joseph ingemi strategic cyber security
DESCRIPTION
ÂTRANSCRIPT
![Page 1: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/1.jpg)
Strategic Cyber-Security
Joseph Ingemi
![Page 2: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/2.jpg)
Agenda
• Introduction
• Trends, Motivations, and Innovations
• Cyber-attacker Geography
• Recommendations
• Case Study
• Conclusion
![Page 3: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/3.jpg)
Introduction
“From this day forward, any nation that continues
to harbor or support terrorism will be regarded
by the United States as a hostile regime.” –
George W. Bush
![Page 4: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/4.jpg)
Introduction
• Expresses a fundamental truth
• Acts of terror require a base of operation
• Similarly, cyber-attacks do so as well
• Each cyber-attack has a country of origin
![Page 5: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/5.jpg)
Introduction
• Cyber Security is Top-Down not Bottom-up
• Managers and Decision-makers drive
cyber-security
• Information Technology Departments
simply support decisions
![Page 6: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/6.jpg)
Introduction
• Cyber-Security is about Risk Management
• Mitigation and controls should address risk
• One size does not fit all
![Page 7: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/7.jpg)
Introduction
What is a cyber-attack?
? ? ?
? ? ? ?
?
![Page 8: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/8.jpg)
Introduction
What is a cyber-attack?
Any effort to steal from, defraud, disrupt or
destroy personal or enterprise-level
operations through networked systems or
maliciously causes a data breach
![Page 9: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/9.jpg)
Trends
Where are we?
Where are we
vulnerable?
Where are we going?
![Page 10: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/10.jpg)
Trends
Security Gaps and
Vulnerabilities
Security Gaps and
Vulnerabilities
Past
Present
Future
![Page 11: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/11.jpg)
Vulnerabilities
Why exploit a vulnerability?
• Attacker Intent
• Type of information or data
(Why do you rob banks, Willie?)
Because that’s where the money is. –Willie Sutton
![Page 12: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/12.jpg)
Motivations
Integrity Violation • Embarrass
• Political Agenda
• Not damaging other than emotional distress
• Demonstrate weakness, bragging rights
• Examples
![Page 13: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/13.jpg)
Motivations
Profit • Piracy
• Theft
• Learn corporate strategies
• Examples
![Page 14: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/14.jpg)
Motivations
Physical Damage • Destroy property
• Induce casualties
• Weaken defense capabilities
• Direct or indirect
• Example
![Page 15: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/15.jpg)
Innovation: Cloud
• IaaS
• PaaS
• Applications
• Public vs Private vs Hybrid
• Where is the data stored?
• Who accesses the data?
• Is whole greater than the parts?
![Page 16: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/16.jpg)
Innovation: Internet of Things
• Mobile Devices
• Controllers
• Sensors
• UAVs
• Information
Technology has a
physical impact
![Page 17: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/17.jpg)
Innovation: 3D Printing
• Disruptive technology
• Revolutionizes supply chains
• Intellectual property more valuable than
physical inventories
![Page 18: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/18.jpg)
Innovation vs Motivation
Integrity
Violation
Profit Physical
Damage
Cloud X X
3D Printing
Internet of
Things
![Page 19: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/19.jpg)
Innovation vs Vulnerability
Integrity
Violation
Profit Physical
Damage
Cloud X X
3D Printing X X ?
Internet of
Things
![Page 20: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/20.jpg)
Innovation vs Vulnerability
Integrity
Violation
Profit Physical
Damage
Cloud X X
3D Printing X X ?
Internet of
Things
X X X
![Page 21: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/21.jpg)
Cyber-Attacker Geography
Russia
• Cyber-command (US Intel)
• Attacks on Baltic
• Georgia War
• Attacks on Ukraine PM, White House
• Attack on Western Energy Companies
• Gangsters Steal 1.2 Billion Passwords
• Industrial Control Systems
![Page 22: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/22.jpg)
Cyber-Attacker Geography
China
• People Liberation Army Unit 61398
– Activities since 2006
– Targets align with strategic priorities
– China has denied these attacks
• Little Panda/ Anthem, US Community Health; Greatfirewall vs Greatfire vs Great Cannon
• ASEAN Monitoring
![Page 23: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/23.jpg)
Cyber-Attacker Geography
Iran
• Strong push to develop cyber-warfare
capabilities
• Attack on Saudi Aramco
• Attack on US financial institutions
• Israeli-Iranian cyber-competition
![Page 24: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/24.jpg)
Cyber-Attacker Geography
North Korea
• Attacks on South Korean commercial,
government and military targets, 2009-
2011
• Sony Attack
• Unit 121, 91, 35, Lab 110
![Page 25: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/25.jpg)
Cyber-Attacker Geography
ISIS
• Fluid:
– Lone-wolf sympathizers abroad
– Westerners joining ISIS
• Focus on social media
• CENTCOM Twitter hacked
![Page 26: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/26.jpg)
Cyber-Attacker Geography
Syria
• Syrian Electronic Army
• Defend Assad; connected to the regime
• DDOS and Malware attacks
• Spam, hack and deface western media
• Hacked AP, sent out fake news report, Dow dropped
• Sands
![Page 27: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/27.jpg)
Cyber-Attacker Geography
Similarities
• High-level of internet surveillance
– Open-Net Initiative, “Enemies of the Internet”
• Corruption
• Lack of Civil Society
• Un-liberal
• Hostility towards/Rivalry with West
• State-sponsored cyber-groups
![Page 28: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/28.jpg)
Cyber-Attacker Geography Internet
surveillance
Corruption Lack of
civil
society
Un-liberal Hostility State-
Sponsorship
China X X X X X X
Russia X X X X X X
Iran X X X X X X
N.
Korea X X X X X X
ISIS ? X X X X X
Syria X X X X X X
![Page 29: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/29.jpg)
Cyber-Attacker Geography
• Cyber-Attacks are a low cost vector of
attack by our nation’s enemies
• Relationship between international
relations and cyber-security threats – Regimes
– Power Blocs
• Cannot separate global markets from
global rivalries – Economic liberalism does not assure good behavior
![Page 30: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/30.jpg)
Recommendations
• Organizational
• State and Local
• Federal Government
![Page 31: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/31.jpg)
Recommendations
Organizational
• Inventory
– Data and Processes
– Hardware and Software
• Access
• Risk Assessment
• Mitigation and Controls
• Monitor
![Page 32: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/32.jpg)
Recommendations
Organizational
Critical Considerations:
• Analysis drives technology and framework
• Everything has a value
• Location, Location, Location
– Be Aware of the one-off, eg, India
![Page 33: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/33.jpg)
Recommendations
State-Local
• Develop public-private partnerships to build
resiliency – Build awareness
– Spread best practices, esp., small businesses
– Economic Development
• Law Enforcement
• Education – Encourage good behavior
– Build next generation of cyber-security experts
![Page 34: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/34.jpg)
Recommendations
Federal • Develop a cyber-security regulatory regime/PPP/best practices
– Systemic vs Individual Risk
– 3 Bills
• Evaluate the international environment and rate nations based on cyber-threat – Advisory list
– Intelligence
– Examine outside trade relationships and alliances among partners
• Maintain and strengthen alliances to assure that our strategic interests are aligned with our allies.
– Egypt
– Great Britain
– India
– Indonesia
– Israel
• Integrate cyber-security with both non-defense and defense relationships – Make cyber-security a consideration in response options
• Depends on the impact on physical world
– Make cyber-security an integrated part of diplomacy and assistance.
– International economic bodies should have a cyber-security component.
![Page 35: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/35.jpg)
Recommendations
• Integrate cyber-security with both non-defense and defense relationships – The Defense Department, Homeland Security and the Justice Department
should conduct regular joint exercises with allies for countering cyber-attacks. • South Korea
• Eastern Europe
– Prosecuting cyber-attackers must be made a law-enforcement priority • Joint Cybercrime Action Task Force
• Interpol
• Prosecution and extradition treaties
– Cyber-security must be a component of immigration policy
• Develop cyber-security Centers of Excellence as inter-disciplinary research and instruction centers.
– USMA CTC
– CDC-like National Department
– Cyber Red Cross
– ISAOs
![Page 36: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/36.jpg)
Case Study
• Trans-Pacific Partnership (TPP)
• Includes: Australia, Brunei, Canada, Chile,
Japan, Malaysia, Mexico, New Zealand, Peru,
Singapore, and Vietnam
• E-commerce in terms of tariffs
• Integrated telecommunications
• Regulatory coherence
• Intellectual Property
![Page 37: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/37.jpg)
Case Study Internet
surveillance
Corruption Lack of civil
society
Un-liberal Hostility State-
Sponsorship
Aus ?
Bru ? x
Can
Chile
Jap
Mal ? ?
Mex x
NZ
Per x
Sing ? ? ?
Viet x x ? x
![Page 38: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/38.jpg)
Case Study
China
Chile Aus
Japan Mal HK
Sing Viet
![Page 39: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/39.jpg)
Case Study
Approach-Government
• Special care to information sharing with
Australia, New Zealand and Japan
• Collective Security-Mutual Defense Agreement
– Aus, NZ, Chile, Japan, Malaysia, Singapore, Vietnam
– Coordinated law enforcement
– Cyber-defense umbrella
• Trilateral talks at G20
![Page 40: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/40.jpg)
Case Study
China-centric FTAA
• US Isolation vs Cyber-Security Exposure
• Fast-Track TPP
• Cyber-security Alliance within FTAA
• Private Sector Vigilance
![Page 41: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/41.jpg)
Case Study
Approach-Private
• Evaluate supply chains and human
resource policies for business partners
– Aus, Chile, Japan, Malaysia, Singapore,
Vietnam
• Evaluate business partners relationships
based on their relationship with China
– Higher risk premiums
![Page 42: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/42.jpg)
Conclusion
“Economic globalization, in its essence, ignores national frontiers. Foreign policy affirms them, even as it seeks to reconcile conflicting national aims or ideals of world order”
–Henry Kissinger
![Page 43: Joseph ingemi strategic cyber security](https://reader033.vdocuments.mx/reader033/viewer/2022042604/579054ba1a28ab900c91dcdc/html5/thumbnails/43.jpg)
References
• Mandiant, APT 1: Exposing of China’s
Cyber Espionage Units (2013)
• Akamai, State of the Internet
• The HIll, Cybersecurity Update
• Politico, Morning Cybersecurity Update
• Sophos, Naked Security
• RealClearDefense
• MS-ISAC