SlideShare a Scribd company logo
Protect the Unexpected –
A policy prospective
Charles Mok
Legislative Councillor
(Information Technology)
#CLOUDSEC
2
Big data is
everywhere
ICT runs
financial
system
IoT creates
new
loopholes
Threat environment more complex with
innovations
3
Cyber security incidents more frequent
Hong Kong
3443security incidents reported in 2014
116%increase from 2013
Source: Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
4
High profile cyber attacks threatens
governments, enterprises and consumers
5
High profile cases
- Germany steel mill hacked
(spear-phishing attack, causing destruction of equipment)
- U.S. Office of Personnel Management breach
(sensitive personal info of 21.5m people compromised, inside
and outside of govt)
- French TV network TV5monde disabled by hackers
from Islamist group
(took over broadcast, email, social media)
- Germany parliament Bundestag hacked
(sensitive materials stolen from 15 computers)
6
Credit card details of 100 million
customers stolen, US$148 million
breach-related costs
more than 47,000 US Social Security
number
(celebrities, freelancers, and current
and former Sony employees) stolen
Names, credit card info and other
private details of 37 million users
stolen
7
5 common weapons of cyber attacks
8
1. Remote Access Trojan (RAT)
perform unauthorized operations and hide their presence
key logging, screen and camera capture, file access, code
execution, registry management, password sniffing
9
2. Malware and
spear phishing
Estimated in 90% of cyber attacks
(Trend Micro)
malicious links/attachments
Information gathering: to be used
later in further scams/attacks to
victim
Spreading malware to target
computers
10
3. Cyrptolocker ransomware
Encrypts victim’s computer system with key
Requires victim to pay ransom by bitcoin within given time
11
4. Distributed Denial-of-Service Attacks
temporarily interrupting or suspending the
services of web servers
12
5. Hacktivism & Cybergraffiti
web defacement, social media hijacking to grab headline,
spread a cause or bring embarrassment to victim
Recent cases: Taiwan govt and Hong Kong political party
13
Sources of threats and emerging risks…
Internet of things & embedded devices
Rogue insiders
Legacy softwares
Big data breaches
Outdated software and OS-based attacks
Mobile devices
Attacks on Cloud storage providers
14
Unexpected source…
Law enforcement using
spyware to hack the public?
<insert speaker organization logo> 15www.cloudsec.com | #CLOUDSEC
MITIGATION:
Risk Management
Or Law Enforcement?
16
Security Privacy
Big tussle in the post-Snowden era:
Are tougher cybersecurity laws the solution
or the source of more problems?
17
Trends in cyber-security legislations
Requires sharing of cyber threat information among private and public
entities = permission more data collection from users?
18
• More govt power to obtain records
• Right to restrict internet access
• Impose responsibilities on ISPs
• Require real names log-in
• Security requirements for "critical
industries"
• Data localisation
• Network equipment to be ‘reviewed’
before sales
• Block illegal information from overseas
Some countries go further on cybersecurity…
with chilling implications
19
Hong Kong:
how to respect users’ privacy and freedom
while fighting cyber threats remains important issue
20
Protect consumers
More clarity to
industry
Hold government
accountable
Sharing best
practices
Partnership and
coordination on
breach notification
and response
Privacy and security both matter: How to strike the right balance?
#CLOUDSEC
Charles Mok
Legislative Councillor
(Information Technology)
charlesmok@charlesmok.hk
Follow me on:
Facebook: Charles Mok 莫乃光
Twitter: @charlesmok

More Related Content

PDF
Government-ForeScout-Solution-Brief
PPTX
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
PPTX
Cyber Crime
PPTX
Adrian Ifrim - prezentare - Cyber Security Trends 2020
PDF
Cyber crimes
PPTX
Cyber security
PPTX
Cyberpolicy laws
PPTX
Cyber crime final
Government-ForeScout-Solution-Brief
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Cyber Crime
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Cyber crimes
Cyber security
Cyberpolicy laws
Cyber crime final

What's hot (20)

PPTX
Cybercrime
PPTX
Cyber crimes publicspeaking
PDF
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
PPTX
GDPR Part 1: Quick Facts
PDF
How to safe your company from having a security breach
PDF
Palo Alto Networks 2016 Cybersecurity Predictions
PDF
Cyber Security in Manufacturing
PPTX
Industry Trendsin Information Security
PPTX
Cyber warfare Threat to Cyber Security by Prashant Mali
PPTX
Target data breach presentation
PDF
Target Breach Analysis
PPTX
What Cybercriminals Want: Company Data – by United Security Providers
PPTX
Online privacy & security
PDF
State of Cyber Crime in Banking Sector Today: Threats and Solutions
PDF
Cyber security Awareness: In perspective of Bangladesh
PPTX
Customer Focused Government and Computer Security
PDF
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
DOCX
Cyber crime paper
PDF
Cyber crime and security
PPTX
Cyber War ( World War 3 )
Cybercrime
Cyber crimes publicspeaking
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
GDPR Part 1: Quick Facts
How to safe your company from having a security breach
Palo Alto Networks 2016 Cybersecurity Predictions
Cyber Security in Manufacturing
Industry Trendsin Information Security
Cyber warfare Threat to Cyber Security by Prashant Mali
Target data breach presentation
Target Breach Analysis
What Cybercriminals Want: Company Data – by United Security Providers
Online privacy & security
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Cyber security Awareness: In perspective of Bangladesh
Customer Focused Government and Computer Security
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Cyber crime paper
Cyber crime and security
Cyber War ( World War 3 )
Ad

Viewers also liked (7)

PPS
Explaining the Socioeconomic Well-Being of Immigrants and Returned Migrants:
PDF
Samantha
PPTX
Can democracy protect human freedoms?
PPTX
political cynicism & mass media culture
PPT
Neoliberalism on china and beyond
PPS
Immigration Transition and Return Migration in Hong Kong
PPTX
Hong Kong ICT Policies and Opportunities
Explaining the Socioeconomic Well-Being of Immigrants and Returned Migrants:
Samantha
Can democracy protect human freedoms?
political cynicism & mass media culture
Neoliberalism on china and beyond
Immigration Transition and Return Migration in Hong Kong
Hong Kong ICT Policies and Opportunities
Ad

Similar to Protect the Unexpected (20)

PPTX
220715_Cybersecurity: What's at stake?
PDF
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
PPT
Computer hacking
PPTX
CYBER CRIME sujal education it related ppt. Pptx
PPTX
L12. Digital Forensics BS.pptx
PDF
Hunting for cyber threats targeting weapon systems
PPT
28658043 cyber-terrorism
PPTX
Event: George Washington University -- National Security Threat Convergence: ...
PDF
security_threats.pdf and control mechanisms
PPTX
Cyberfort syllabus & career
PPTX
Cyberfort syllabus & career
PDF
CYBER AWARENESS
PPTX
Cyber Security – Indian Perspective.pptx
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PPTX
Indonesia_Government_Military_2024-11-05 19_32_50.cleaned.pptx
PDF
Cyber Security Notes Unit 2 for Engineering
PPTX
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
PDF
- Social Engineering Unit- II Part- I.pdf
PPTX
Clinton- Cyber IRT Balto 10_2012
PPTX
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
220715_Cybersecurity: What's at stake?
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
Computer hacking
CYBER CRIME sujal education it related ppt. Pptx
L12. Digital Forensics BS.pptx
Hunting for cyber threats targeting weapon systems
28658043 cyber-terrorism
Event: George Washington University -- National Security Threat Convergence: ...
security_threats.pdf and control mechanisms
Cyberfort syllabus & career
Cyberfort syllabus & career
CYBER AWARENESS
Cyber Security – Indian Perspective.pptx
Top 5 Cybersecurity Threats in Retail Industry
Indonesia_Government_Military_2024-11-05 19_32_50.cleaned.pptx
Cyber Security Notes Unit 2 for Engineering
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
- Social Engineering Unit- II Part- I.pdf
Clinton- Cyber IRT Balto 10_2012
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS

More from Charles Mok (20)

PDF
Lessons from DeepSeek: Democratizing AI and Open Source
PDF
Digital Democracy (Germany Taiwan Dialogue Platform event)
PDF
Taiwan's Digital Security Pillars: Cyber Infrastructure
PDF
The Future of Artificial Intelligence Governance
PDF
The Geopolitics of Undersea Cable Resilience
PDF
TWIGF Day 0 Tutorial: Security & Resilience
PDF
APAC Data Center Infrastructure Observations
PDF
Technology, Data and Ethics
PDF
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
PDF
Why open and interoperable Internet infrastructure is key to the Internet's c...
PDF
From Crypto to Trust and Identity
PDF
Have you AI'ed today? A Reality Check
PDF
The Trouble with "Fake News" Laws
PDF
2020-21 Budget -- New measures on I&T
PDF
2020-21年財政預算案——創科項目重點
PDF
在數碼時代阻止假新聞與捍衛言論自由
PDF
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
PDF
香港科技罪行法例改革:何去何從?
PDF
Driving Hong Kong Forward in the Age of 5G and Innovation
PDF
Computer Crime Law in Hong Kong
Lessons from DeepSeek: Democratizing AI and Open Source
Digital Democracy (Germany Taiwan Dialogue Platform event)
Taiwan's Digital Security Pillars: Cyber Infrastructure
The Future of Artificial Intelligence Governance
The Geopolitics of Undersea Cable Resilience
TWIGF Day 0 Tutorial: Security & Resilience
APAC Data Center Infrastructure Observations
Technology, Data and Ethics
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Why open and interoperable Internet infrastructure is key to the Internet's c...
From Crypto to Trust and Identity
Have you AI'ed today? A Reality Check
The Trouble with "Fake News" Laws
2020-21 Budget -- New measures on I&T
2020-21年財政預算案——創科項目重點
在數碼時代阻止假新聞與捍衛言論自由
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
香港科技罪行法例改革:何去何從?
Driving Hong Kong Forward in the Age of 5G and Innovation
Computer Crime Law in Hong Kong

Recently uploaded (20)

PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
E -tech empowerment technologies PowerPoint
PDF
Introduction to the IoT system, how the IoT system works
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPT
Ethics in Information System - Management Information System
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
artificial intelligence overview of it and more
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Funds Management Learning Material for Beg
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
PDF
The Evolution of Traditional to New Media .pdf
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Power Point - Lesson 3_2.pptx grad school presentation
E -tech empowerment technologies PowerPoint
Introduction to the IoT system, how the IoT system works
si manuel quezon at mga nagawa sa bansang pilipinas
Uptota Investor Deck - Where Africa Meets Blockchain
Ethics in Information System - Management Information System
simpleintnettestmetiaerl for the simple testint
artificial intelligence overview of it and more
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Layers_of_the_Earth_Grade7.pptx class by
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Funds Management Learning Material for Beg
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
The Evolution of Traditional to New Media .pdf
Introduction to cybersecurity and digital nettiquette
t_and_OpenAI_Combined_two_pressentations
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟

Protect the Unexpected

  • 1. Protect the Unexpected – A policy prospective Charles Mok Legislative Councillor (Information Technology) #CLOUDSEC
  • 2. 2 Big data is everywhere ICT runs financial system IoT creates new loopholes Threat environment more complex with innovations
  • 3. 3 Cyber security incidents more frequent Hong Kong 3443security incidents reported in 2014 116%increase from 2013 Source: Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
  • 4. 4 High profile cyber attacks threatens governments, enterprises and consumers
  • 5. 5 High profile cases - Germany steel mill hacked (spear-phishing attack, causing destruction of equipment) - U.S. Office of Personnel Management breach (sensitive personal info of 21.5m people compromised, inside and outside of govt) - French TV network TV5monde disabled by hackers from Islamist group (took over broadcast, email, social media) - Germany parliament Bundestag hacked (sensitive materials stolen from 15 computers)
  • 6. 6 Credit card details of 100 million customers stolen, US$148 million breach-related costs more than 47,000 US Social Security number (celebrities, freelancers, and current and former Sony employees) stolen Names, credit card info and other private details of 37 million users stolen
  • 7. 7 5 common weapons of cyber attacks
  • 8. 8 1. Remote Access Trojan (RAT) perform unauthorized operations and hide their presence key logging, screen and camera capture, file access, code execution, registry management, password sniffing
  • 9. 9 2. Malware and spear phishing Estimated in 90% of cyber attacks (Trend Micro) malicious links/attachments Information gathering: to be used later in further scams/attacks to victim Spreading malware to target computers
  • 10. 10 3. Cyrptolocker ransomware Encrypts victim’s computer system with key Requires victim to pay ransom by bitcoin within given time
  • 11. 11 4. Distributed Denial-of-Service Attacks temporarily interrupting or suspending the services of web servers
  • 12. 12 5. Hacktivism & Cybergraffiti web defacement, social media hijacking to grab headline, spread a cause or bring embarrassment to victim Recent cases: Taiwan govt and Hong Kong political party
  • 13. 13 Sources of threats and emerging risks… Internet of things & embedded devices Rogue insiders Legacy softwares Big data breaches Outdated software and OS-based attacks Mobile devices Attacks on Cloud storage providers
  • 14. 14 Unexpected source… Law enforcement using spyware to hack the public?
  • 15. <insert speaker organization logo> 15www.cloudsec.com | #CLOUDSEC MITIGATION: Risk Management Or Law Enforcement?
  • 16. 16 Security Privacy Big tussle in the post-Snowden era: Are tougher cybersecurity laws the solution or the source of more problems?
  • 17. 17 Trends in cyber-security legislations Requires sharing of cyber threat information among private and public entities = permission more data collection from users?
  • 18. 18 • More govt power to obtain records • Right to restrict internet access • Impose responsibilities on ISPs • Require real names log-in • Security requirements for "critical industries" • Data localisation • Network equipment to be ‘reviewed’ before sales • Block illegal information from overseas Some countries go further on cybersecurity… with chilling implications
  • 19. 19 Hong Kong: how to respect users’ privacy and freedom while fighting cyber threats remains important issue
  • 20. 20 Protect consumers More clarity to industry Hold government accountable Sharing best practices Partnership and coordination on breach notification and response Privacy and security both matter: How to strike the right balance?
  • 21. #CLOUDSEC Charles Mok Legislative Councillor (Information Technology) charlesmok@charlesmok.hk Follow me on: Facebook: Charles Mok 莫乃光 Twitter: @charlesmok

Editor's Notes

  • #2: Today we are seeing more efforts by cybercriminals in targeting businesses in order to gain financially by attacking individuals and corporate data for profit. From targeted phishing attacks to stealing banking information, businesses both small and large are increasingly being targeted by these criminals due to the higher profits obtained in these activities. Charles will divulge the latest attacks and tools used by cybercriminals and how the legislations can protect the users.
  • #4: Threat environment Cyber attack and crime on the rise, Consumers and enterprises vulnerable Incidents reported to HKCERT and police figures of tech crime rising in HK grown in intensity and frequency - Big impact to financial hub like HK (stock exchange, banks and finance companies)
  • #7: 2013 Target customers credit card of 100M customers stolen, spending $148M on breach related costs 2014 Sony motion picture data hacked, revealing the US Social Security numbers of more than 47,000 celebrities, freelancers, and current and former Sony employees 2015 dating site Ashley Madison hacked, leaking names, credit card info and other private details of 37m users
  • #8: Cyber intrusions internet of things and electronic health records
  • #9: Remote access tools
  • #10: Spear phishing
  • #11: Malware Ransomware
  • #12: DDoS
  • #13: Hacktivism Cyber graffiti
  • #16: Mitigation: risk management or law enforcement?
  • #17: Global trend: laws to tackle cyber threats? Tussle between security and privacy Edward Snowden revelations about NSA surveillance Germany, Netherland, EU General Data Protection Regulation Russia’s tough new cybersecurity law (web companies to set up data centers in the country so that any personal data obtained in Russia on its citizens stays in Russia.) US trying to pass through Senate China has issued draft cybersecurity law
  • #18: Germany, Netherland, EU General Data Protection Regulation Russia’s tough new cybersecurity law (web companies to set up data centers in the country so that any personal data obtained in Russia on its citizens stays in Russia.) US trying to pass through Senate China has issued draft cybersecurity law USA:  towards facilitate greater sharing of cyber threat information among appropriate private and government entities  improve our mutual efforts to better detect and respond to emerging cyber threats?? Cybersecurity Information Sharing Act (Cisa) grants broad latitude to tech companies, data brokers and anyone with a web-based data collection to mine user information and then share it with “appropriate Federal entities”, which themselves then have permission to share it throughout the government.
  • #20: HK context: s161 1. Society call for tougher cyber laws need for digital security overtaken privacy as a leading priority for legislators? Should we follow other countries? give govt more power to collect data and control ISPs? Need to be careful… 2. s33 internet control and censorship
  • #21: Striking the right balance between the two will require partnership, coordination, and the sharing of best practices between policymakers, businesses, and citizens protect consumers, provide clarity to industry, and require the government to hold itself accountable