the human element of cyber securityaapa.files.cms-plus.com/seminarpresentations... · *2016 isaca,...

15
The Human Element of Cyber Security Date

Upload: others

Post on 12-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

The Human Element

of Cyber Security

Date

Page 2: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

Overview

- Who We Are

- The Evolution of Cybersecurity

- The Human Element of Cybersecurity

- How to Address the Human Element

- Q & A

Page 3: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

Who We Are

Former offensive operators from the CIA, NSA, and FBI

We specialize in developing holistic cybersecurity and

insider threat programs from the offensive perspective

Page 4: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

The Human Element of Cybersecurity

Attackers will always take the easiest, most

effective method for gaining access.

Page 5: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

Co

ns

um

er

sEmployees

Pressures and changes which create opportunity and risk

The cyber challenge extends beyond your organization …

ClientOrganization

Traditional boundaries have shifted; companies operate in a dynamic environment that is increasingly interconnected, integrated, and interdependent.

• Organization are built around a model of open collaboration and trust

• Constant information flow is the lifeblood of the business ecosystem

Trusted parties have access to more information than ever before

Page 6: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

In 2015, the most

prevalent successful

attack types hinged

on the human factor

Phishing60%

*2016 ISACA, State of Cybersecurity

95%Of all security incidents involve

human error

41%Social Engineering

The Bad …

Companies are targeted via:

*2016 ISACA, State of Cybersecurity

*IBM 2014 Cyber Security Intelligence Index

Page 7: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

… The Good …

… or they can be your best

line of defense

Changing

Employee Behavior

Reduces Risk of

Security Breach by

to

*The Last Mile in Cyber Security; Aberdeen Group

Turn you employees into

proactive sensors45%

70%

Page 8: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

Yet companies are still more focused on outside threats …

Outsider threats

Of insider attacks are more costly than outsider

attacks

32%

Of insider attacks involving IP had an impact of over

$100,00071%

Of insider attacks involving IP had an impact

of over $1,000,00048%

Insider threats

Page 9: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

ACCESS

Co

mp

etito

r

And their defenses reflect that focus

of breaches are blamed on insiders –

anyone who has physical or remote

access to a company’s assets.*IBM 2015 Cyber Security Intelligence Index

55%

28%Of respondent victims couldn’t

determine if the incident was caused by

an insider or outsider*US State of Cybercrime Survey, 2015

Page 10: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

There is no solution that will be able to

completely protect you

How to Address the Human Element

Page 11: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

Any solution must be holistic and balanced

Technology

Process

PeopleProvides the skills andchanges one’s behavior

Tells you what to do and how to do it

Protects you and enables you to do it

Page 12: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

People

Education & Training

Less is spent on security events when employees are trained176%

Do NOT provide security

training for new hires154%

1 US State of Cybercrime Survey 2014

YET

Page 13: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of

People

Education & Training

Threats

Vectors

Policies

Resources

Page 14: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of
Page 15: The Human Element of Cyber Securityaapa.files.cms-plus.com/SeminarPresentations... · *2016 ISACA, State of Cybersecurity ... *IBM 2015 Cyber Security Intelligence Index 55% 28% Of