Download - Cyber Crime - Its Time Has Come
PowerPoint Presentation
Cyber Crime its time has come
Keith McDevittCyber Resilience IntegratorScottish Government
And here is why !!Cyber-crime is a low risk, high reward crime type where the complexity and speed of technological change offers direct advantage to criminal entrepreneurs as well as a vast victim market.
Looking Forward, The Internet of Things will provide many many more things to attack
Cyber criminals only have to be lucky once, Businesses have to be lucky 24/7/365
Cyber Security Breaches Study 2016 endorsed by CBI and FSB
KMPG & FSB Research
Drivers for change Perfect Storm
Growing number of breaches that are making the headlines impacting on reputationCriminal capability growing Growing realisation that it could be youConcerns about Supply Chain weakness mandating cyber due diligenceInsurance sector maturityincreasing litigious environment due to class action and tort litigation.EU Directive on Network SystemsEU Regulation on Data Privacy
The Threat Actors
The Dark Web
In a Digital age Cyber attacks are rapidly becoming a Business Norm So when it happens to you are your prepared What is the Planis there one?
2016 The Year of Ransomware
Ransomware Case Study
"They were looking for a ransom of $350 initially," he said. "When we contacted them by email, they put that up to 1000.
"I said, 'Well I need that bloody information back. I've got a business to run here.' I think any businessman in my position would say 'Yes! Let's do it', because I've got no other way of getting information to rebuild that database.
"I would say 80 to 90% of the information was corrupted" he said. "In terms of hard cash income I would say we were probably down by about 20,000.
Ken Main, Business Owner
Cyber Risk is a Business Risk but is it on the agenda
What is the Threat?Why are we targeted?When is this happening?How are we positioned to respond?Where are our critical assets?Who wants our assets?
A threat is not a risk to be managed until it is understood
Getting The Basics Right
Scottish Enterprise CE Voucher
Join the Cybersecurity Information Sharing Partnership (CiSP) its free !!
Cyber Criminals exploit weaknessThey are generally lazy and seek the path of least effort and resistance.They exploit weakness and flaws in coding (vulnerabilities) and people code.They exploit people as they are the weakest link.Trust is in our DNA thats why Social Engineering works.Cyber resilience is a People not IT thing
Path of least resistance. Systems and processes are good but dont forget the people