cyber threat matrix version 2.4. james n. smith, mba, cissp lead cyber security strategist, blue...

12
Cyber Threat Matrix Version 2.4

Upload: doreen-curtis

Post on 17-Dec-2015

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

Cyber Threat MatrixVersion 2.4

Page 2: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

• James N. Smith, MBA, CISSP• Lead Cyber Security Strategist,

Blue Reef Group• Instructor of Information Systems,

Georgia Southern University• 14 years experience in information

technology and security management

Page 3: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

Combat

Infrastructure

Espionage

Financial

Political

Propaganda

Nuisance

Complexity

Intensity

Lone Organized Green Wikileaks / Non-state Developing DevelopedHacker Crime Revolution Anonymous Actors Nations Nations

Page 4: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

Cardersmarket DowCares

SIPRNet

AlQueadaInspire

VOA

Iraq/AFDrone hack

AntiglobalizationDefacement

BBM FlashMob

Bradley Manning

Combat

Infrastructure

Espionage

Financial

Political

Propaganda

Nuisance

Complexity

Intensity

Lone Organized Green Wikileaks / Non-state Developing DevelopedHacker Crime Revolution Anonymous Actors Nations Nations

Page 5: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

• Crime• War• Activism / Command & Control /

Propaganda

Page 6: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

CRIME

• Three catalysts• Lack of law or order• Financially & technologically

connected• Bright, educated & dissatisfied labor• Present: Russia• Future: Egypt maybe, Africa,

definately

Page 7: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

Current Internet “backbone”

Page 8: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

Under Construction

Page 9: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia
Page 10: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

War, C4I

• 1st world great powers (US, GER, JAP)• Rising powers (China, India)• Middleweight class (Isreal)

Page 11: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

Activism, C4I, Propaganda

• Mexico / cartel war• Stateless actors (Al Qaeda, Wikileaks,

Anonymous)• Non-state actors: causes, organization,

revolutionaries, terrorists (amnesty international, civil rights movement, green revolution, ISIS)

• Anyone needing asymmetric force multiplication

Page 12: Cyber Threat Matrix Version 2.4. James N. Smith, MBA, CISSP Lead Cyber Security Strategist, Blue Reef Group Instructor of Information Systems, Georgia

www.bluereefgroup.com

105 River Hills Lane, Macon, GA 31211 USA

+1.478.227.8043

Cyber Security Strategies for the Global Business Environment