managing cyber threats: a cyber security conversation with the experts

Download Managing Cyber Threats: A Cyber Security Conversation with the Experts

Post on 09-May-2015




2 download

Embed Size (px)


Managing Cyber Threats: A Cyber Security Conversation with the Experts Cyber security has become as important as locking your front door. We must protect and secure information. As our reliance on technology increases, the need to build innovative approaches to cyber security efforts becomes critical. The opportunities in this field are great. Cyber Security is a National Priority. Join our panel of experts as we talk about managing cyber threats and ways to gain access to cyber security opportunities. Learning Outcomes: Increase Cyber Security knowledge, technical skills, and awareness of trends At the end of this seminar, participants will be able to: a) Identify required skills and areas in cyber security careers b) Explore opportunities and challenges in Cyber security c) Examine critical success factors d) Connect with other successful cyber security professionals e) Explore trends and best practices for 2013 in Cyberspace


  • 1.MANAGING CYBER THREATS A Cyber Security Conversation with the Experts Renata Spinks Reginald Gillins Jane Odero Simon Thomas

2. Overview Lets Talk about Cyber Overview of What is CyberSpace vs. Cyber Security Framework of Cyber Threats The types, styles, and existence of Cyber Threats Challenges of Managing Cyber Threats Global Awareness and Collaboration: Public & Private Conversation with the Experts Cyber Security Real-world Experiences 2014 Cyber Security Focal Points Key points to consider when dealing with Cyber Security Question and Answers2 3. Lets Talk About Cyber Cyberspace vs. Cyber Security -Cyberspace -- the online world of computer networks and the Internet -Cyber security -- measures taken to protect a computeror system against unauthorized access or attack3 4. Lets Talk About Cyber Cyber Security is similar to Home Security4 5. Framework of Cyber Threats Types of Threats Bot-network operators Hackers that take over multiple systems in order to coordinate attacks and distribute malicious code Criminal Groups Seek to attack systems for monetary gain Foreign intelligence services Use cyber tools as part of their information-gathering and espionage Hackers Break into networks for the thrill of the challenge or for bragging rights in the hacker community Insiders Disgruntled or unaware user of the system; uses unrestricted access to cause damage or to steal system data. (Primary source of computer crime)5 6. Framework of Cyber Threats (cont.) Types of Threats Phishers Individuals, or small groups, who execute phishing schemes in an attempt to steal identities or information for monetary gain (use bait to catch unaware users) Spammers Individuals or organizations who distribute unsolicited e-mail with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware/malware, or attack organizations (i.e., denial of service). Spyware/malware authors Individuals or organizations with malicious intent carry out attacks against users by producing and distributing spyware and malware. Terrorists Terrorists seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, cause mass casualties, weaken the U.S. economy, and damage public morale and confidence. Types of Threats Source: Government Accountability Office (GAO), Department of Homeland Security's (DHS's) Role in Critical Infrastructure Protection (CIP) Cybersecurity, GAO-05-434 (Washington, D.C.: May, 2005).6 7. Framework of Cyber Threats (cont.) Why do Cyber Threats Exist? National Governments Goal is to weaken, disrupt or destroy the U.S. Terrorists Goal is to spread terror throughout the U.S. civilian population Industrial Spies and Organized Crime Groups Goals are profit based to conduct industrial espionage and large-scale monetary theft Hacktivists Goals are to support their political agenda, propaganda and causing damage to achieve notoriety for their cause Hackers Goals are associated with notoriety, profit, and cause disruption7 8. Challenges in Managing Cyber Threats Global Awareness Directives, Executive Orders, Working Groups8 9. Conversing with the Experts Serving in the Cyber Security Field Areas of Focus for a Career in Cyber DHS Initiatives Investigations Resources Education Blogs9 10. 2014 Cyber Security Focal Points Critical Success Factors THINK Cyber BEYA 2013 THINK about whats happening in Cyberspace Military Reliance on Technology and Innovation Engineers and others who produce innovative technology Young Men and Women to take an Interest10 11. Questions WHO?HOW? WHERE?11

View more