ucsp615narratedpowepointtrendsincybersecurity

18
Trends in Cybersecurity Cybercrime, Privacy/Regulation and Human Error Awareness

Upload: lucas-rivera

Post on 16-Apr-2017

275 views

Category:

Documents


1 download

TRANSCRIPT

Trends in CybersecurityCybercrime, Privacy/Regulation and Human Error Awareness

Importance of Information Security ConsciousnessMcAfee statistically reports in 2014 over a trillion dollars were spent battling security threats (Roque, 2015)Target, Sony and the Federal Aviation Administration were all successfully breached in 2014Capitol Hill staffers annually attend the Congressional Cyber Boot Camp to help bridge the technological gap between politicians and cybersecurity (Need for legislative et al., 2015)

Importance of Information Security Consciousness (Contd)Kevin Mandia, President of FireEye, a leader in protecting companies from advanced malware, zero-day exploits and APTs, reports 29 out of 30 investigations revolved around Chinese and Russian government sponsored attacks (Fyffe, 2015)Trend Micros 2014 second quarter Cybercrime: Responding to Evolving Cybercrime Tactics urges organizations to develop incident response strategies and collaborate with other companies to create a unified front (Roque, 2015)

Top Cyber Trends Cybercrime response to attacks is well behind cybercriminal effortsPrivacy/Regulation the Internet has no borders; therefore developing privacy regulations is ongoingHuman Error Awareness human error leads to the most breaches; training staff with information security best practices is necessary

Cyber Trends in 2015. http://cybersecuritycaucus.com/wp-content/uploads/2015/04/635539779317224585-480578561-1-.jpg

Cybercrime

Government agencies and large scale organizations alike have seen significant data breaches (i.e. FAA, Sony, Adobe, etc.)International and national cyber breaches are important to include in industry research, as they can provide insight to potential threatsU.S. government agencies and multinational organizations are being attacked by international governments (i.e. China and Russia)Hackers remain ahead of the current industry best practice security measures, as attacks continue to grow daily [Photograph of cybercrime image], http://worldmediamonitoring.com/experts-warn-coming-wave-cybercrime/

Prominent Cyber Attacks

Large Scale Data Breaches Affect Millions of Users, http://www.statista.com/chart/2540/data-breaches/

Privacy/RegulationCongressional staffers are required annually to attend Cyber Boot Camp trainingRegulations are becoming more stringent for companies managing personally identifiable information (PII)Information sharing will soon become regulated as a unified front strengthen overall cyber defenses

[Photo of privacy terms], http://databreachinsurancequote.com/hipaa-hitech-data-breach/hipaa-data-breaches-hipaa-privacy-regulation-violations-and-cyber-insurance/

Privacy/Regulation (Contd.)

Senator Charles Schumer (D-NY) is urging the stalled Cybersecurity Information Security Act (CISA); in light of the recent New York data breach suffered by Excellus BlueCross BlueShield (Williams, 2015)CISA will require companies to share data breaches suffered in an effort to create a unified frontNew York Excellus BlueCross BlueShield data breach exposed 10 million members[Photograph of Senator Charles Schumer], http://thehill.com/policy/cybersecurity/253393-schumer-calls-for-vote-on-stalled-cyber-bill

Human Error AwarenessTargets 2014 data breach was the result of an exposed vulnerability with the HVAC vendor software (Olavsrud, 2014)Congressional Cyber Boot Camp annually offered to Capitol Hill staffers to bridge the technological gap between politicians and cybersecurity (Fyffe, 2015)Companies need to increase budgets for training staff in information security best practices

[Photograph of human error statistic], http://www.mediapro.com/root-cause-data-breaches-human-error/

Human Error Awareness (Contd.)

Sony and the Federal Aviation Administration (FAA) reported both of their data breaches were due to either disgruntled employees or vendorsTrend Micros 2014 second quarter Cybercrime: Responding to Evolving Cybercrime Tactics urges organizations to develop incident response strategies and collaborate with other companies to create a unified front (Roque, 2015)

[Photograph of Sony data breach assailants], http://www.zdnet.com/pictures/2014-in-security-the-biggest-hacks-leaks-and-data-breaches/2/

ConclusionCybercrime is evolving at a rapid rate and must be met with an aggressive responseCompanies must be aware of data breaches reported in order to learn from vulnerabilitiesPrivacy regulation must be acknowledged and adhered to when developing internal processes

[Photograph of cybersecurity], https://www.amrita.edu/news/capture-flag-cyber-security-awareness

Conclusion (Contd.)

The Cybersecurity Information Security Act (CISA) is gaining supports as data breaches have cost trillions in damagesHuman error awareness continues to be the leading cause of data breaches for companies and/or government agenciesCompanies must develop incident response strategies and work toward information sharing of data breaches in order to build a stronger cyber response

[Photograph of cyberworld], https://msisac.cisecurity.org/resources/toolkit/Oct14/index.cfm

ReferencesFyffe, S. (2015, August 21). Cybersecurity boot camp draws Congressional staffers to Stanford. Hoover Institution, Stanford University. Retrieved from: http://www.hoover.org/news/cybersecurity-boot-camp-draws-congressional-staffers-stanfordKnapp, E. D. (2015). Outlook optimistic despite tough year in cybersecurity. Pipeline & Gas Journal, (8). 64. Retrieved from: http://eds.b.ebscohost.com.ezproxy.umuc.edu/eds/pdfviewer/pdfviewer?sid=1f50b28d-5b09-4ad9-b63b-f3a856bfdbd3%40sessionmgr198&vid=7&hid=119Large-scale data breaches affects millions of users. (2015). Retrieved from: http://www.statista.com/chart/2540/data-breaches/

References (Contd.)Need for legislative mechanism and criminal law to tackle cyber crime: Kiren Rijiju. (2015, August 26). Business Insights: Essentials. Retrieved from: http://bi.galegroup.com.ezproxy.umuc.edu/essentials/article/GALE%7CA426790753/4e070b1b022fcedf00abd7c117e0d7da?u=umd_umuc Olavsrud, T. (2014, December 10). 5 Information security trends that will dominate 2015. CIO website at www.cio.com. Retrieved from: http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will-dominate-2015.html?page=5 [Photograph of cybercrime image]. (2015). Retrieved from: http://worldmediamonitoring.com/experts-warn-coming-wave-cybercrime/[Photograph of human error statistic]. (2015). Retrieved from: http://www.mediapro.com/root-cause-data-breaches-human-error/

References (Contd.)[Photograph of privacy terms]. (2014). Retrieved from: http://databreachinsurancequote.com/hipaa-hitech-data-breach/hipaa-data-breaches-hipaa-privacy-regulation-violations-and-cyber-insurance/ [Photograph of Sony data breach assailants]. (2015). Retrieved from: http://www.zdnet.com/pictures/2014-in-security-the-biggest-hacks-leaks-and-data-breaches/2/Roque, R. (2015). Technology trends to prepare for in 2015: 2015 is expected to be an exciting year for technology, including cybersecurity, wearable technology, social media, 3D printing, cloud computing, and predictive analysis. Government Finance Review, (1). 38. Retrieved from: http://bi.galegroup.com.ezproxy.umuc.edu/essentials/article/GALE%7CA404754478/ffbdc0db3510bdfd8ccb4fcd870af24b?u=umd_umuc

References (Contd.)Trends in cybersecurity. (2015). Retrieved from: http://cybersecuritycaucus.com/wp-content/uploads/2015/04/635539779317224585-480578561-1-.jpgTrend Micro highlight need for comprehensive cybersecurity. (2014, August 13). Business Insights: Essentials. Retrieved from: http://bi.galegroup.com.ezproxy.umuc.edu/essentials/article/GALE%7CA378166797/9f835f04badd3318a0d78ae5b8c7fb52?u=umd_umucWilliams, K. B. (2015). Schumer call for vote on stalled cyber bill. www.thehill.com. Retrieved from: http://thehill.com/policy/cybersecurity/253393-schumer-calls-for-vote-on-stalled-cyber-bill

References (Contd.)[Photograph of cybersecurity]. (2012). Retrieved from: https://www.amrita.edu/news/capture-flag-cyber-security-awareness[Photograph of cyberworld]. (2015). Retrieved from: https://msisac.cisecurity.org/resources/toolkit/Oct14/index.cfm

The End