Cyber Security: Protecting your business from attack · Cyber crime IS crime… The adopted...
Transcript of Cyber Security: Protecting your business from attack · Cyber crime IS crime… The adopted...
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
Cyber Security: Protecting your business from attack Breakfast Business Seminars, Autumn 2015 Wednesday 14 October 2015
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
Build your business with our Autumn seminars Wednesday 14 October: Cyber Security Wednesday 11 November: Social Media cranfieldtechnologypark.co.uk
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
Phil Cobley Regional Cyber Protect Coordinator ERSOU (East Region Special Operations Unit)
Cyber Security
What we shall discuss…
n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime
Investigations? n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute
Firstly…who is this guy?!
n 10 years experience in the Police n Was previously the Digital Forensics Manager and Cyber
Crime Investigations Manager at Bedfordshire Police n Now the Regional Cyber Protect Coordinator n Qualified Digital Forensics Practitioner and Network
Investigator n Currently studying BSc Software Development n Force Practitioner Lead on Cybercrime n Guest Lecturer at University of Bedfordshire on Cyber Crime n Sit on the National ISO 17025 Standards Expert Network n Published in the law Journal ‘Cyber Security Law & Practice’ n Co-authored the recently released eBook produced by the
NCCR – “A Practical Guide to Coping with Cyberstalking”
Cyber crime IS crime…
The adopted definition of Cyber Crime is:
• Cyber Dependent Crimes, where a digital system is the target as well as the means of attack. These include attacks on computer
systems to disrupt IT infrastructure, and stealing data over a network using malware (the purpose of the data theft is usually to commit
further crime).
• Cyber Enabled Crimes. ‘Existing’ crimes that have been transformed in scale or form by their use of the Internet. The growth
of the Internet has allowed these crimes to be carried out on an industrial scale.
• The use of the Internet to facilitate drug dealing, people smuggling and many other 'traditional' crime types.
Which of these is a cyber threat? Common house hold ‘smart’ goods are now being hacked and
used in Spam and DDOS activity
We live our lives online
3bn people will be using the internet worldwide by 2016 and by the end of the year, networked devices will outnumber people by six to one
On average each household has 3
internet enabled devices and 2/5 adults have smart phones
8% of GDP generated through the
internet economy £121bn in 2010 with Household annual
retail sales worth £2.6bn with 30% year on year growth
£27billion – 2% GDP (Detica 2011) n £21 billion to business n £2.2 billion to government n £3.1 billion to ‘Jo Public’ n 44m cyber attacks in 2011 in UK
Estimated cost of Cyber Crime…
National Security Strategy Tier 1 threat
n One in three adults suffered online
crime in the previous 12 months
n One in five suffered offline crime
Federation of Small Business (21/05/12)
41% of members suffered cyber crime
In the last 12 months cost of £800m
20% had taken no steps to protect themselves
Crime Survey for England & Wales 2012
National Regional Organised Crime Units (ROCUs)
(NEROCU)
(ODYSSEY)
(ZEPHYR)
(WMROCU)
(SEROCU)
(London ROCU)
(TARIAN)
(TITAN)
(EMSOU)
(ERSOU)
NCA
Regional Organised Crime
Units (ERSOU)
Local Forces (Beds, Herts, Cambs, Norfolk,
Suffolk & Essex)
National/ International
Cross Border
First Responders & Local
Investigations
National Structure
Local Investigation:
n SME
n Insider Threat
n Data deletion / Website Defaced / Malicious Transactions
Regional Investigation:
n Large Corporation
n £14m worth of data extracted over several months
n Multiple offenders across several regions working as a gang
n Numerous attack vectors
Some Examples
n Do you know the value of your data?
n Reputational Damage/IP/Trust…what if these were effected?
n Do you know where you data is stored?
n Who has access to your data?
n Do you have backups?
n Do you really know your employees?
n Do you have suitable business continuity and disaster recovery in place?
n What would you do if you lost all your data tonight?
n Do you know what your responsibilities are if you have a data breach?
Ask yourself…
Innovation Vouchers
https://interact.innovateuk.org/competition-display-page/-/asset_publisher/RqEt2AKmEBhi/content/cyber-security-innovation-vouchers-round-13#
CiSP Cyber Information Sharing Partnership
What is the Cyber-security Information Sharing Partnership (CiSP)? n CiSP is a joint industry and government scheme based in
CERT-UK. CiSP is an online social networking tool and enables its members to exchange information on threats and vulnerabilities as they occur in real time.
What we discussed…
n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime
Investigations? n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute
Questions?
Thank you for coming!
Sergeant Phil Cobley Regional Cyber Protect Coordinator Eastern Region Cyber Crime Unit
ERSOU
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
...........
Autumn Seminars 2015 cranfieldtechnologypark.co.uk [email protected]