SlideShare a Scribd company logo
Save Yourself!
How the Cyber Self Defence Framework can help you prioritise and apply
defence in depth efforts using traditional Situational Crime Prevention strategies
The Problem
“$1 trillion
dollars!”
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
“more than half of
humanity is at risk of
falling victim to
cybercrime at any time”
“the primary key threat is
not state actors but
cybercriminals”
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
But why?
“cybercrime is safe and profitable,
occurs in an environment that is
constantly expanding and thrives in
vulnerable systems”
• Cybercrime pays and can be easy to commit
• Policing is (mostly) constrained to a pre-internet model
• Risk of detection, arrest, prosecution and jail time is low
• Connectivity is ubiquitous and more time is spent online
Stir in ingredients…
• Low interest rates
• Pandemic anxiety
• Isolation and loneliness
• Widespread loss of income
• Digital transformation to
WFA
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Victorians had the highest reported losses - $49m, up 115% YoY
“likely attributable to the long lockdown periods the
population experienced in 2020, which created
opportunities for scammers as people were forced into
unusual economic and social situations that had the
potential to increase their susceptibility to scams”
Enforcement
Education
Wide
Focus
Narrow
Focus
NZ Police – Districts
- NZ jurisdiction
- Offshore limitations
NCSC
- CNI threats
- FVEY partnerships
NZ Police - NCCC
- Specialist
cybercrime unit
- Support
nationwide ops
Consumer Affairs
- Scamwatch owner
- Protection education
NetSafe
- Scamwatch triage
- HDCA education/response
DIA EMCU
- UEMA 2007 - Spam / 7726
- Txt, email, fax channels
IDCARE
- Identity theft and fraud
- Victim support across A/NZ
FMA
- Securities legislation
- Investment scams
Commerce Commission
- Fair Trading Act
Citizens Advice
- Advice and education
Domain Name Commission
- .nz domainspace
- Registry compliance
“the New Zealand landscape for
cybercrime is cluttered and
fragmented… unclear and
overlapping roles… multiple,
overlapping information sources
and entry points for members of
the public”
CERT NZ
- Cyber security focus
- COVID scams
OPC
- Data breaches (2020 Act)
Enforcement
Education
Wide
Focus
Narrow
Focus
NZ Police – Districts
- NZ jurisdiction
- Offshore limitations
NCSC
- CNI threats
- FVEY partnerships
NZ Police - NCCC
- Specialist
cybercrime unit
- Support
nationwide ops
Consumer Affairs
- Scamwatch owner
- Protection education
NetSafe
- Scamwatch triage
- HDCA education/response
DIA EMCU
- UEMA 2007 - Spam / 7726
- Txt, email, fax channels
IDCARE
- Identity theft and fraud
- Victim support across A/NZ
FMA
- Securities legislation
- Investment scams
Commerce Commission
- Fair Trading Act
Citizens Advice
- Advice and education
Domain Name Commission
- .nz domainspace
- Registry compliance
“the New Zealand landscape for
cybercrime is cluttered and
fragmented… unclear and
overlapping roles… multiple,
overlapping information sources
and entry points for members of
the public”
CERT NZ
- Cyber security focus
- COVID scams
OPC
- Data breaches (2020 Act)
2020:
$16.9m
4,740
reports
2020:
$19.23m
13,926
reports
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
NZ Police Stats
(NZCVS, 2019)
• Only 10% of fraud or cybercrime incidents reported to the Police
• The most common type of offence, more common than burglary
• Most commonly recognised by the victim as a crime
• Rated most ‘high seriousness’ (42%) but least reported
• Why such under-reporting?
32% reported to other authorities, 22% because “Police couldn’t
have done anything”
The Solution
Bruce Schneier
“Why are we trying to fix
the user instead of solving
the underlying security
problem?”
4 models of crime prevention
Type Intent Effectiveness
Law enforcement Criminal justice system deters
and punishes offenders and
delivers rehabilitation
Poor
Developmental Early intervention addresses
the causes of criminality in
youth
Poor
Social Strengthening
neighbourhoods to build
community relationships
Poor
Situational prevention Reducing the opportunities for
crime through 5 mechanisms
Good
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
What is SCP?
“a package of measures that:
(1) are directed at highly specific forms of crime
(2) involve the management, design or
manipulation of the immediate environment in
as systematic and permanent a way as possible
(3) so as to reduce the opportunities for crime and
increase the risks as perceived by a wide range
of offenders”
Situational Crime Prevention is…
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
5 mechanisms / 25 techniques
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
What is the Cyber Self
Defence Framework?
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Internet users:
• Have limited ‘compliance budgets’
• Make time/benefit tradeoffs
• Struggle to understand and apply advice
• Lack ability to judge effectiveness
• Rates guidance based on cost, effort and
effectiveness
• States the action and the benefits
• Helps you navigate a sea of poorly
prioritised advice
The CSDF:
101 Unique Safeguards
Priority 1: 57 Priority 2: 35 Priority 3: 9
Holistic techniques
• Identify your digital crown jewels - data and devices
• Use unique complex passwords
• Use trusted anti-virus/anti-malware software
• Use a supported OS on all connected devices
• Use a firewall
• Use secure networks
• Use HTTPS everywhere
• Use secure DNS
• Back up critical data and devices and test restoration
• Do not pay ransoms
• Use privacy and security enhancing browser add-ons
• Review privacy and terms of service statements
• Use services with good privacy protecting defaults
• Use a webcam cover
• Protect personal and financial information
• Use privacy settings on all platforms to limit sharing
• Protect phone numbers
• Avoid oversharing online
• Avoid high risk online activities when impaired
• Keep your clothes on
Privacy
Security
Foundational practices
to deter, deflect and
defend against cybercrime:
• Set clear online boundaries
• Avoid oversharing online
• Undertake security awareness training
• Communicate how and when to report incidents
• Communicate online policies/rules
• Do not provoke trolls/doxers
• Do not respond to trolls/doxers
• Do not support bullying and doxing behaviours
• Report abuse to service providers
• Report to law enforcement
• Use services with good security practices
• Use services with good privacy protecting defaults
Next steps…
CSDF v2
• Performance Shaping Factors:
Personality, Age, etc.
• Profile baselines: ‘Crypto Investor’
• Quick Starts:
• Time bound - 5 / 15 / 30 minute
‘recipes’
• Budget bound - $50 / $100 / $250
‘recipes’
• Devices owned, risk appetite
Distribution channels?
• Crime prevention guidance with NZ
Police
• Neighbourhood Support groups
• Partnership with Personal Cyber cover
providers
• SaaS / App-based subscription service:
 Task based checklists
 Set your own ‘nudge’ cadence -
DuoLingo
 Maturity pathway - Gamification
 Continuous monitoring and
improvement
Questions/Feedback?

More Related Content

PDF
Cyber Resilience
Ian-Edward Stafrace
 
PDF
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
PDF
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Chris Hails
 
PPTX
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
 
PDF
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
PDF
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
PPTX
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
 
PDF
Combating cyber crimes chinatu
Chinatu Uzuegbu
 
Cyber Resilience
Ian-Edward Stafrace
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Chris Hails
 
Cybersecurity: What does Cyber Insurance Cover?
Next Dimension Inc.
 
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
 
Combating cyber crimes chinatu
Chinatu Uzuegbu
 

What's hot (20)

PPTX
Cyber Security - Things you need to know
Nathan Desfontaines
 
PDF
Aprio cybersecurity and board information
Aprio
 
PDF
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
APNIC
 
PDF
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 
PPTX
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
PDF
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
PDF
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
PDF
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
PPTX
New York Department of Financial Services Cybersecurity Regulations
Shawn Tuma
 
PPTX
Building Cyber Resilience: No Safe Harbor
Advanced Technology Consulting (ATC)
 
PDF
Shift Toward Dynamic Cyber Resilience
Darren Argyle
 
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
BCM Institute
 
PDF
The Legal Case for Cybersecurity
Shawn Tuma
 
PDF
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Withum
 
PPTX
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Government Technology and Services Coalition
 
PPTX
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
 
PPTX
Cyber security landscape
Jisc
 
PDF
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
PPTX
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
College Development Network
 
Cyber Security - Things you need to know
Nathan Desfontaines
 
Aprio cybersecurity and board information
Aprio
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
APNIC
 
Noah Maina: Computer Emergency Response Team (CERT)
Hamisi Kibonde
 
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
New York Department of Financial Services Cybersecurity Regulations
Shawn Tuma
 
Building Cyber Resilience: No Safe Harbor
Advanced Technology Consulting (ATC)
 
Shift Toward Dynamic Cyber Resilience
Darren Argyle
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
BCM Institute
 
The Legal Case for Cybersecurity
Shawn Tuma
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Withum
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Government Technology and Services Coalition
 
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
 
Cyber security landscape
Jisc
 
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
College Development Network
 
Ad

Similar to Save yourself with the CSDF - ISACA Auckland - 16 June 2021 (20)

PPTX
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 
PPTX
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
VivekNaik79
 
PPT
ILG CERT Presentation Final
Jon Praed
 
PDF
awareness.pdf
jolag93795
 
PPTX
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
PDF
Cyber Security - back to basics - webinar slides.pdf
larsg2
 
PDF
Overview of national cybercrime strategies
Benjamin Ang
 
PPTX
TPC_Presentation - Copy.pptx
SPMTPCAMPUS
 
PPTX
Cyber Security, cyber crime and cyber safety all .pptx
sri223n
 
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
PPTX
Cyber_Security_Awareness_Presentation (1).pptx
javed75
 
PPTX
Cyber_Security_Awareness_Presentation.pptx
MalikMumtaz6
 
PPTX
Cyber_Security_Awareness_Presentation.pptx
PREMTRIVEDI5
 
PDF
Cyber_Security_Awareness_Presentation.pdf
BalaMurali958529
 
PPTX
Cyber Crimefffggghjhgdddssdffggyuuuittttffuuuy.pptx
Priyanka045
 
PDF
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
PPTX
TPC_Presentation.pptx
SPMTPCAMPUS
 
PPT
Unit 4 e security
Dr. C.V. Suresh Babu
 
PPTX
Cybercrime-and-Cyber-Terrorism in ind.pptx
bhaimodel20
 
PPTX
Cyber Security
Muktadir Shoaib
 
CTO-CybersecurityForum-2010-Richard Simpson
segughana
 
Impact-of-Cybercrime ppt presentation /cybercrime and digital hygine
VivekNaik79
 
ILG CERT Presentation Final
Jon Praed
 
awareness.pdf
jolag93795
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
DrSamsonChepuri1
 
Cyber Security - back to basics - webinar slides.pdf
larsg2
 
Overview of national cybercrime strategies
Benjamin Ang
 
TPC_Presentation - Copy.pptx
SPMTPCAMPUS
 
Cyber Security, cyber crime and cyber safety all .pptx
sri223n
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
Cyber_Security_Awareness_Presentation (1).pptx
javed75
 
Cyber_Security_Awareness_Presentation.pptx
MalikMumtaz6
 
Cyber_Security_Awareness_Presentation.pptx
PREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation.pdf
BalaMurali958529
 
Cyber Crimefffggghjhgdddssdffggyuuuittttffuuuy.pptx
Priyanka045
 
Cybersecurity awareness.pdf
CRO Cyber Rights Organization
 
TPC_Presentation.pptx
SPMTPCAMPUS
 
Unit 4 e security
Dr. C.V. Suresh Babu
 
Cybercrime-and-Cyber-Terrorism in ind.pptx
bhaimodel20
 
Cyber Security
Muktadir Shoaib
 
Ad

Recently uploaded (20)

PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PDF
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PPTX
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
PPTX
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PDF
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
PPTX
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
APNIC
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PPT
Transformaciones de las funciones elementales.ppt
rirosel211
 
PPTX
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
PPTX
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
Different Generation Of Computers .pptx
divcoder9507
 
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
APNIC
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
Transformaciones de las funciones elementales.ppt
rirosel211
 
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
How tech helps people in the modern era.
upadhyayaryan154
 

Save yourself with the CSDF - ISACA Auckland - 16 June 2021

  • 1. Save Yourself! How the Cyber Self Defence Framework can help you prioritise and apply defence in depth efforts using traditional Situational Crime Prevention strategies
  • 5. “more than half of humanity is at risk of falling victim to cybercrime at any time”
  • 6. “the primary key threat is not state actors but cybercriminals”
  • 9. “cybercrime is safe and profitable, occurs in an environment that is constantly expanding and thrives in vulnerable systems” • Cybercrime pays and can be easy to commit • Policing is (mostly) constrained to a pre-internet model • Risk of detection, arrest, prosecution and jail time is low • Connectivity is ubiquitous and more time is spent online
  • 10. Stir in ingredients… • Low interest rates • Pandemic anxiety • Isolation and loneliness • Widespread loss of income • Digital transformation to WFA
  • 12. Victorians had the highest reported losses - $49m, up 115% YoY “likely attributable to the long lockdown periods the population experienced in 2020, which created opportunities for scammers as people were forced into unusual economic and social situations that had the potential to increase their susceptibility to scams”
  • 13. Enforcement Education Wide Focus Narrow Focus NZ Police – Districts - NZ jurisdiction - Offshore limitations NCSC - CNI threats - FVEY partnerships NZ Police - NCCC - Specialist cybercrime unit - Support nationwide ops Consumer Affairs - Scamwatch owner - Protection education NetSafe - Scamwatch triage - HDCA education/response DIA EMCU - UEMA 2007 - Spam / 7726 - Txt, email, fax channels IDCARE - Identity theft and fraud - Victim support across A/NZ FMA - Securities legislation - Investment scams Commerce Commission - Fair Trading Act Citizens Advice - Advice and education Domain Name Commission - .nz domainspace - Registry compliance “the New Zealand landscape for cybercrime is cluttered and fragmented… unclear and overlapping roles… multiple, overlapping information sources and entry points for members of the public” CERT NZ - Cyber security focus - COVID scams OPC - Data breaches (2020 Act)
  • 14. Enforcement Education Wide Focus Narrow Focus NZ Police – Districts - NZ jurisdiction - Offshore limitations NCSC - CNI threats - FVEY partnerships NZ Police - NCCC - Specialist cybercrime unit - Support nationwide ops Consumer Affairs - Scamwatch owner - Protection education NetSafe - Scamwatch triage - HDCA education/response DIA EMCU - UEMA 2007 - Spam / 7726 - Txt, email, fax channels IDCARE - Identity theft and fraud - Victim support across A/NZ FMA - Securities legislation - Investment scams Commerce Commission - Fair Trading Act Citizens Advice - Advice and education Domain Name Commission - .nz domainspace - Registry compliance “the New Zealand landscape for cybercrime is cluttered and fragmented… unclear and overlapping roles… multiple, overlapping information sources and entry points for members of the public” CERT NZ - Cyber security focus - COVID scams OPC - Data breaches (2020 Act) 2020: $16.9m 4,740 reports 2020: $19.23m 13,926 reports
  • 17. NZ Police Stats (NZCVS, 2019) • Only 10% of fraud or cybercrime incidents reported to the Police • The most common type of offence, more common than burglary • Most commonly recognised by the victim as a crime • Rated most ‘high seriousness’ (42%) but least reported • Why such under-reporting? 32% reported to other authorities, 22% because “Police couldn’t have done anything”
  • 19. Bruce Schneier “Why are we trying to fix the user instead of solving the underlying security problem?”
  • 20. 4 models of crime prevention Type Intent Effectiveness Law enforcement Criminal justice system deters and punishes offenders and delivers rehabilitation Poor Developmental Early intervention addresses the causes of criminality in youth Poor Social Strengthening neighbourhoods to build community relationships Poor Situational prevention Reducing the opportunities for crime through 5 mechanisms Good
  • 26. “a package of measures that: (1) are directed at highly specific forms of crime (2) involve the management, design or manipulation of the immediate environment in as systematic and permanent a way as possible (3) so as to reduce the opportunities for crime and increase the risks as perceived by a wide range of offenders” Situational Crime Prevention is…
  • 31. 5 mechanisms / 25 techniques
  • 33. What is the Cyber Self Defence Framework?
  • 36. Internet users: • Have limited ‘compliance budgets’ • Make time/benefit tradeoffs • Struggle to understand and apply advice • Lack ability to judge effectiveness • Rates guidance based on cost, effort and effectiveness • States the action and the benefits • Helps you navigate a sea of poorly prioritised advice The CSDF:
  • 37. 101 Unique Safeguards Priority 1: 57 Priority 2: 35 Priority 3: 9
  • 38. Holistic techniques • Identify your digital crown jewels - data and devices • Use unique complex passwords • Use trusted anti-virus/anti-malware software • Use a supported OS on all connected devices • Use a firewall • Use secure networks • Use HTTPS everywhere • Use secure DNS • Back up critical data and devices and test restoration • Do not pay ransoms • Use privacy and security enhancing browser add-ons • Review privacy and terms of service statements • Use services with good privacy protecting defaults • Use a webcam cover • Protect personal and financial information • Use privacy settings on all platforms to limit sharing • Protect phone numbers • Avoid oversharing online • Avoid high risk online activities when impaired • Keep your clothes on Privacy Security
  • 39. Foundational practices to deter, deflect and defend against cybercrime: • Set clear online boundaries • Avoid oversharing online • Undertake security awareness training • Communicate how and when to report incidents • Communicate online policies/rules • Do not provoke trolls/doxers • Do not respond to trolls/doxers • Do not support bullying and doxing behaviours • Report abuse to service providers • Report to law enforcement • Use services with good security practices • Use services with good privacy protecting defaults
  • 41. CSDF v2 • Performance Shaping Factors: Personality, Age, etc. • Profile baselines: ‘Crypto Investor’ • Quick Starts: • Time bound - 5 / 15 / 30 minute ‘recipes’ • Budget bound - $50 / $100 / $250 ‘recipes’ • Devices owned, risk appetite
  • 42. Distribution channels? • Crime prevention guidance with NZ Police • Neighbourhood Support groups • Partnership with Personal Cyber cover providers • SaaS / App-based subscription service:  Task based checklists  Set your own ‘nudge’ cadence - DuoLingo  Maturity pathway - Gamification  Continuous monitoring and improvement

Editor's Notes

  • #2: Presenting to ISACA Auckland – Wednesday 16th June 2021 At the end of 2020, The Center for Strategic and International Studies (CSIS) declared cybercrime to be a "$1 trillion dollar drag on the global economy" that can harm public safety, undermine national security, and damage economies. Incidents of cybercrime have increased by anything from 40% to 400% in the fraught environment of a global pandemic and the true scale of the problem remains unknown in New Zealand with only 10% of fraud or cybercrime incidents reported to Police. Digital safety and security advice can be confusing or packed full of jargon that leaves the average internet user unsure on how to protect themselves and where best to start. The Cyber Self Defence Framework (CSDF) proposes a set of situational security measures – tailored to common cyber-enabled crimes including phishing, social engineering, malware and online scams and fraud – that can help you understand real-world threats to your identity, finances, data and devices and assist you in prioritising your security investments. Attendees at this session can help refine the framework and break the causal chains to prevent cybercrime from occurring.
  • #4: The Center for Strategic and International Studies (CSIS) declared cybercrime to be a "$1 trillion dollar drag on the global economy" that can harm public safety, undermine national security, and damage economies.
  • #5: Fourth biannual report estimates the monetary loss from cybercrime at approximately $945 billion, an increase of $345bn in just 2 years
  • #6: Jürgen Stock, INTERPOL Secretary General - Cybercrime is one of the most prolific forms of international crime, with damages set to cost the global economy USD 10+ trillion annually by 2025
  • #7: Lindy Cameron, NCSC UK CEO spoke this week (whilst the G7 event was taking place in the UK) about the real threat to UK individuals, businesses and CNI operators in light of events at Colonial Pipeline and the Irish health system.
  • #10: - Cybercrime pays and can be easy to commit - Policing is (mostly) constrained to a pre-internet model of sovereign nation states with jurisdictional boundaries - The risk of detection, arrest, prosecution and punishment is low - Connectivity is ubiquitous and more time is spent online
  • #12: Australians lost over $850 million to scams and made 444,164 scam reports in total to Scamwatch, ReportCyber, other government agencies, banks and payment platforms in 2020. Based on this combined data, the scams causing the most financial harm to Australians in 2020 were: - ƒ$328 million lost to investment scams - $131 million lost to romance scams - ƒƒ$128 million lost to business email compromise (payment redirection scams)
  • #13: “Australians lost over $851 million to scams in 2020, a record amount, as scammers took advantage of the pandemic to con unsuspecting people”- https://www.accc.gov.au/media-release/scammers-capitalise-on-pandemic-as-australians-lose-record-851-million-to-scams Startling metrics coming out of Oz where 444,000 incident reports from Scamwatch, ReportCyber, other government agencies and 10 banks and financial intermediaries have been aggregated. Great to see this level of cooperation between private and public sector. KEY FINDINGS: - “As people spent more time online during the COVID-19 pandemic lockdown, reports and losses for some scams also increased” - a 75% increase in phishing scams - “Investment scams accounted for the biggest losses, with $328 million, and made up more than a third of total losses. Romance scams were the next biggest category, costing Australians $131 million, while payment redirection scams resulted in $128 million” And despite the various reporting points pooling their data it’s believed these numbers will still not reflect the true picture due to under reporting.
  • #15: Neil Hallett from IDCARE indicates in NZ they have helped 1000 Kiwis losing around $10m ($10,000 each on average)
  • #16: This illustration aptly demonstrates the complexity of reporting and responding to cybercrime
  • #18: 8% of Kiwis were victims of cybercrime in 2019 but only 10% was reported to NZP – what is the true picture? New Zealand Crime and Victims Survey (NZCVS) – September 2019 - https://www.justice.govt.nz/assets/Documents/Publications/NZCVS-Y2-A5-KeyFindings-v2.0-.pdf Over 320,000 adults (7.9%) experienced 420,000 fraud or cybercrime incidents over last 12 months. (Fraud and cybercrime offences are grouped) The estimated number of fraud and cybercrime offences reported in the NZCVS over the last 12 months is 421,000, which equated to an incidence rate of 11 fraud and cybercrime offences per 100 adults. The estimated total number of adults who experienced one or more fraud and cybercrime offences over the last 12 months is 328,000, which equated to a prevalence rate of 8%. The groups significantly more likely than the NZ average to experience fraud and cybercrime offences were: • having low life satisfaction and a low feeling of safety • experiencing a moderate or high level of psychological distress • having high household income ($150,001 or more). The groups significantly less likely to experience fraud and cybercrime offences were: • older (aged 65 and over) • Asian (especially Chinese) • widowed • retired • having high life satisfaction and a high feeling of safety • having household income between $30,001 to $40,000.
  • #19: In the real world, crime prevention is a key part of tackling social harms The Cyber Self Defence Framework (CSDF) proposes a set of situational security measures – tailored to common cyber-enabled crimes including phishing, social engineering, malware and online scams and fraud – that can help you understand real-world threats to your identity, finances, data and devices and assist you in prioritising your security investments. Attendees at this session can help refine the framework and break the causal chains to prevent cybercrime from occurring.
  • #20: 10+ years to stand up CERT, 10 years to sign up to the Budapest Convention, Ministers committing to publishing flow charts – Govt action is not going to save you….
  • #21: SCP is designed to break the causal chains to prevent crime from occurring
  • #22: SHIELD is the inspiration…
  • #23: Deploy an Active Defense with MITRE Shield - https://medium.com/mitre-shield/three-simple-ways-to-deploy-an-active-defense-with-mitre-shield-95ae639a50b5
  • #25: ADVERSARY ATTRITION - What adversaries do deplete though is time and the resources associated with it and their personnel. Depleting an adversary’s resources, including their time to plan and achieve their objectives, is of critical importance to a defender. Passive Defenses help achieve this. The Sliding Scale of Cyber Security - Robert M. Lee The U.S. military has unofficially and commonly used the actions of “deny, disrupt, deceive, degrade, and destroy” to describe a cyber attack.29
  • #26: Rational choice, routine activity and crime pattern theories emphasise that crimes occur in specific situations and result from a nexus of a motivated offender, suitable target or victim, and the absence of a capable guardian (not focused on criminals and their motivations)
  • #29: Visual examples of SCP
  • #30: In NZ
  • #31: Links to CPTED and physical security controls
  • #32: Most obvious example is prevention for burglary
  • #33: SCP is a framework utilising 5 mechanisms and under each 5 techniques designed to modify the environment and deter the attackers (Ron Clarke)
  • #34: My efforts to apply this to cybercrime have identified a control set for the average internet users, informed by best practice at CERT, CIS and others
  • #36: CSDF will be the security ‘meal kit’ for the masses
  • #37: The masses who post pandemic understand layers of protection and the swiss cheese model
  • #39: Situational security measures tailored to common cyber-enabled crimes including phishing, social engineering, malware and online scams and fraud Help you understand real-world threats to your identity, finances, data and devices and assist you in prioritising your security investments Intent to address CRAVED items – in SCP world a hot product: Concealable, Removable, Available, Valuable, Enjoyable, and Disposable
  • #45: For more information see https://www.ubisec.nz/csdf/ - we welcome feedback!