guy walton - fbi cyber outreach
DESCRIPTION
ÂTRANSCRIPT
![Page 1: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/1.jpg)
FBI Cyber OutreachMontreat Collage
Cyber Awareness Conference 31 October 2015
FBI Cyber OutreachMontreat Collage
Cyber Awareness Conference 31 October 2015
Ganester “guy” [email protected]‐895-‐3634
![Page 2: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/2.jpg)
The Cyber Threat
2
“It’s now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation.” “America's economic prosperity in the 21st century will depend on cybersecurity.”
— President Obama
![Page 3: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/3.jpg)
3
Why are we here?
SSA Robert Hanssen-‐ Spied for Russia Arrested 2001.
Contract Linguist Shamai Leibowitz-‐Provided classified docs to a blogger Sentenced 2010.
(Really)
![Page 4: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/4.jpg)
The Cyber Threat, cont’d
4
“The threat is so dire that cyber security has topped Director of National Intelligence Jim Clapper’s list of
global threats for the second consecutive year, surpassing both terrorism and espionage – even the threat posed by weapons of mass destruction.”
— FBI Director ComeyFebruary 26, 2014
![Page 5: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/5.jpg)
Agenda
• FBI Overview • Combat cyber threats targeting the US• How to be a “good victim”
![Page 6: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/6.jpg)
AgendaCharlotte Division
Special Agent in ChargeJohn A. Strong
![Page 7: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/7.jpg)
DO YOU REALLY WANT TO MESS WITHFBI CYBER?
![Page 8: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/8.jpg)
FBI Cyber MissionTo proactively protect the United States against:
1) Cyber Terrorist attack2) Cyber Foreign intelligence
operations and espionage3) Cyber-‐base attacks and high
technology crimes
![Page 9: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/9.jpg)
Cyber Operations and Outreach Mission
The FBI Cyber Division (CyD) will, through its Cyber Operations and Outreach Section, conduct targeted outreach to the public & private
sectors to facilitate proactive national security operations and criminal investigations through information sharing, and elevated
awareness of FBI capabilities.
![Page 10: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/10.jpg)
OVERVIEW
![Page 11: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/11.jpg)
FBI MISSION STATEMENT
Our motto is:“Fidelity, Bravery, and Integrity”
Our mission is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.
11U//FOUO
![Page 12: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/12.jpg)
FBIHQOperational Divisions
CounterterrorismCounterterrorism CounterintelligenceCounterintelligence Criminal InvestigativeCriminal InvestigativeCyberCyber
![Page 13: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/13.jpg)
FBIField Offices
![Page 14: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/14.jpg)
FBIInternational Offices -‐LEGATs
![Page 15: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/15.jpg)
CYBERSECURITY RESPONSIBILITES
DHS(Protection, Prevention, Mitigation, & Recovery)
DOMESTIC
FOREIGN
DOJ/FBI(Detection Investigation, Attribution, & Disruption)
DOD/NSA(Defense, Prevention, & Overseas Intelligence)
15UNCLASSIFIED//FOR OFFICIAL USE ONLY
![Page 16: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/16.jpg)
![Page 17: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/17.jpg)
What you can do to combat cyber threats
![Page 18: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/18.jpg)
Information Security AwarenessInformation Security Awareness
s
Insider Threat Detection and Reporting Adversarial Methodologies (recruiting, reconnaissance, data collection) Indicators of Insider Threat Behavior Reporting Procedures for Suspicious Behavior and Events
![Page 19: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/19.jpg)
Information Security AwarenessInformation Security Awareness
s
Privacy AwarenessPersonally Identifiable Information (PII)
WorkHome
![Page 20: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/20.jpg)
Infosec Awareness TopicInfosec Awareness Topic
s
General and Privileged Users-‐How do you protect shared data (e.g. encryption, backups)-‐Internal and External threats (e.g. social engineering, insider threats)-‐Information Security Principles-‐How to report an Information Security Incident-‐Password requirements and protection-‐Social Engineering and Personal/Professional Use of Social Media
![Page 21: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/21.jpg)
Information Security AwarenessInformation Security Awareness
s
General and Privileged Users (cont.)-‐Identity theft-‐Appropriate Internet Use-‐Inventory Control-‐Physical Security-‐Mobile Devices (e.g. laptops, PDAs)-‐Removable Media Devices (e.g., CDs, USB drives)-‐Remote Access-‐Copyright Infringement and Software Piracy-‐Proper Email and instant messenger use
![Page 22: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/22.jpg)
Types of Malicious Software & Trends
• Advanced Persistent Threats (APT)• Trojans• Viruses• Worms• Spyware• P2P• Unknown senders• Spam• Phishing• Spear Phishing and attachments
![Page 23: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/23.jpg)
Remember!!Remember!!
s
Guy’s Rule of Thumb(s): ØThe Right Hire;
ØThe Right Policy and Procedures (On Boarding); and
ØThe Right individual(s) to check the Right Hire and Right Procedures.
![Page 24: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/24.jpg)
How to be a “Good Victim”
![Page 25: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/25.jpg)
INTERNET CRIME COMPLAINT CENTER
www.IC3.gov
![Page 26: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/26.jpg)
Cyber Reporting SharedCyber Reporting Shared
• Focus exclusively on cybersecurity threats• Located in all 56 FBI field offices
Cyber Task Forces (CTFs)Cyber Task Forces (CTFs)
• FBI’s 24-‐hour command center • Component of National Cyber Task Force Unit (NCTFU)CyWatch 24/7 OpsCyWatch 24/7 Ops
• Partnership between the FBI, DHS, and U.S. private commercial sector
• More than 200 companies participating
Domestic Security Alliance Council (DSAC)
Domestic Security Alliance Council (DSAC)
• Partnership between FBI and private sector• Information sharing and analysis effort; online portal with open registration
InfragardInfragard
• FBI-‐led alliance of peer agencies to protect national cyber interests
• Coordinate, integrate, share, and deconflict
National Cyber Investigative Joint Task Force (NCIJTF)
National Cyber Investigative Joint Task Force (NCIJTF)
![Page 27: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/27.jpg)
About InfraGardAbout InfraGard
•Each FBI field office has an InfraGard Coordinator Special Agent acting as point of contact for the local chapter, who recruits and vets new members during the application process.•InfraGard is comprised of local chapters called InfraGard Members Alliances (IMAs), which interact with a field office.•The local chapters report to the national organization called the InfraGard National Members Alliance (INMA)..
https://www.infragard.org
![Page 28: Guy Walton - FBI Cyber Outreach](https://reader033.vdocuments.us/reader033/viewer/2022050806/579071461a28ab6874a15cb4/html5/thumbnails/28.jpg)
INFORMATION-SHARING & PRIVATE SECTOR
The FBI works with local businesses, colleges and universities, research centers, and owners and operators of critical infrastructure to provide them with the information they need to protect themselves from threats.
Our private-‐sector and information-‐sharing partnerships include:
4 The FBI’s Counterintelligence Strategic Partnership Program
4 Business Alliance4 Academic Alliance4 National and Regional
Counterintelligence Working Groups
4 InfraGard
4The National Cyber Forensics and Training Alliance
4Fusion centers4The Domestic Security Alliance Council
(DSAC)4The National Gang Intelligence Center4The Criminal Justice Information Services
Division (CJIS) in West Virginia