score statistical consulting security kristofer laxdal final.pdf · | 20 the leaks keep coming ©...

44
© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com Kristofer Laxdal , Director Info and Cyber Security Prophix Software Inc November 14 th , 2017 Cyber Security

Upload: others

Post on 22-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Kristofer Laxdal , Director Info and Cyber Security – Prophix Software Inc

November 14th, 2017

Cyber Security

Page 2: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 2© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Overview

▪ Introduction

▪ Data – ‘The New Oil’

▪ ‘Oil Spills’ Continue in 2017

▪ What is Cyber Security

▪ Containment Strategies

▪ Top Five Predictions for 2017 -2018

Page 3: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 3© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Introduction

Page 4: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 4

Introduction – About Me

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

▪ Kristofer Laxdal , Director

Information and Cyber Security

Prophix Software Inc.

▪ Prophix is a leading FP&A SaaS

provider - as well as on prem-

http://www.prophix.com/

▪ Previously held Cyber Security

roles within CanDeal, IBM ,

Hewlett Packard, Hbc and many

more .

Page 5: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 5

Data Is The ‘New Oil’

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 6: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 6

Data Is The ‘New Oil’

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 7: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 7

Data Is The ‘New Oil’

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 8: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 8

Data Is ‘The New Oil’

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 9: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 9

Data Is ‘The New Oil’

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

“Data is the new oil. It’s valuable, but if unrefined

it cannot really be used. It has to be changed into

gas, plastic, chemicals, etc. to create a valuable

entity that drives profitable activity; so must data

be broken down, analyzed for it to have value.”Clive Humby, UK Mathematician and architect of Tesco’s Clubcard, 2006

(widely credited as the first to coin the phrase)

“Information is the oil of the 21st century, and

analytics is the combustion engine.”

Peter Sondergaard, SVP Gartner, 2011:

"I believe that data is the new oil. I am saying it in

this country because I believe that the prosperity

that oil brought in the last 50 years, data will

bring in the next 50, 100 years if you use it the

right way,"

May 2017, Ajay Banga, president and CEO of MasterCard –

Speech in Saudi Arabia

Page 10: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 10

The Oil Spill

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Oil is valuable …

However if

mishandled …

Page 11: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 11

The Oil Spill

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Oil is valuable …

However if

mishandled …

It is toxic and

flammable – spills

can be disastrous

Page 12: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 12© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

‘Oil Spills’ Continue in 2017

Page 13: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 13

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

E-Sports Entertainment Association (ESEA)

January 8, 2017:1,503,707 records

InterContinental Hotels Group (IHG)

February 7, 2017: Malware was found on servers which processed

payments made at on-site restaurants and bars stolen data includes

cardholder names, card numbers, expiration dates, and internal

verification codes

River City Media

March 6, 2017: Database of 1.4 billion email accounts, IP addresses,

full names, and some physical addresses.

Saks Fifth Avenue

March 19, 2017: Customer information posted in plain text via a

specific link on the Saks Fifth Avenue website. The information for tens

of thousands of customers was visible on a page. email addresses,

phone numbers, product codes, and IP addresses

Page 14: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 14

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

E-Sports Entertainment Association (ESEA)

January 8, 2017:1,503,707 records

InterContinental Hotels Group (IHG)

February 7, 2017: Malware was found on servers which processed

payments made at on-site restaurants and bars stolen data includes

cardholder names, card numbers, expiration dates, and internal

verification codes

River City Media

March 6, 2017: Database of 1.4 billion email accounts, IP addresses,

full names, and some physical addresses.

Saks Fifth Avenue

March 19, 2017: Customer information posted in plain text via a

specific link on the Saks Fifth Avenue website. The information for tens

of thousands of customers was visible on a page. email addresses,

phone numbers, product codes, and IP addresses

Page 15: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 15

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

E-Sports Entertainment Association (ESEA)

January 8, 2017:1,503,707 records

InterContinental Hotels Group (IHG)

February 7, 2017: Malware was found on servers which processed

payments made at on-site restaurants and bars stolen data includes

cardholder names, card numbers, expiration dates, and internal

verification codes

River City Media

March 6, 2017: Database of 1.4 billion email accounts, IP addresses,

full names, and some physical addresses.

Saks Fifth Avenue

March 19, 2017: Customer information posted in plain text via a

specific link on the Saks Fifth Avenue website. The information for tens

of thousands of customers was visible on a page. email addresses,

phone numbers, product codes, and IP addresses

Page 16: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 16

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

America’s JobLink

March 21, 2017: America’s JobLink, revealed its systems were

breached by a hacker who exploited a misconfiguration in the

application code. Personal information of 4.8 million job seekers,

including full names, birth dates, and Social Security numbers.

Gmail

May 3, 2017: Gmail users were targeted in a sophisticated phishing

scam that was seeking to gain access to accounts through a third-party

app - the link led to Google’s real security page where the person was

prompted to allow a fake Google Docs app to manage his or her email

account. Company says they estimate about 1 million users may have

been affected.

DocuSign

May 17, 2017: Customers and users of the electronic signature

provider DocuSign were targeted recently by malware phishing attacks.

DocuSign-branded messages were sent that prompted recipients to

click and download a document that contained malware.

Page 17: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 17

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

America’s JobLink

March 21, 2017: America’s JobLink, revealed its systems were

breached by a hacker who exploited a misconfiguration in the

application code. Personal information of 4.8 million job seekers,

including full names, birth dates, and Social Security numbers.

Gmail

May 3, 2017: Gmail users were targeted in a sophisticated phishing

scam that was seeking to gain access to accounts through a third-party

app - the link led to Google’s real security page where the person was

prompted to allow a fake Google Docs app to manage his or her email

account. Company says they estimate about 1 million users may have

been affected.

DocuSign

May 17, 2017: Customers and users of the electronic signature

provider DocuSign were targeted recently by malware phishing attacks.

DocuSign-branded messages were sent that prompted recipients to

click and download a document that contained malware.

Page 18: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 18

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

America’s JobLink

March 21, 2017: America’s JobLink, revealed its systems were

breached by a hacker who exploited a misconfiguration in the

application code. Personal information of 4.8 million job seekers,

including full names, birth dates, and Social Security numbers.

Gmail

May 3, 2017: Gmail users were targeted in a sophisticated phishing

scam that was seeking to gain access to accounts through a third-party

app - the link led to Google’s real security page where the person was

prompted to allow a fake Google Docs app to manage his or her email

account. Company says they estimate about 1 million users may have

been affected.

DocuSign

May 17, 2017: Customers and users of the electronic signature

provider DocuSign were targeted recently by malware phishing attacks.

DocuSign-branded messages were sent that prompted recipients to

click and download a document that contained malware.

Page 19: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 19

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Deloitte

September 25, 2017 The reason behind this one is pretty

embarrassing for a company that was once named the “best

cybersecurity consultant in the world” by Gartner. The firm did not

employ two-factor authentication, so when hackers acquired a single

password from an administrator of the firm’s email account, they were

able to access all areas of the email system.

Yahoo! (Update)

October 9, 2017: In December 2016, it was reported that “more than 1

billion user accounts” may have been impacted by the 2013 Yahoo

breach. Recent news, however, shows it was indeed more than 1

billion—much more. Four months after Verizon acquired Yahoo’s core

internet assets, it was revealed that every single customer account was

impacted by that breach; three billion Yahoo accounts—including email,

Tumblr, Fantasy, and Flickr—were stolen. Even after thorough

investigations, it is still unknown who was behind the 2013 Yahoo

breach.

Page 20: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 20

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Deloitte

September 25, 2017 The reason behind this one is pretty

embarrassing for a company that was once named the “best

cybersecurity consultant in the world” by Gartner. The firm did not

employ two-factor authentication, so when hackers acquired a single

password from an administrator of the firm’s email account, they were

able to access all areas of the email system.

Yahoo! (Update)

October 9, 2017: In December 2016, it was reported that “more than 1

billion user accounts” may have been impacted by the 2013 Yahoo

breach. Recent news, however, shows it was indeed more than 1

billion—much more. Four months after Verizon acquired Yahoo’s core

internet assets, it was revealed that every single customer account was

impacted by that breach; three billion Yahoo accounts—including email,

Tumblr, Fantasy, and Flickr—were stolen. Even after thorough

investigations, it is still unknown who was behind the 2013 Yahoo

breach.

Page 21: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 21

The Leaks Keep Coming

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Deloitte

September 25, 2017 The reason behind this one is pretty

embarrassing for a company that was once named the “best

cybersecurity consultant in the world” by Gartner. The firm did not

employ two-factor authentication, so when hackers acquired a single

password from an administrator of the firm’s email account, they were

able to access all areas of the email system.

Yahoo! (Update)

October 9, 2017: In December 2016, it was reported that “more than 1

billion user accounts” may have been impacted by the 2013 Yahoo

breach. Recent news, however, shows it was indeed more than 1

billion—much more. Four months after Verizon acquired Yahoo’s core

internet assets, it was revealed that every single customer account was

impacted by that breach; three billion Yahoo accounts—including email,

Tumblr, Fantasy, and Flickr—were stolen. Even after thorough

investigations, it is still unknown who was behind the 2013 Yahoo

breach.

Page 22: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 22© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

What Is Cyber Security ?

Page 23: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 23

What is Cyber Security ?

▪ Cyber security is the body of

technologies, processes and

practices designed to protect

networks, computers,

programs and data from

attack.

▪ This includes damage or

unauthorized access - as

well as - disruption or

misdirection of the services

they provide

▪ Wow ! That covers a lot of

ground .

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 24: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 24

Cyber Security Domains

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 25: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 25© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

2017 Breach Profile

Page 26: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 26

The Cyber Breach Profile

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Statistics from the Verizon Data Breach Investigation Report 2017

Page 27: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 27

The Cyber Breach Profile

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 28: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 28© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Spill Containment Strategies

Page 29: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 29

Containment Strategies

Implementing a formal information

security governance approach

Establish and maintain a framework

that provides assurance information

security strategies are aligned with

and support the business - a great

starting point –

When selecting one of these

methods, ensure your program

provides the ability to employ a risk-

based approach and enables your

teams to detect incidents

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 30: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 30

Containment Strategies

Stop Data Loss

Most enterprises rely on employee

trust, but that won’t stop data from

leaving the company.

Now, more than ever, it is

extremely important to control

access, monitor vendors and

contractors as well as employees,

and know what your users are

doing with company data.

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 31: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 31

Containment Strategies

Detect Those Insider Threats

Your biggest asset is also your

biggest risk.

While well trained users can be

your security front line, you still

need technology as your last

line of defense.

UEBA allows you to detect

unauthorized behavior and

verify user actions are not

violating security policy.

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 32: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 32

Containment Strategies

Back Up Data, Rinse ,

Repeat

It is crucial for organization

to have a full ,tested and

working back up of all of

data - not only from a basic

security hygiene

prospective, but also to

combat emerging attacks.

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 33: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 33

Containment Strategies

Beware of Social Engineering

The technology and IT security

policies you implement doesn’t

replace the need for common

sense or eliminate human error.

Remember most hacks are

‘credentialed hacks’

Attempts may come from

phone, email (phishing) or

other communications with your

users.

The best defense is to…

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 34: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 34

Containment Strategies

Educate and Train Your Users

Your users will always be your

weakest link when it comes to

information security.

Training should include how to:

recognize a phishing email, create

and maintain strong passwords,

avoid dangerous applications,

ensure valuable information is not

taken out of the company in

addition to other relevant user

security risks is critical

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 35: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 35

Containment Strategies

Patch and Update All Software and

Systems - Min 30 days -

With cyber-criminals constantly

inventing new techniques and looking

for new vulnerabilities, an optimized

cyber security is only optimized for so

long.

Make sure your software and

hardware is up to date with the latest

and greatest within a minimum of 30

days of a patch release - immediately

if critical / zero day

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 36: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 36

Containment Strategies

Create an Incident Response Plan

No matter how well you follow these

best practices, you will still get

breached – it’s not an if – it is a

when

Having a tested response plan laid

out ahead of time will allow you to

close any vulnerabilities, limit the

damage of a breach, and allow you

to remediate nimbly and effectively

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 37: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 37

Containment Strategies

Maintain Your Compliance

Regulations like HIPAA, PCI

DSS and ISO offer standards

for how your business should

conduct and measure its

security posture .

More than a hassle which

you need to prepare audit

logs for, compliance can help

guide your business.

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 38: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 38© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Top Five 2017 -2018 Cyber

Security Predictions

Page 39: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 39

2017-2018 Cyber Security Predictions

Increase in Supply Chain

Attacks Though 2018

In a nutshell, a “supply chain

attack” refers to the

compromise of a particular

asset, e.g. a software

provider’s infrastructure and

commercial software, with the

aim to indirectly damage a

certain target or targets, e.g.

the software provider’s clients.

.

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Used as a stepping stone for

further exploitation, once

foothold is gained to the target

system or systems

Page 40: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 40

2017-2018 Cyber Security Predictions

IoT – Continued serious

attacks

DDoS / Credential Stealing

Gartner estimates that there

are 6.4 billion connected things

worldwide in use this year, a

number expected to reach 20.8

billion by 2020.

That’s a lot of targets. ( most

aren’t or cannot be patched

easily )

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 41: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 41

2017-2018 Cyber Security Predictions

Ransomware

▪ If you thought 2016

was bad for

ransomware then

2017 – 2018 will be

worse.

▪ Expect to see a higher

attack volume, using

more sophisticated

technologies and

continue upward

trajectory in 2017.

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

What you need to consider:▪ When was the last time you tested and

verified the backup?

▪ Have you applied basic file blocking to

prevent threats from entering your

organization?

▪ Certain file types can be a risk to your

organization. Ask yourself, “Should we allow

all files or should we manage the risk by not

allowing malicious files types that may cause

an issue?”

Page 42: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 42

2017-2018 Cyber Security Predictions

Blockchain Technology

Blockchain technology

vulnerabilities will be

discovered by malicious

actors who will exploit

them in an effort to

compromise the security

and confidentiality of

financial transactions in

2017 -2018.

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 43: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

| 43

2017-2018 Cyber Security Predictions

Rise of artificial intelligence and machine

learning-driven security

These frameworks will be leveraged by

Cyber Security teams for implementing

predictive security analytics across public,

private and SaaS cloud infrastructures by

leveraging externally sourced threat data

and using it for self-configuring / self-healing

based on organization-specific needs

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Page 44: SCORE Statistical Consulting Security Kristofer Laxdal Final.pdf · | 20 The Leaks Keep Coming © Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved Deloitte

© Copyright 2009 SCORE Statistical Consulting Inc.™ All Rights Reserved www.scorestat.com

Thank you