registrant outreach : cyber security webinar€¦ · • backup and disaster recovery it security...

48
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15, 2018 (in-person)

Upload: others

Post on 13-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Cyber Security

Presenters:- Brian Everest, Chief Technology Officer, Starport Managed Services- Susan Pawelek, Accountant, Compliance and Registrant Regulation

February 13, 2018 (webinar)

February 15, 2018 (in-person)

Page 2: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Disclaimer

The views expressed in this presentation are the personal views of thepresenting staff and do not necessarily represent the views of the OntarioSecurities Commission or any of its other staff.

The presentation is provided for general information purposes only and doesnot constitute legal or accounting advice.

Information has been summarized and paraphrased for presentationpurposes and the examples have been provided for illustration purposes only.

Information in this presentation reflects securities legislation and otherrelevant standards that are in effect as of the date of the presentation.

The contents of this presentation should not be modified without the expresswritten permission of the presenters.

2

Page 3: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Agenda

• Cyber Security – the Basics

• New Kinds of Risks and Threats

• Overview of Staff Notice

• What Can You Do? – #1 The Basics

• What Can You Do? – #2 Defense in Depth

• Summary

3

Page 4: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Cyber SecurityThe Basics

4

Page 5: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Typical IT Environment

5CYBER SECURITY THE BASICS

Page 6: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Firewalls

• Anti-Virus

• Windows Patching

• E-mail and Spam Filtering

• Monitoring and Logging

• IT Policies and Procedure

• Backup and Disaster Recovery

IT Security Basics

6CYBER SECURITY THE BASICS

Page 7: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Malware – Viruses, Ransomware, Cryptolocker

• Phishing e-mails

• Social Engineering (Fraud)

• User Risk – accidental and intentional activities

Common IT Threats

7CYBER SECURITY THE BASICS

Page 8: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

New Kinds of Risks andThreats

8

Page 9: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Spear Phishing (Targeted Attacks)

• Denial of Service Attacks

• Worms – like WannaCry – rapidly spreads to all vulnerable devices

• Infrastructure Vulnerabilities (Meltdown/Spectre)

New Kinds of Threats

9NEW KINDS OF RISKS AND THREATS

Page 10: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Spear Phishing (Targeted Attacks)

New Kinds of Threats

10NEW KINDS OF RISKS AND THREATS

Page 11: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Denial of Service Attacks

Both network attacks and internal IT services can be targeted

Nayana, a web hosting company, paid $1M ransom to stop a DDoS

• DDoS attacks can also be used as cover for other hacking

activities – they can be used as a distraction for IT staff

New Kinds of Threats

11NEW KINDS OF RISKS AND THREATS

Page 12: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• New Types of Malware

• Worms – like WannaCry – rapidly spreads to all vulnerable devices

• CryptoMining viruses that generate revenue

• Fileless Malware that is not detectable by regular anti-virus

New Kinds of Threats

12NEW KINDS OF RISKS AND THREATS

Page 13: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Infrastructure Vulnerabilities (Meltdown/Spectre)

New Kinds of Threats

13NEW KINDS OF RISKS AND THREATS

Page 14: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Many threats are now targeted and profit driven

• Organized crime involved using paid IT staff

• Hacking organizations like Anonymous and Shadow Brokers

• Government sponsored attacks

Changes to Cyber Threats - Hackers

14NEW KINDS OF RISKS AND THREATS

Page 15: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Often delays of days or weeks from initial installation of spywareto the breach of data

• Network hacks can be sold – someone can pool together data,botnets or compromised sites and sell access to a 3rd party

• Average Cyber Criminal age isnow 17 and may be working asa contractor

Hacker Behaviour

15NEW KINDS OF RISKS AND THREATS

Page 16: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Free toolkits available for launching attacks

Hacking for Dummies

16NEW KINDS OF RISKS AND THREATS

Page 17: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Combining information from social networks (Twitter, Facebook,LinkedIn) with real world information (official websites, phoneslists) to perform social engineering attacks

Social Media

17NEW KINDS OF RISKS AND THREATS

Page 18: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

IoT (Internet of Things)

Interconnectivity of devices poses new risks

18NEW KINDS OF RISKS AND THREATS

Page 19: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Crypto Currency Exchanges – perfect storm of high value targetsin new markets with new IT infrastructures

Favourite Hacker Targets

Exchange Year ofHack

Value($CDN)

Currency

Bitcoinica 2012 $7M Bitcoin

Mt Gox 2014 $490M Bitcoin

NiceHash 2016 $92M Bitcoin

Veritaseum 2017 $11M Ethereum

Coincheck 2018 $650M NEM

Total $1.2B

19NEW KINDS OF RISKS AND THREATS

Page 20: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Overview of Staff Notice 33-321 Cyber Security

20

Page 21: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Overview of NI 33-321

Published On October 19, 2017

Includes:

• Results of survey sent in 2016

• Guidance

• Expectations for CSA registered firms

21OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 22: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Components of cyber securitypreparedness

Main components of a firm’s cyber security preparedness:

1. Policies and procedures

2. Training

3. Incident response plan

22OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 23: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

1. Polices and procedures

Policies and procedures should include the following:

• Use of electronic communications

• Use of firm-issued electronic devices

• Loss or disposal of an electronic device

• Use of public electronic devices or public internet connections

• Detecting internal or external unauthorized activity

• Ensuring software is updated in a timely manner

• Overseeing third-party vendors / service providers

• Reporting cyber incidents

23OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 24: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Risk Assessments

What to include in a risk assessment:

• Inventory of the firm’s critical assets and confidential data

• Vulnerable areas of the firm’s operations

• How cyber threats and vulnerabilities are identified

• Potential consequences of cyber threats identified

• Adequacy of preventative controls

24OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 25: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

2. Training

Employees often first line of defence

Training should include:

• Risks associated with the data collected, used or disclosed

• Safe use of electronic devices

Training should take place with sufficient frequency to remaincurrent.

25OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 26: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

3. Incident response plan

A written incident response plan should include:

• Who should be involved in communicating about theincident and responding to the incident

• Different types of cyber attacks the firm might face

• Procedures to stop / neutralize the threat

• Procedures to recover data

• Identification of parties that should be notified

26OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 27: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Outside service providers

a) Due diligence

• Evaluation of service provider’s cyber security

• Limit access to firm’s systems and data

b) Written agreements

• Include provisions related to cyber threats

c) Cloud services

• Security practices of cloud service provider

27OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 28: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Other

Insurance

Data protection:

• Use of encryption

• Strength of passwords

28OVERVIEW OF STAFF NOTICE 33-321CYBER SECURITY

Page 29: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

What Can You Do?

#1 - Cover the Basics

29

Page 30: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Expert IT Security Advice

• Assessing risk requires an understanding of your businessrequirements and knowledge of current IT threats

• Consult with Security Experts about the right solutions for yourbusiness – whether your in-house IT group / security division orwith a 3rd party

• Regularly review security best practices – Cyber Security is thefastest growing area in IT for both new threats and new solutions

30WHAT CAN YOU DO?#1 COVER THE BASICS

Page 31: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Preventative IT Maintenance

• Windows Patches tested and applied in a timely manner

• Automating windows patching and anti-virus updates

• Central monitoring of all the patching – so someone is reviewingthe updates and addressing problem servers or PCs

• Update switches and firewalls firmware

31WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 32: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Backups and Archives

• Backups are a key element in recovering from Cyber incidents

• Should be at least 3 separate locations for backups – onsite,offsite and long term archives

32WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 33: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Using the Cloud

• Companies trust their cloud providers to handle backups and disasterrecovery

• Recommend an extra layer of backup, outside of the cloud, not accessibleby the provider

33WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 34: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Disaster Recovery

• Incident Response Plans and Disaster Recovery Scenarios need toinclude Cyber issues

• Disaster Recovery has to be the last line of defense against CyberSecurity Threats

• Server images with “instant recovery” and Cloud Provider withimmediate failover should be used

34WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 35: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Monitoring IT

• Malware and social engineering attacks usually take place insideyour network

• Your current IT infrastructure may not have visibility into what isgoing on until it impacts your business

• The challenge is to monitor IT in real-time and be alerted forsuspicious activity as it is happening

35WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 36: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

What a Firm’s IT infrastructure does

vs.

What Users have to do to be secure

IT Security Responsibilities

36WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 37: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Social Engineering is becoming as important as technical toolsfor attacks

AND

• Security Awareness Training is just as important as technicaltools for defense

Social Engineering

37WHAT CAN YOU DO?#1 COVER THE BASICS

Page 38: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Pass phrases can work better (brownbasketfour) then complexpasswords (P@ssW0rD)

• Ultimate combination is a password that uses lower anduppercase, numbers and special characters and is at least 12characters

• Preferable not to rely on only usernames and passwords forauthentication

Secure Passwords

38WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 39: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Preferable not to rely on only usernames and passwords forauthentication

• Use 2 factor authentication whenever it is available

• Respond to any alerts about failed login attempts

• Use different passwords for different services

Authentication Best Practices

39WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 40: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

User Response to IT Threats

• Use a second channel for approvals for e-mail requests toprevent Spear Phishing attack from succeeding.

• Delete suspected e-mail without opening and confirm with thesender if the e-mail was legitimate

• If there is unusual activity on your PC that you cannot stop thenshutdown your PC immediately and notify IT support

40WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 41: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Things you can do to protect your company (and yourself):

• Secure Passwords and Screen Timeout Locks

• Encrypt storage on your devices

• Don’t download insecure applications

• Run management software to protect and monitordevices that connect to the corporate network andcritical mobile applications

Mobile Devices

41WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 42: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• Same rules apply about IT security for home equipment

• Change the default passwords on any home IT equipment(Smart TVs, wireless access points)

• Put passwords on phones, tablets and notebooks

Personal IT

42WHAT CAN YOU DO?WHAT CAN YOU DO?#1 COVER THE BASICS

Page 43: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

What Can You Do?

#2 – Defense in Depth

43

Page 44: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Defense in Depth

Revisiting theStandard IT Setup

44WHAT CAN YOU DO?#2 DEFENSE IN DEPTH

Page 45: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Defense in Depth

User Security Awareness

Physical Security

Network Security

Computer Security

ApplicationSecurity

Data

45WHAT CAN YOU DO?#2 DEFENSE IN DEPTH

Page 46: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

Defense in Depth

46WHAT CAN YOU DO?#2 DEFENSE IN DEPTH

Page 47: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

• A Solid IT Infrastructure is the foundation of being able to handleCyber events

• Defense in Depth – layers of IT protection is critical to mitigatecyber security issues

• Cyber Security is evolving and IT best practices need to bemodified to keep up

Take Aways

47SUMMARY

Page 48: Registrant Outreach : Cyber Security Webinar€¦ · • Backup and Disaster Recovery IT Security Basics CYBER SECURITY THE BASICS 6 • Malware – Viruses, Ransomware, Cryptolocker

[email protected]

Contact Centre:[email protected] or

1-877-785-1555 (toll free)

48