch & updates management
Best practices in IoT cybersecurity
• Back-up data and configuration choices
• Protect programs and data with e-Signature or
hash
• Documents Mid-Long term Archive
• Anti-DDoS
• User and devices Access Control
• Access & operations: logs & warnings
• User & TIC staff training & awareness
29
Recommendations
• Review network infrastructure and ICT policy
• Foster internal capacity building
• Take any guidelines or collective recommendation
• External consultants to identify planning
• Establish secure communication channels with
team(s) of incident coordination
• Establish cooperation agreements cyber security
management and incident response
• Get some certification / audit
external help: Cyber-guards
• Capability to
– mitigate / recover
• Private vs. Public:
– Incibe
– CERT_SI
– CESIcat
– CERT.EU
– …
– esCERT.UPC
30
European
CERT (?)
n/g CERT
Sectorial
CERT
Industry
n/g CERT
Sectorial
CERT
SME
n/g CERT
CIIP CERT
CI
ENISA
 user ->CPD -> SOC -> CSIRT -> CERT
Final remarks
• Legal requirements:
– Risk analysis
– Incident reporting
• Self-protection:
– internal controls
– Use safe devices
– Update software and passwords
• Provide evidences of:
– capabilities
– good practices
– External audits
• Subcontract external experts
31
PREGUNTAS (& RESPUESTAS)
Muchas gracias
por la atención!
Prof. Manel Medina
Coordinador científico de APWG.eu
Fundador esCERT-inLab-UPC
Director Máster Ciberseguridad – UPC-Talent
manel@apwg.eu – medina@escert.upc.edu
605 284 388

More Related Content

PDF
Cybersecurity - Mobile Application Security
Eryk Budi Pratama
 
PPTX
Programming Fundamentals
Trivuz ত্রিভুজ
 
PPTX
Database security
MaryamAsghar9
 
PPT
Entity relationship modelling
Dr. C.V. Suresh Babu
 
PPTX
User authentication
CAS
 
PPTX
Malware analysis
Prakashchand Suthar
 
PDF
Ransomware attacks
Texas Medical Liability Trust
 
PPTX
Basic concepts in computer security
Arzath Areeff
 
Cybersecurity - Mobile Application Security
Eryk Budi Pratama
 
Programming Fundamentals
Trivuz ত্রিভুজ
 
Database security
MaryamAsghar9
 
Entity relationship modelling
Dr. C.V. Suresh Babu
 
User authentication
CAS
 
Malware analysis
Prakashchand Suthar
 
Ransomware attacks
Texas Medical Liability Trust
 
Basic concepts in computer security
Arzath Areeff
 

What's hot (20)

DOCX
Password Cracking
Hajer alriyami
 
ODP
OWASP Secure Coding
bilcorry
 
DOC
rdbms-notes
Mohit Saini
 
PPTX
System hardening - OS and Application
edavid2685
 
PPTX
Secure coding practices
Mohammed Danish Amber
 
PDF
Ransomware Resistance
Florian Roth
 
PDF
Mapping ER and EER Model
Mary Brinda
 
PPTX
Malware ppt final.pptx
LakshayNRReddy
 
PDF
Threat Modeling Using STRIDE
Girindro Pringgo Digdo
 
PPTX
Lecture 06 - Incident Management and SOC.pptx
prasadsanjaya2
 
PPTX
Bit locker Drive Encryption: How it Works and How it Compares
Lumension
 
PPTX
Introduction to shodan
n|u - The Open Security Community
 
PPT
Introduction To PKI Technology
Sylvain Maret
 
PPTX
Autopsy Digital forensics tool
Sreekanth Narendran
 
PPTX
Memory forensics.pptx
9905234521
 
PPT
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
PDF
Secure Code Review 101
Narudom Roongsiriwong, CISSP
 
PPTX
Threat Modeling And Analysis
Lalit Kale
 
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty
 
Password Cracking
Hajer alriyami
 
OWASP Secure Coding
bilcorry
 
rdbms-notes
Mohit Saini
 
System hardening - OS and Application
edavid2685
 
Secure coding practices
Mohammed Danish Amber
 
Ransomware Resistance
Florian Roth
 
Mapping ER and EER Model
Mary Brinda
 
Malware ppt final.pptx
LakshayNRReddy
 
Threat Modeling Using STRIDE
Girindro Pringgo Digdo
 
Lecture 06 - Incident Management and SOC.pptx
prasadsanjaya2
 
Bit locker Drive Encryption: How it Works and How it Compares
Lumension
 
Introduction to shodan
n|u - The Open Security Community
 
Introduction To PKI Technology
Sylvain Maret
 
Autopsy Digital forensics tool
Sreekanth Narendran
 
Memory forensics.pptx
9905234521
 
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Secure Code Review 101
Narudom Roongsiriwong, CISSP
 
Threat Modeling And Analysis
Lalit Kale
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Raffael Marty
 
Ad

Viewers also liked (20)

PDF
Cyber Security Awareness
Ramiro Cid
 
PPTX
Principals of IoT security
IoT613
 
ODP
Cyber security awareness
Jason Murray
 
PPTX
Cybercrime.ppt
Aeman Khan
 
PPTX
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 
PDF
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 
PDF
Scaling IoT Security
Bill Harpley
 
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
ODP
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Mauro Risonho de Paula Assumpcao
 
PPTX
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
PPT
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
PPT
General Awareness On Cyber Security
Dominic Rajesh
 
PPT
cyber terrorism
Accenture
 
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
PDF
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
PPT
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
PPTX
Cyber security presentation
Bijay Bhandari
 
PDF
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
PPTX
Cyber crime and security ppt
Lipsita Behera
 
Cyber Security Awareness
Ramiro Cid
 
Principals of IoT security
IoT613
 
Cyber security awareness
Jason Murray
 
Cybercrime.ppt
Aeman Khan
 
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 
Scaling IoT Security
Bill Harpley
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Mauro Risonho de Paula Assumpcao
 
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
General Awareness On Cyber Security
Dominic Rajesh
 
cyber terrorism
Accenture
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
Cyber security presentation
Bijay Bhandari
 
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Cyber crime and security ppt
Lipsita Behera
 
Ad

Similar to Cyber Security - awareness, vulnerabilities and solutions (20)

PPTX
The Future of Cybersecurity - October 2015
Security Innovation
 
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
PPT
Lecture 4 presentation of cyber security
jitendrachettri894
 
PPTX
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
 
PDF
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
TelecomValley
 
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
PPTX
Lecture 3 Country Specific Strategy.pptx
jitendrachettri894
 
PPTX
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
PPTX
Cyber threat enterprise leadership required march 2014
Peter ODell
 
PPTX
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
 
PDF
2015 Cyber Security
Allen Zhang
 
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
PPTX
Cybersecurity in Singapore: Trends, Careers & Training Path
AkhilKumar529314
 
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
Liming Zhu
 
PPTX
Cyber risks in supply chains
Aparajita Banerjee
 
PPTX
Cyber Security in the market place: HP CTO Day
Symantec
 
PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
PPTX
CyberSecurity_Presefxgdrfffntation_final.pptx
ManishYadav243888
 
PPTX
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
SurfWatch Labs
 
The Future of Cybersecurity - October 2015
Security Innovation
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
Lecture 4 presentation of cyber security
jitendrachettri894
 
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
TelecomValley
 
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
Lecture 3 Country Specific Strategy.pptx
jitendrachettri894
 
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
Cyber threat enterprise leadership required march 2014
Peter ODell
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
 
2015 Cyber Security
Allen Zhang
 
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Cybersecurity in Singapore: Trends, Careers & Training Path
AkhilKumar529314
 
Responsible AI & Cybersecurity: A tale of two technology risks
Liming Zhu
 
Cyber risks in supply chains
Aparajita Banerjee
 
Cyber Security in the market place: HP CTO Day
Symantec
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
CyberSecurity_Presefxgdrfffntation_final.pptx
ManishYadav243888
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
SurfWatch Labs
 

More from inLabFIB (20)

PDF
Modelling and Simulation for Industry 4.0 SUCCESS CASES
inLabFIB
 
PDF
inLab FIB & Industry 4.0
inLabFIB
 
PDF
ALTAIR-SIGVI: Descobreix les teves vulnerabilitats
inLabFIB
 
PPTX
Simulació Social per l'anàlisi demogràfic
inLabFIB
 
PPTX
Smart Mobility
inLabFIB
 
PPTX
Learning Analytics
inLabFIB
 
PPTX
inLab
inLabFIB
 
PPTX
inLab FIB presentation MWC2014
inLabFIB
 
PDF
inLab FIB MeteorJS workshop by uLab UPC - Telefonica I+D
inLabFIB
 
PPTX
somUPC: Integració de les intranets de la UPC
inLabFIB
 
PPTX
UPCnet uTalk : Eina de missatgeria corporativa amb fil social
inLabFIB
 
PPTX
Sistemes GIS aplicats a l’àmbit de la mobilitat, l’esport i la salut
inLabFIB
 
PPTX
inLab FIB Presentation at ICT2013EU
inLabFIB
 
PDF
Artículo sobre modelos para los sistemas de logística urbana
inLabFIB
 
PPTX
Modelos para sistemas de logística urbana: retos y oportunidades
inLabFIB
 
PPTX
Projectes inLab en l'àrea de les comunicacions mòbils
inLabFIB
 
PPTX
Entorns segurs especials per als laboratoris d'informàtica a la FIB
inLabFIB
 
PPTX
Nous entorns de formació per als enginyers informàtics del futur: Aplicacions...
inLabFIB
 
PPTX
Projecte per a l'ús de dispositius de resposta interactiva a les escoles del ...
inLabFIB
 
PPTX
Green cities
inLabFIB
 
Modelling and Simulation for Industry 4.0 SUCCESS CASES
inLabFIB
 
inLab FIB & Industry 4.0
inLabFIB
 
ALTAIR-SIGVI: Descobreix les teves vulnerabilitats
inLabFIB
 
Simulació Social per l'anàlisi demogràfic
inLabFIB
 
Smart Mobility
inLabFIB
 
Learning Analytics
inLabFIB
 
inLab
inLabFIB
 
inLab FIB presentation MWC2014
inLabFIB
 
inLab FIB MeteorJS workshop by uLab UPC - Telefonica I+D
inLabFIB
 
somUPC: Integració de les intranets de la UPC
inLabFIB
 
UPCnet uTalk : Eina de missatgeria corporativa amb fil social
inLabFIB
 
Sistemes GIS aplicats a l’àmbit de la mobilitat, l’esport i la salut
inLabFIB
 
inLab FIB Presentation at ICT2013EU
inLabFIB
 
Artículo sobre modelos para los sistemas de logística urbana
inLabFIB
 
Modelos para sistemas de logística urbana: retos y oportunidades
inLabFIB
 
Projectes inLab en l'àrea de les comunicacions mòbils
inLabFIB
 
Entorns segurs especials per als laboratoris d'informàtica a la FIB
inLabFIB
 
Nous entorns de formació per als enginyers informàtics del futur: Aplicacions...
inLabFIB
 
Projecte per a l'ús de dispositius de resposta interactiva a les escoles del ...
inLabFIB
 
Green cities
inLabFIB
 

Recently uploaded (20)

PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
Zero Carbon Building Performance standard
BassemOsman1
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Software Testing Tools - names and explanation
shruti533256
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
Introduction to Data Science: data science process
ShivarkarSandip
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 

Cyber Security - awareness, vulnerabilities and solutions

  • 1. Unifying the Global Response to Cybercrime Cyber Security – awareness, vulnerabilities and solutions Prof. Manel Medina Scientific Coordinator of APWG.eu Founder of esCERT-inLab-UPC Director MsC Cibersecurity – UPC-Talent [email protected][email protected]
  • 2. Content 2 • Awareness – Threats to IoT/ICS/SCADA, CIIP: • CPS, Protocols, supply chain, dependencies – Threats from IoT: • DDoS, cascade effects • Vulnerabilities – Resilience of IoT platforms: • Access control, identification, back doors, malware… • Solutions – Response to cyber-attacks: • Recovery, Restore • Conclusions
  • 4. 4
  • 5. Threats to IoT: Who? • Script kiddies: no money interest, no professionals, repeated errors. • GrayHats: shared criminal and not criminal activities. SPAMmers spread any kind of emails • Blackhats: experts, toolkits, business models, unique and novel, • States Sponsored: economic and security interest. Technical • Hacktivists • Leaks: criminals that have patience and technical expertise. Wait years to rob the information they want. Apply to industry and government. Regional business. 5
  • 6. Threats to IoT: Why? • Script kiddies: Show their skills and our weakiness. • GrayHats: 3rd part services: Politics, socials, cultural • Blackhats: Economics • States Sponsored: Steal estrategic Information • Hacktivists: same as above • Leaks: criminals that have patience and technical expertise, wait years to rob the information they want. Apply to industry and government. Regional business 6
  • 7. 7
  • 8. Tendencies: long term  Cyber-war • Cyber-guns: Hacking Team • Department of Defense Concludes Three-Weeks of Cyber War Games http://bit.ly/1uLsdsS http://bit.ly/1eGaGPA • Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says - SC Magazine http://ow.ly/PmQyO • 3 dangerous habits that make companies less #cyber secure: http://lmt.co/1Ga2v7w #GartnerSEC (by @LM_AngelaHeise) • How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber Attacks. by @jcmason http://entm.ag/1Af8Cbu via @Entrepreneur • Cibercrimen: https://www.amazon.es/CIBERCRIMEN-Manel-Medina- ebook/dp/B010GJOUDM 8
  • 9. Threats to IoT: What? • CIIP: IoT/ICS/SCADA: – CPS, – Protocols, – supply chain, – Dependencies of IoT from service providers • Defcon conf.: hacking an electronic wheelchair or bluetooth lock from a quarter-mile away • Hack a real car • Intercept flying airplane communications 9
  • 10. Threats to IoT: What? 10
  • 11. Threats FROM IoT: What? 11 • 6.8B devices • 20 B by 2020 • 50 families • 3 attacks in 3 weeks • Just PoC
  • 12. Threats FROM IoT: What? • DDoS: – Authentication – Malware – Protocol bugs • Cascade effects – supply chain, – Dependencies of CI from IoT 12
  • 14. Who do we trust? 14 • 90% of incidents start from inside the organization – Spear-phishing – Ransomware – Lack of skills or capabilities – Lack of awareness – Human Errors • Internal Audit: Readiness
  • 15. So, what? Cybersecurity life cycle 15 • Plan: – Goals, Strategy, Timeframe, Resources • Do: – Assets, Threats & Vulnerability identification – Risk Analysis (evaluation), Management • Check – Measure: people, cybersecurity tools, – Monitor: network, CPS, behaviour • Act: – Response, Recovery, Restore, (minimise impact) – Learn, Report (internal & external), Review/update
  • 16. External support 16 • CISO – Business aware • External providers – Learn from others’ errors – Intelligence information – New Attack patterns
  • 17. SOLUTIONS TO CYBER ATTACKS 17
  • 18. Cooperation & coordination Plan • Risk & impact evaluation & analysis • Personnel roles & responsibilities • Cooperation opportunities & covert channels • Plan ciber-exercises & training. • Document lessons learnt • Schedule plan’s updates. 18
  • 19. Risk Management: Resilience • Impact on Organization’s mission: Business continuity – Identify areas of risk – Incident response capabilities • Risk tolerance: Regulatory environment • Budget: ROSI, implementation Phases, priorities • Policy adoption & Procedures implementation. – Early Detection – Quick response – Identification & selection of controls 19
  • 20. Risk Response Strategy • Probability: – Avoidance, – Perimeter, – Training, – Readiness, – Resilience. • Impact: – Detection, – Mitigation, – Response, – Recovery • Risk Acceptance & Transfer 20
  • 21. Resilience Assessment Summary • Where: Available / Collectable data • What: Scope: Scenario (set of assets) • How: Time-frame: rigorousness, meaningful. • Aim: Co. Social responsibility: risk culture • Who: Compliance & sectorial regulation • When: Changing environment: external (hacktivism), internal (infrastructure, asset values), growth, customers sensitivity 22
  • 22. Roadmap 2018 • Cybersecurity culture: raise awareness • Risk measurement and analysis • Protection: risk reduction and impacts mitigation • Detection and management of events • Collaboration and coordination • Research, Development and Innovation • Continuing and efficient training and education 23
  • 23. Short-term corporative strategy • Cyber- Responsibility: – Cyber-risk – Cyber-trust – Cyber-insurance – Hiring of cyber-security profiles • 3 levels education – Corporate management – Cybersecurity management and operations – ICT Operations – Final end-user 24
  • 24. Education and awareness Continuous training TITULACIÓN Oficial LE Operations and maintenance (on-line, in-house) Continuous education (PsG) SME Operations (capsule, education module) Experts (MsC) 25 Shared (or not) responsibilities: - Data Protection Officer - Chief Information Security Officer - Intelligence Officer - Information Systems Auditor - Computer Sec. Incident Coordinator - Data breach communication advisor - Operation… - Training…
  • 26. 5 essential cybersecurity measures • Perimeter: Firewall & gateways • Safe Configuration • Access Control • Anti-malware Protection • Patch & updates management
  • 27. Best practices in IoT cybersecurity • Back-up data and configuration choices • Protect programs and data with e-Signature or hash • Documents Mid-Long term Archive • Anti-DDoS • User and devices Access Control • Access & operations: logs & warnings • User & TIC staff training & awareness
  • 28. 29 Recommendations • Review network infrastructure and ICT policy • Foster internal capacity building • Take any guidelines or collective recommendation • External consultants to identify planning • Establish secure communication channels with team(s) of incident coordination • Establish cooperation agreements cyber security management and incident response • Get some certification / audit
  • 29. external help: Cyber-guards • Capability to – mitigate / recover • Private vs. Public: – Incibe – CERT_SI – CESIcat – CERT.EU – … – esCERT.UPC 30 European CERT (?) n/g CERT Sectorial CERT Industry n/g CERT Sectorial CERT SME n/g CERT CIIP CERT CI ENISA  user ->CPD -> SOC -> CSIRT -> CERT
  • 30. Final remarks • Legal requirements: – Risk analysis – Incident reporting • Self-protection: – internal controls – Use safe devices – Update software and passwords • Provide evidences of: – capabilities – good practices – External audits • Subcontract external experts 31
  • 31. PREGUNTAS (& RESPUESTAS) Muchas gracias por la atención! Prof. Manel Medina Coordinador científico de APWG.eu Fundador esCERT-inLab-UPC Director Máster Ciberseguridad – UPC-Talent [email protected][email protected] 605 284 388