SlideShare a Scribd company logo
Cyber Security Threats 2017
Cybersecurity Outlook 2017
Almost one in five small business owners say their company has had a loss of data in
the past year. Small business owners are particularly hurt by cyberattacks. According
to recent data 63 percent of small business owners view data as their new currency,
and that a single data hack could have associated costs ranging from $82,200 to
$256,000.
- Norman Guadango, Carbonite
Hackers: Breaches
 Headlines
 Ashley Madison 2015: Many use same passwords, spear phishing campaigns, blackmail
targets
 Twitter: 32 Million
 Yahoo: 500 Million (LinkedIn, Amazon, Facebook, Credit Cards, )
 Security cameras, breachable appliances, access control systems
 Malware found on all platforms including Apple
 2 million new signatures of malware in July 2016
Cyber Security Threats for 2017
 Ransomware and Extortion will increase (Stephen Gates, NSFocus)
 Industrial IoT attacks will increase (Adam Meyer, SurfWatch)
 Internal Threats will increase (James Maude, Avetco)
 Physical Security Investments (Ed Solis, CommScope)
 Hackers are in the Long Game
Attack Vectors
 Hacking (Data theft, corporate espionage, identity theft)
 Social Engineering (Spear Phishing, Phishing, traditional SE)
 Internal attacks: Unauthorized access and access control
 Cloud Attacks and Breaches (Dropbox, iCloud, OneDrive, Etc.)
 Virus/Malware/Botnet
 Ransomware and Extortion
Legacy Gateway Security Implementation
Modern Security Implementation
Cyber Security Focus
Keeping the Bad Guys out
Protecting your Internal Network
Recovering from an Attack
Business Security: Keep the bad guys out
 Tools
 Modern firewall
 Security Event Manager
 Spam Filter
 Policy
 Monitor 24x7
 Security Event and Log Review
 No local Admins!
 Patch Management and Passwords (2 Form Factor)
External Threat Strategy
 Raise the bar higher than the next guy
 Weigh what you automate with what you control through policy and procedure
 Constant education on the latest threats must be a priority. The best defense is
intelligence.
Business Security: Protect from the Inside
 Tools
 Anti-virus, Anti-Malware
 Security Event Manager
 Modern Firewall
 Reverse Spam Filter
 Policy
 Employee Training
 Data Retention, Email Security, Data Access and Access Control policies
 Employee Turnover
 Device Management
Business Security: Attack Recovery
 Tools
 Backup, Disaster Recovery and Business Continuity
 Cyber Security Insurance
 Policy
 Communication Plan
 Recovery Time Objective
 Recovery Point Objective
 Incident Source Identification and Quarantine
 Test, Test, Test
Recovery Considerations
 Attack Source Discovery: 5 minutes to 8 hours
 Systems Restoration: 20 minutes to 2 weeks
 Data Loss: 15 minutes to 24 hours
 Put a real cost to the business loss to truly understand the impact
 Salary
 Missed sales
 Lost data
 Project delays and associated opportunity cost
Firewall Evolution
 Packet Inspection: Traffic cop: Can see car, color, plate, make and model and which
direction it is coming from but cant see who is driving, what is in the trunk, what is
underneath the car
 Deep Packet Inspection: X-ray vision. Much better than Packet Inspections but
even Superman can’t see through lead
 Encrypted traffic: https traffic is major cause of most breaches. Google prioritizes
search results to list https. Ransomware Cryptolocker uses this to explode on a
network via webmail
 Firewall purchased in the past 18-36 months may not be able to inspect https
traffic
Security Quick Tips
 Move DNS to trusted DNS source only
 Restrict outbound VPN connection to trusted users (Ransomeware Call Home)
 Block outbound SMTP (Botnet Zombies)
 Restrict outbound SSH connectivity (Remote access Trojan)
 Restrict download of executable files to admins and trusted users
 Inspect encrypted traffic
 Two factor authentication for remote users
 Block illicit applications (proxy bypass, peer to peer, tor, etc.)
 Automate alerts and review network traffic frequently

More Related Content

PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
Internet safety and you
PPTX
Be More Secure than your Competition: MePush Cyber Security for Small Business
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Business Continuity 2009
PPT
Cyber-Security-Presentation-2_2017.pptx.ppt
PPTX
What is Information Security and why you should care ...
PPTX
It security the condensed version
Cybersecurity Basics of awareness presentation .pptx
Internet safety and you
Be More Secure than your Competition: MePush Cyber Security for Small Business
Today's Cyber Challenges: Methodology to Secure Your Business
Business Continuity 2009
Cyber-Security-Presentation-2_2017.pptx.ppt
What is Information Security and why you should care ...
It security the condensed version

Similar to Cyber-Security-Presentation_Bistro_Group_ppt (20)

PPTX
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
DOCX
The Importance of Cybersecurity to Secure Business Operations.docx
PDF
Information Security
PDF
Cybersecurity Made Simple: How to Protect Your Business in 2025
PDF
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Cyber security for small businesses
PPTX
The Evolution of Cybercrime
PPTX
Common sense security by Fortium Partners
PPTX
Cyber Security for Financial Planners
PPTX
Information Security Basics for Businesses and Individuals
PPTX
Cyber security for business
PPT
Guard Era Security Overview Preso (Draft)
PDF
The Impact of Cyber Threats: Protecting Your Business in the Digital Age
PDF
Stratégies de Sécurité pour les PME : Recommandations Clés
PPTX
Information security for small business
PPTX
Ways To Protect Your Company From Cybercrime
PDF
Future-proof your business - West Sussex Recover & Rise S4W2
DOC
Data security
PDF
Why Should A Business Worry about Cyber Attacks?
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
The Importance of Cybersecurity to Secure Business Operations.docx
Information Security
Cybersecurity Made Simple: How to Protect Your Business in 2025
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
CyberCare Pro - Cybersecurity for SME's updated.pptx
Cyber security for small businesses
The Evolution of Cybercrime
Common sense security by Fortium Partners
Cyber Security for Financial Planners
Information Security Basics for Businesses and Individuals
Cyber security for business
Guard Era Security Overview Preso (Draft)
The Impact of Cyber Threats: Protecting Your Business in the Digital Age
Stratégies de Sécurité pour les PME : Recommandations Clés
Information security for small business
Ways To Protect Your Company From Cybercrime
Future-proof your business - West Sussex Recover & Rise S4W2
Data security
Why Should A Business Worry about Cyber Attacks?
Ad

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
KodekX | Application Modernization Development
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Dropbox Q2 2025 Financial Results & Investor Presentation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
KodekX | Application Modernization Development
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Ad

Cyber-Security-Presentation_Bistro_Group_ppt

  • 2. Cybersecurity Outlook 2017 Almost one in five small business owners say their company has had a loss of data in the past year. Small business owners are particularly hurt by cyberattacks. According to recent data 63 percent of small business owners view data as their new currency, and that a single data hack could have associated costs ranging from $82,200 to $256,000. - Norman Guadango, Carbonite
  • 3. Hackers: Breaches  Headlines  Ashley Madison 2015: Many use same passwords, spear phishing campaigns, blackmail targets  Twitter: 32 Million  Yahoo: 500 Million (LinkedIn, Amazon, Facebook, Credit Cards, )  Security cameras, breachable appliances, access control systems  Malware found on all platforms including Apple  2 million new signatures of malware in July 2016
  • 4. Cyber Security Threats for 2017  Ransomware and Extortion will increase (Stephen Gates, NSFocus)  Industrial IoT attacks will increase (Adam Meyer, SurfWatch)  Internal Threats will increase (James Maude, Avetco)  Physical Security Investments (Ed Solis, CommScope)  Hackers are in the Long Game
  • 5. Attack Vectors  Hacking (Data theft, corporate espionage, identity theft)  Social Engineering (Spear Phishing, Phishing, traditional SE)  Internal attacks: Unauthorized access and access control  Cloud Attacks and Breaches (Dropbox, iCloud, OneDrive, Etc.)  Virus/Malware/Botnet  Ransomware and Extortion
  • 6. Legacy Gateway Security Implementation
  • 8. Cyber Security Focus Keeping the Bad Guys out Protecting your Internal Network Recovering from an Attack
  • 9. Business Security: Keep the bad guys out  Tools  Modern firewall  Security Event Manager  Spam Filter  Policy  Monitor 24x7  Security Event and Log Review  No local Admins!  Patch Management and Passwords (2 Form Factor)
  • 10. External Threat Strategy  Raise the bar higher than the next guy  Weigh what you automate with what you control through policy and procedure  Constant education on the latest threats must be a priority. The best defense is intelligence.
  • 11. Business Security: Protect from the Inside  Tools  Anti-virus, Anti-Malware  Security Event Manager  Modern Firewall  Reverse Spam Filter  Policy  Employee Training  Data Retention, Email Security, Data Access and Access Control policies  Employee Turnover  Device Management
  • 12. Business Security: Attack Recovery  Tools  Backup, Disaster Recovery and Business Continuity  Cyber Security Insurance  Policy  Communication Plan  Recovery Time Objective  Recovery Point Objective  Incident Source Identification and Quarantine  Test, Test, Test
  • 13. Recovery Considerations  Attack Source Discovery: 5 minutes to 8 hours  Systems Restoration: 20 minutes to 2 weeks  Data Loss: 15 minutes to 24 hours  Put a real cost to the business loss to truly understand the impact  Salary  Missed sales  Lost data  Project delays and associated opportunity cost
  • 14. Firewall Evolution  Packet Inspection: Traffic cop: Can see car, color, plate, make and model and which direction it is coming from but cant see who is driving, what is in the trunk, what is underneath the car  Deep Packet Inspection: X-ray vision. Much better than Packet Inspections but even Superman can’t see through lead  Encrypted traffic: https traffic is major cause of most breaches. Google prioritizes search results to list https. Ransomware Cryptolocker uses this to explode on a network via webmail  Firewall purchased in the past 18-36 months may not be able to inspect https traffic
  • 15. Security Quick Tips  Move DNS to trusted DNS source only  Restrict outbound VPN connection to trusted users (Ransomeware Call Home)  Block outbound SMTP (Botnet Zombies)  Restrict outbound SSH connectivity (Remote access Trojan)  Restrict download of executable files to admins and trusted users  Inspect encrypted traffic  Two factor authentication for remote users  Block illicit applications (proxy bypass, peer to peer, tor, etc.)  Automate alerts and review network traffic frequently

Editor's Notes

  • #5: As more devices become internet-enabled and accessible and the security measures in place continue to lag behind, the associated risks are on the rise. Aside from the obvious risks for attacks on consumer IoT devices, there is a growing threat against industrial and municipal IoT as well. As leading manufacturers and grid power producers transition to Industry 4.0, sufficient safeguards are lacking. Not only do these IoT devices run the risk of being used to attack others, but their vulnerabilities leave them open to being used against the industrial organizations operating critical infrastructure themselves. This can lead to theft of intellectual property, collecting competitive intelligence, and even the disruption or destruction of critical infrastructure. Not only is the potential scale of these attacks larger, most of these industrial firms do not have the skills in place to deal with web attacks in real-time, which can cause long-lasting, damaging results. This alone will become one of the greatest threats that countries and corporations need to brace themselves for in 2017 and beyond. There are plenty of "As-A- Service" attack capabilities on the Dark Web for hire now and we should expect creative new IoT hack services to pop up in the near future. As organizations adopt more effective strategies to defeat malware, attackers will shift their approach and start to use legitimate credentials and software - think physical insiders, credential theft, man-in-the-app. The increased targeting of social media and personal email bypasses many network defenses, like email scans and URL filters. The most dangerous aspect is how attackers manipulate victims with offers or threats that they would not want to present to an employer, like employment offers or illicit content. Defenders will begin to appreciate that inconsistent user behaviors are the most effective way to differentiate malware and insider threats from safe and acceptable content.