11
Scott Charney Cybercrime and Risk Management PwC

Scott Charney Cybercrime and Risk Management PwC

Embed Size (px)

Citation preview

Page 1: Scott Charney Cybercrime and Risk Management PwC

Scott CharneyScott Charney

Cybercrime and Risk Management

Cybercrime and Risk Management

PwC

Page 2: Scott Charney Cybercrime and Risk Management PwC

PwC

Understanding Risks:Computer As Target Understanding Risks:Computer As Target

Confidentiality

– The Cuckoo’s Egg

Integrity

– Seattle Sentencing

– Pac Bell Intrusion

Availability

– Morris Worm

– Infrastructure Protection

– Cascading Effects

Confidentiality

– The Cuckoo’s Egg

Integrity

– Seattle Sentencing

– Pac Bell Intrusion

Availability

– Morris Worm

– Infrastructure Protection

– Cascading Effects

2

Page 3: Scott Charney Cybercrime and Risk Management PwC

PwC3

Understanding Risks:Computer As Tool

Understanding Risks:Computer As Tool

Frauds

– Internal: The Airline Scam

– External: Phony e-businesses

Distribution Offenses

– Copyrighted Software

– Inappropriate Material

Frauds

– Internal: The Airline Scam

– External: Phony e-businesses

Distribution Offenses

– Copyrighted Software

– Inappropriate Material

Page 4: Scott Charney Cybercrime and Risk Management PwC

PwC4

Understanding Risks:Computer As Storage Device

Understanding Risks:Computer As Storage Device

Large Volume of Data

Duplicated and Distributed

Recoverable

Large Volume of Data

Duplicated and Distributed

Recoverable

Page 5: Scott Charney Cybercrime and Risk Management PwC

PwC

Future - What’s to come?Future - What’s to come?

Start with the Charney Theorem

+ Add anonymity

+ Add global connectivity

+ Add critical infrastructures

+ Add evidentiary issues

= Lifetime Employment for Law Enforcement and Computer Security Professionals

Start with the Charney Theorem

+ Add anonymity

+ Add global connectivity

+ Add critical infrastructures

+ Add evidentiary issues

= Lifetime Employment for Law Enforcement and Computer Security Professionals

5

Page 6: Scott Charney Cybercrime and Risk Management PwC

PwC

And It’s Probably Worse Than We Think...

And It’s Probably Worse Than We Think...

DoD Controlled Study

– Machines Attacked: 38,000

– Machine Penetrated: 24,700 (65%)

– Attacks Detected: 988 (4%)

– Attacks Reported: 267 (27%)

DoD Controlled Study

– Machines Attacked: 38,000

– Machine Penetrated: 24,700 (65%)

– Attacks Detected: 988 (4%)

– Attacks Reported: 267 (27%)

6

Page 7: Scott Charney Cybercrime and Risk Management PwC

PwC

What to Do: Manage Risk -- Implement Comprehensive Security!

What to Do: Manage Risk -- Implement Comprehensive Security!

Be Prepared To Prevent and Respond to Computer Incidents

Considering Physical, Personnel and Technical Security

Be Prepared To Prevent and Respond to Computer Incidents

Considering Physical, Personnel and Technical Security

Page 8: Scott Charney Cybercrime and Risk Management PwC

PwC

PreventionPrevention

Identify Assets (Computer Resources and Data)

Assess Internal and External Threats to Those Assets– Insider Threats: employees, contractors, JVs– Outsider Threats: hackers, hackivists, thieves, competitors,

terrorists, nation-states

Develop Core Business Policies to Protect Assets– Access Control Policies (watch remote access!)– Retention and destruction policies– Appropriate computer use– Workplace Monitoring?

Educate Users and TEST COMPLIANCE

Identify Assets (Computer Resources and Data)

Assess Internal and External Threats to Those Assets– Insider Threats: employees, contractors, JVs– Outsider Threats: hackers, hackivists, thieves, competitors,

terrorists, nation-states

Develop Core Business Policies to Protect Assets– Access Control Policies (watch remote access!)– Retention and destruction policies– Appropriate computer use– Workplace Monitoring?

Educate Users and TEST COMPLIANCE

Page 9: Scott Charney Cybercrime and Risk Management PwC

PwC

PreventionPrevention

Technical Approaches

– Map the Network

– Test Existing Security (Attack and Penetration)

• Application Defaults

• Bad Configurations - Known Vulnerabilities

• Password Management

– Install Defenses

• Firewalls

• IDS and CADS

• Encryption (VPNS, PKIs)

Technical Approaches

– Map the Network

– Test Existing Security (Attack and Penetration)

• Application Defaults

• Bad Configurations - Known Vulnerabilities

• Password Management

– Install Defenses

• Firewalls

• IDS and CADS

• Encryption (VPNS, PKIs)

Page 10: Scott Charney Cybercrime and Risk Management PwC

PwC

ResponseResponse

Develop response plan

– Identify Key Personnel for Response

– Identify Response Objectives

• Remediation vs. Investigation– Institute Response Procedures

• Audit Trails, Caller-ID

• Evidence Retention and Preservation

• Notifications (e.g., internal, downstream, law enforcement, regulatory authorities)

Develop response plan

– Identify Key Personnel for Response

– Identify Response Objectives

• Remediation vs. Investigation– Institute Response Procedures

• Audit Trails, Caller-ID

• Evidence Retention and Preservation

• Notifications (e.g., internal, downstream, law enforcement, regulatory authorities)

Page 11: Scott Charney Cybercrime and Risk Management PwC

Cybercrime and Risk Management

Cybercrime and Risk Management

Scott Charney(202) 822-4349

[email protected]

Scott Charney(202) 822-4349

[email protected]

PwC