32
Copyright © 2018 CyberSecurity Malaysia DATA BREACH INCIDENTS ARE DEVASTATING WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA 11 OCTOBER 2018

DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

Copyright © 2018 CyberSecurity Malaysia

DATA BREACH INCIDENTS ARE DEVASTATING

WAN ZULHAMLI WAN ABDUL RAHMANKETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT,

CYBERSECURITY MALAYSIA

11 OCTOBER 2018

Page 2: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

2

OUR CYBER WORLD TODAY

Page 3: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

3

4.17B i l l i o nDigital citizens

worldwideby 2020

( e M a r k e t e r , 2 0 1 6 )

55%

Digital citizensin Asia

Source: Internet World Stats

(As of June 2018)

4 ,021,000,000

Source: We Are Social (A global agency that collects data from Google, Ericsson, Akamai, GlobalWebIndex & Stat counter)

Digital citizens worldwide( A s o f A p r i l 2 0 1 7 )

25,080,000Digital citizens

(As of January 2018)

Source: We Are Social , Hootsuite

in Malaysia

HIGHLY CONNECTEDT h e W o r l d To d a y i s

2,062,136,472

Presenter
Presentation Notes
32.4 juta rakyat malaysia = 78% is digitally connected 7.7 billion world population = 52% is digitally connected
Page 4: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

EXPANSION OF NEW TECHNOLOGIES INTO CYBERSPACE- More Exposure to Growing Cyber Risks In Digital Environment

Presenter
Presentation Notes
Trend Micro Asia Pacific, Middle East and Africa Vice-President Dhanya Thakkar said Malaysia was still a long way of from being ready for the industrial revolution 4.0 (IR4.0) especially in terms of cyber security. Malaysia spends 0.08 per cent of its gross domestic product for cyber security purposes. This is still not enough compared with other countries
Page 5: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

5

WE ARE MOVING INTO A MORE INTERCONNECTED CYBERSPACE

Page 6: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

TOP 5 RISKS LIKELIHOOD IN 2018

Presenter
Presentation Notes
The Global Risks Report is based on the annual Global Risks Perception Survey (GRPS)1, completed by 900 members of the World Economic Forum’s global multi-stakeholder community. Respondents are drawn from business, academia, civil society and the public.
Page 7: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

7

GLOBAL CYBER SECURITY LANDSCAPE

Page 8: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

RISK OF ECONOMIC LOSS DUE TO CYBERCRIMES

Page 9: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

9

RISING TREND OF CYBER ATTACKS ON CRITICAL SYSTEMS

Page 10: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

RISING TREND ON CYBERCRIMES - REPLACING TRADITIONAL CRIMES

Page 11: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

• Total financial losses could be as a high as $1 billion

• Spyware let the group learn how money was processed, sent and received – the spyware gave attackers the ability to gain remote control of the bank's computer.

Page 12: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

12

RISING TREND OF DARKNET PLATFORM TO BUY AND SELL STOLEN DATA

- CHEAPER, EASIER & LESS RISK FOR THE CYBER CRIMINALS TO CONDUCT CRIME

Presenter
Presentation Notes
common social engineering attack examples were phone and messaging scams. “Scammers pretend to be someone calling or texting from the telco since they can prove they have the target’s personal details,” said Chow, who is with cybersecurity and malware protection company Fortinet. He added that the scammers would then try to trick the victim in various ways. These include transferring funds into their accounts and installing “telco applications” containing malware or spyware, which will be used to exploit the target in future. “The devices would likely not be hacked directly, but anyone with the data dump information and a little creativity may convince unsuspecting victims to install malware on their devices. “Users need to be alert when receiving calls and messages from strangers. Do not get tricked into sharing more personal details, transferring funds or installing apps,
Page 13: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

13

RISING TREND ON ATTACK SOPHISTICATION- Cyber Attack Uses Structured Process

Source : http://amosval.com

Presenter
Presentation Notes
This slide explains about the current threat contributors consist of attack platform, types of threat actors, monetary factor and type of attack method To date, phishing is the most promising platform that lead to further cyber attack. RM4,500 per 10k data
Page 14: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

GLOBALDATA BREACH SCENARIO

Page 15: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

DATA BREACH IS A GLOBAL PROBLEM

Presenter
Presentation Notes
Equifax cyber attack = 147 juta americans dan berjumlah Singapore health attack =
Page 16: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

Underpinning Data Breach Issue- Is Cyber Espionage

Page 17: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

RISING TREND OF DATA BREACHES

https://breachlevelindex.com/

Page 18: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

https://breachlevelindex.com/

Presenter
Presentation Notes
In 2013, the energy company BP said it experienced about 50,000 daily attempts at cyber intrusion, but that would represent a holiday at the Pentagon and National Nuclear Security Administration, which each sees 200 times as many online attacks. 
Page 19: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

TRENDS OF CYBER THREATS IN MALAYSIA

19

Page 20: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

20

MALAYSIA IS DRIVEN BY DIGITAL TECHNOLOGY- Bringing Along New Technologies That Come With New Security Issues

FinTech - technologies that are disrupting traditional financial services i.e. mobile payments, money transfers, loans“….investment in Fintech around the world has increased dramatically from $930 million in 2008 to more than $12 billion by early 2015” - Accenture Source: https://www.forbes.com/sites/bernardmarr/2017/02/10/a-complete-

beginners-guide-to-fintech-in-2017/#2f6414393340.

Page 21: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

MALAYSIANS ARE STILL VULNERABLE TO CYBER FRAUDS

3358

Page 22: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

NEW TARGET OF CYBER CRIMINALS -DATA MEANS MONEY

Page 23: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

KNOWN MALAYSIA DATA BREACH IN NUMBERS

46.2 Million

Malaysia Telco

10.5 Million

Ministry of Education

220,000

Malaysian organ donors and their next-of-kin

110,000

Astro

81,309

Malaysia Medical Association and Malaysia Dental Association

3.88 Million

Jobstreet

Presenter
Presentation Notes
Astro 60k data being sold at RM4,500 for 10,000 records, or RM0.45 per record. + 50k RM3,000 for 10,000 records MMA = 20K, MMC 62K Telco = details are believed to be updated from 2012 to 2015 Total = almost 61 million data��MOE Data = what the vulnerable system was, how to exploit the vulnerability and finally (and most importantly!) a link to a Google Drive folder containing Gigabytes of data.
Page 24: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

JOBSTREET DATA BREACH

Page 25: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

MALAYSIA MEDICAL ASSOCIATION DATA BREACH

Page 26: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

TELCO DATA BREACH

Page 27: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

SAMPLE OF THE SELLING THREAD

Page 28: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

• Diversion of employees from strategic initiatives to work on damage control

• Cybersecurity improvement

• Operational Disruption

• Diversion of employees from strategic initiatives to work on damage control

• Post-Breach customer protection

• Detection and escalation• Notification• Lost business / contract• Response costs• Competitive

disadvantage• Insurance premium cost

• Sensitive media scrutiny

• Public Relation• Loss of intellectual

Property / Asset

Brand Financial

OperationalRegulatory

28

INSECURITY CAUSES DEVASTATING IMPACTS - Cyber Risks and Impacts of Data Breach

Page 29: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

Approach

Page 30: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

Data loss prevention should not be an afterthought.

Data breaches can result in:

Loss or compromise of Personally Identifiable Information (PII)records;

Theft of classified information, valuable intellectual property andtrade secrets(financial impact); and

Compromise of critical information infrastructure that canthreaten national security and societal well-being.

Pro-active and comprehensive approach is necessary for:

Early detection and prevention of cyber incidents; Stringent Access Control Policy Data classification Mitigation of the risks of cyber incident. Incident Management including Breach Notification

30

Key Take Away ;

Presenter
Presentation Notes
Loss of IP happened to one of the university in USA. CII info such as energy sector, communication sector and public services
Page 31: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

PROPOSED WAY FORWARD

31

Adopting innovative measures to address evolving cyberthreats;

o Assess your internal risk culture - reveal how well an

organization and its leaders support a cyber risk culture

o Prioritise targeted training - to tailor ongoing training

initiatives to different employee groups.

o Rethink your skills strategies - assess skills gaps at regular

intervals and determine how to best fill those gaps

Page 32: DATA BREACH INCIDENTS ARE DEVASTATING … › images › SeminarKD › 2018 › Slide...WAN ZULHAMLI WAN ABDUL RAHMAN KETUA JABATAN KAJIAN STRATEGIK DAN NASIHAT, CYBERSECURITY MALAYSIA

Copyright © 2017 CyberSecurity Malaysia