1 of 25

Slide Notes

DownloadGo Live

Cyber Risks

Published on Nov 18, 2015

VBL/CML 19.11.2015

PRESENTATION OUTLINE

Cyber Risks

The Good, The Bad and the Ugly
Photo by wiredforlego

The 3 components
of risk

Photo by nic_r

Vulnerability

e.g. greed, love, sorrow, buffer overflow, unpatched system, CSRF...
Photo by misterbisson

Threat

e.g. script kiddie, "hacker", cyber-activist, cyber-criminal, state...
Photo by umezy12

Impact

e.g. money loss, data loss, fraud, service loss, reputation loss...
Photo by Domiriel

RISK = VULNERABILITY * THREAT * IMPACT

Photo by GotCredit

JOsef W. - CHAIRMAN, OCTOPUS GROUP

slowly recovers from a heart attack

discover what happened!

LIVE DEMO

CYBER Threat Landscape

Luxembourg
Photo by Furryscaly

Statistics 2014 (CIRCL)

Motivations

REal life examples

based on incidents from Luxembourg
Photo by 55Laney69

VOIP/PBX ATTACKS

  • scan for vulnerable PBX interfaces or VoIP servers
  • such systems are often outsourced or outside security scope
  • direct financial benefit by toll fraud

banking/presidential fraud

  • malware, phishing or social engineering (via phone) to access mailboxes
  • banking details changed / transactions executed
  • extreme cases: dedicated malware targeting corporate banking systems
  • targets: mainly huge invoice processing organisations
Photo by epSos.de

RANSOMWARE

  • recent ransomware encrypts harddisk as well as removal drives and shares
  • BYOD increased cases
  • 50% of LU victims had a non-functionnal/incomplete backup
  • ransomDDOS on the rise
Photo by thekeithhall

PLUG AND PRAY

Photo by Lawrence OP

PREVENTION...

  • PEOPLE (awareness, training, competences...)
  • TECHNOLOGY (AV, WAF, IPS, SIEM, SUS...)
  • ORGANISATION (policies, procedures, responsabilities...)
  • COMPLIANCE (privacy, IP...)
Photo by Bods

...IS NOT ENOUGH

  • be organised, have a CISO
  • you are already compromised
  • be proactive, detect and handle (CERT)
  • prepare for a crisis
  • get an insurance
Photo by Reiterlied

THERE ARE NO SMALL INCIDENTS

  • Minor incidents escalate fast
  • Exploitation is still too easy
  • Multi-compromises are used and abused
  • IoT makes it even worse
  • Attacks & attackers don't stop at the borders
Photo by n1colas

DETECTION/CLEANING TOO SLOW

DON'T SUFFER IN SILENCE

CASES.LU

  • security startup kit
  • awareness & training
  • customised check-up (diagnostic)
  • MONARC (optimised risk assessment method & tool)

CIRCL.LU

  • incident handling / coordination
  • DFIR tools & services
  • data feeds & early warning
  • threat & intelligence sharing
  • joint R&D and innovation
  • technical training & courses

Pascal Steichen
SECURITY
MADEIN.LU

Untitled Slide