SlideShare a Scribd company logo
1 of 15
Download to read offline
Jamaica:	
  Vic)m	
  or	
  perpetrator	
  
of	
  cyber	
  crime	
  and	
  intrusions?	
  

     INFOSEC	
  Execu)ve	
  Breakfast	
  	
  
      Kingston,	
  Jamaica	
  	
  Ÿ	
  	
  26	
  June	
  2012	
  
Cyber	
  incidents	
  not	
  widely	
  reported	
  
              in	
  the	
  Caribbean	
  
A	
  few	
  possible	
  excep.ons:	
  
•  Tax	
  Administra.on	
  of	
  Jamaica	
  –	
  June	
  2012	
  
•  Hacking	
  of	
  Trinidad	
  &	
  Tobago	
  Parliament	
  
     website	
  –	
  April	
  2012	
  
•  Hacking	
  of	
  Trinidad	
  &	
  Tobago	
  Ministry	
  of	
  
     Finance	
  website	
  –	
  March	
  2012	
  
•  DDoS	
  aHack	
  LIME	
  Barbados	
  network	
  –	
  March	
  
     2012	
  
What	
  do	
  Caribbean	
  network	
  security	
  
experts	
  think	
  about	
  cyber	
  security	
  in	
  
                 the	
  region?	
  
Intrusions	
  are	
  highly	
  prevalent	
  in	
  the	
  
                  Caribbean	
  
•  Success	
  rate	
  of	
  aHempts	
  unknown	
  
•  Top	
  sources	
  for	
  threats	
  –	
  Russia,	
  China,	
  HK	
  
•  Organisa.ons	
  have	
  a	
  narrow	
  view	
  of	
  security	
  
•  Caribbean	
  has	
  not	
  commiHed	
  the	
  necessary	
  
   resources	
  or	
  effort	
  to	
  strengthen	
  frameworks	
  
•  In	
  addi.on	
  to	
  threats	
  in-­‐country,	
  Caribbean	
  
   countries	
  can	
  be	
  used	
  as	
  jump-­‐off	
  points	
  for	
  
   aHacks	
  in	
  other	
  countries	
  
What	
  is	
  the	
  situa)on	
  in	
  Jamaica?	
  
A	
  legal	
  &	
  enforcement	
  framework	
  	
  
             exists	
  for	
  cyber	
  crime	
  
•  Cybercrimes	
  Act	
  2010	
  exists	
  along	
  with	
  a	
  
   Cybercrime	
  Unit	
  (CCU)	
  
•  CCU	
  can	
  only	
  enforce	
  with	
  coopera.on	
  of	
  
   vic.ms	
  and	
  other	
  affected	
  interests	
  
•  Unit	
  has	
  its	
  hand	
  full	
  tackling	
  local	
  crimes	
  plus	
  
   loHo/telemarke.ng	
  scams	
  targeted	
  at	
  the	
  US	
  
•  LoHo	
  scams	
  are	
  affec.ng	
  country’s	
  reputa.on	
  
   –	
  “Beware	
  876”	
  campaign	
  
CCU	
  tackled	
  32	
  cases	
  in	
  2011	
  
So	
  far,	
  Jan—May	
  2012:	
  26	
  cases	
  
CCU	
  data	
  doesn’t	
  tell	
  us	
  much	
  
•  Incidents	
  reported	
  as	
  cyber	
  crimes	
  are	
  done	
  
   according	
  to	
  Cybercrimes	
  Act	
  
•  CCU’s	
  main	
  goal	
  is	
  prosecu.on	
  
•  Focus	
  likely	
  to	
  be	
  incidents	
  origina.ng	
  in	
  
   Jamaica	
  
•  LiHle	
  or	
  possibly	
  no	
  framework	
  for	
  incidents	
  
   affec.ng	
  Jamaicans	
  but	
  origina.ng	
  elsewhere	
  
•  Cases	
  reported	
  to	
  CCU	
  only	
  a	
  drop	
  in	
  the	
  
   bucket	
  	
  
How	
  can	
  
we	
  stem	
  
the	
  )de?	
  
Cyber	
  incidents	
  can	
  be	
  	
  
              debilita)ng	
  and	
  isola)ng	
  
•  Majority	
  of	
  organisa.ons	
  are	
  unaware	
  that	
  
   they	
  have	
  been	
  compromised	
  
•  Incidents	
  cost	
  organisa.ons	
  $MM	
  –	
  .me,	
  
   revenues,	
  produc.vity,	
  remedia.on	
  
•  Many	
  organisa.ons	
  could	
  be	
  having	
  iden.cal	
  
   experiences	
  –	
  unbeknownst	
  to	
  the	
  other	
  
•  Oaen	
  limited	
  insight	
  into	
  scope	
  of	
  incidents	
  -­‐	
  	
  
   frequency,	
  characteris.cs,	
  paHerns,	
  possible	
  
   solu.ons,	
  etc.	
  
Internally,	
  we	
  must	
  be	
  beUer	
  
          prepared	
  and	
  equipped	
  
•  Comprehensively	
  examine	
  systems,	
  networks,	
  
   equipment	
  
•  Strategically	
  establish	
  priori.es	
  &	
  
   con.ngencies	
  
•  Invest	
  in	
  the	
  con.nual	
  maintenance	
  and	
  
   update	
  of	
  defences	
  
•  Exercise	
  even	
  greater	
  vigilance	
  	
  
•  Support	
  staff	
  training	
  and	
  capacity	
  building	
  
We	
  must	
  also	
  be	
  prepared	
  to	
  
        establish	
  trust	
  rela)onships	
  
CERTs/CSIRTs	
  are	
  urgently	
  needed:	
  
•  Provide	
  expert	
  informa.on	
  and	
  support	
  
•  Supplement	
  internal	
  security	
  plans/structures	
  	
  
•  Increase	
  awareness	
  of	
  incidents	
  -­‐	
  frequency,	
  
   characteris.cs,	
  commonali.es,	
  possible	
  
   solu.ons,	
  etc.	
  
•  Ensure	
  that	
  appropriate	
  industry	
  standards	
  
   and	
  prac.ces	
  are	
  established	
  
 
     Thank	
  you!	
  




         Michele	
  Marius	
  
       Blog:	
  	
  ict-­‐pulse.com	
  
FB:	
  facebook.com/ICTPulse	
  
        TwiHer:	
  @ictpulse	
  
Image	
  credits	
  
•      Stethoscope:	
  dreams	
  designs	
  /	
  FreeDigitalPhotos.net,	
  
       hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=1449	
  

•      Binocular	
  image:	
  Ntwowe	
  /	
  FreeDigitalPhotos.net,	
  
       hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=2043	
  	
  

•      Hermosa	
  Wave	
  image:	
  watch4u	
  /	
  flickr,	
  hHp://www.flickr.com/photos/look4u/	
  
	
  

More Related Content

What's hot

Maersk Notpetya Crisis Response Case Study
Maersk Notpetya Crisis Response Case StudyMaersk Notpetya Crisis Response Case Study
Maersk Notpetya Crisis Response Case StudyCharlie Pownall
 
(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)Rui Miguel Feio
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
 
The Challenge of Anti Corruption in the Eastern Europe
The Challenge of  Anti Corruption in the Eastern EuropeThe Challenge of  Anti Corruption in the Eastern Europe
The Challenge of Anti Corruption in the Eastern EuropePECB
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)Rui Miguel Feio
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRCharlie Pownall
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceDale Butler
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
Webroot Antivirus Web Security
Webroot Antivirus Web Security Webroot Antivirus Web Security
Webroot Antivirus Web Security Andrew Close
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 PKF Francis Clark
 
CTPAT and Cybersecurity.
CTPAT and Cybersecurity.  CTPAT and Cybersecurity.
CTPAT and Cybersecurity. Dan Petrosini
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 

What's hot (19)

2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Maersk Notpetya Crisis Response Case Study
Maersk Notpetya Crisis Response Case StudyMaersk Notpetya Crisis Response Case Study
Maersk Notpetya Crisis Response Case Study
 
(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
 
The Challenge of Anti Corruption in the Eastern Europe
The Challenge of  Anti Corruption in the Eastern EuropeThe Challenge of  Anti Corruption in the Eastern Europe
The Challenge of Anti Corruption in the Eastern Europe
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
2004 07 intelligence new rules seminar
2004 07 intelligence new rules seminar2004 07 intelligence new rules seminar
2004 07 intelligence new rules seminar
 
SMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conferenceSMi Group's 4th annual Oil & Gas Cyber Security conference
SMi Group's 4th annual Oil & Gas Cyber Security conference
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
Webroot Antivirus Web Security
Webroot Antivirus Web Security Webroot Antivirus Web Security
Webroot Antivirus Web Security
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017 Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
Bournemouth- Essential 6-monthly Finance Directors' Update - June 2017
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
CTPAT and Cybersecurity.
CTPAT and Cybersecurity.  CTPAT and Cybersecurity.
CTPAT and Cybersecurity.
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 

Viewers also liked

03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)VogelDenise
 
122912 public notification (obama & pay pal attacks) -slovak
122912   public notification (obama & pay pal attacks) -slovak122912   public notification (obama & pay pal attacks) -slovak
122912 public notification (obama & pay pal attacks) -slovakVogelDenise
 
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้านNexus Art'Hit
 
Persian 021912 email tounitedstatescongress
Persian   021912 email tounitedstatescongressPersian   021912 email tounitedstatescongress
Persian 021912 email tounitedstatescongressVogelDenise
 
DANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVELDANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVELVogelDenise
 
01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)VogelDenise
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopmentPaolaReyesR
 
Lecture 2 3 protein chemistry
Lecture 2 3 protein chemistryLecture 2 3 protein chemistry
Lecture 2 3 protein chemistryAbo Ali
 
01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)VogelDenise
 
Research
ResearchResearch
ResearchKIMSOP
 
021013 adecco email (dutch)
021013   adecco email (dutch)021013   adecco email (dutch)
021013 adecco email (dutch)VogelDenise
 
Share This Too launch - social media highlights
Share This Too launch - social media highlightsShare This Too launch - social media highlights
Share This Too launch - social media highlightsPrecise Brand Insight
 

Viewers also liked (20)

03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
03/12/11 PETITION FOR EXTRAORDINARY WRIT (President Barack Obama)
 
122912 public notification (obama & pay pal attacks) -slovak
122912   public notification (obama & pay pal attacks) -slovak122912   public notification (obama & pay pal attacks) -slovak
122912 public notification (obama & pay pal attacks) -slovak
 
Bonpu Zen Spa, Chicago, IL.
Bonpu Zen Spa, Chicago, IL.Bonpu Zen Spa, Chicago, IL.
Bonpu Zen Spa, Chicago, IL.
 
Hromadná korepsondence
Hromadná korepsondenceHromadná korepsondence
Hromadná korepsondence
 
Proj erg sala_controle
Proj erg sala_controleProj erg sala_controle
Proj erg sala_controle
 
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน1.บทวิเคราะห์ประเทศเพื่อนบ้าน
1.บทวิเคราะห์ประเทศเพื่อนบ้าน
 
Persian 021912 email tounitedstatescongress
Persian   021912 email tounitedstatescongressPersian   021912 email tounitedstatescongress
Persian 021912 email tounitedstatescongress
 
DANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVELDANNY CHEN - Required To CRAWL on GRAVEL
DANNY CHEN - Required To CRAWL on GRAVEL
 
01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)01/28/13 US Supreme Court Response (hindi)
01/28/13 US Supreme Court Response (hindi)
 
Bonpu Restaurant Chicago, IL.
Bonpu Restaurant Chicago, IL.Bonpu Restaurant Chicago, IL.
Bonpu Restaurant Chicago, IL.
 
Pp growthanddevelopment
Pp growthanddevelopmentPp growthanddevelopment
Pp growthanddevelopment
 
Lecture 2 3 protein chemistry
Lecture 2 3 protein chemistryLecture 2 3 protein chemistry
Lecture 2 3 protein chemistry
 
Malay 040412
Malay 040412Malay 040412
Malay 040412
 
CIPR PRide Awards East Anglia
CIPR PRide Awards East AngliaCIPR PRide Awards East Anglia
CIPR PRide Awards East Anglia
 
Cardapio 1a15
Cardapio 1a15Cardapio 1a15
Cardapio 1a15
 
Madd 2007
Madd 2007Madd 2007
Madd 2007
 
01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)01/28/13 US Supreme Court Response (esperanto)
01/28/13 US Supreme Court Response (esperanto)
 
Research
ResearchResearch
Research
 
021013 adecco email (dutch)
021013   adecco email (dutch)021013   adecco email (dutch)
021013 adecco email (dutch)
 
Share This Too launch - social media highlights
Share This Too launch - social media highlightsShare This Too launch - social media highlights
Share This Too launch - social media highlights
 

Similar to Jamaica: victim or perpetrator of cyber crime and intrusions (final)

David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxKENNEDY GITHAIGA
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022PECB
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Chinatu Uzuegbu
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UKNapier University
 

Similar to Jamaica: victim or perpetrator of cyber crime and intrusions (final) (20)

David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Jamaica: victim or perpetrator of cyber crime and intrusions (final)

  • 1. Jamaica:  Vic)m  or  perpetrator   of  cyber  crime  and  intrusions?   INFOSEC  Execu)ve  Breakfast     Kingston,  Jamaica    Ÿ    26  June  2012  
  • 2. Cyber  incidents  not  widely  reported   in  the  Caribbean   A  few  possible  excep.ons:   •  Tax  Administra.on  of  Jamaica  –  June  2012   •  Hacking  of  Trinidad  &  Tobago  Parliament   website  –  April  2012   •  Hacking  of  Trinidad  &  Tobago  Ministry  of   Finance  website  –  March  2012   •  DDoS  aHack  LIME  Barbados  network  –  March   2012  
  • 3. What  do  Caribbean  network  security   experts  think  about  cyber  security  in   the  region?  
  • 4. Intrusions  are  highly  prevalent  in  the   Caribbean   •  Success  rate  of  aHempts  unknown   •  Top  sources  for  threats  –  Russia,  China,  HK   •  Organisa.ons  have  a  narrow  view  of  security   •  Caribbean  has  not  commiHed  the  necessary   resources  or  effort  to  strengthen  frameworks   •  In  addi.on  to  threats  in-­‐country,  Caribbean   countries  can  be  used  as  jump-­‐off  points  for   aHacks  in  other  countries  
  • 5. What  is  the  situa)on  in  Jamaica?  
  • 6. A  legal  &  enforcement  framework     exists  for  cyber  crime   •  Cybercrimes  Act  2010  exists  along  with  a   Cybercrime  Unit  (CCU)   •  CCU  can  only  enforce  with  coopera.on  of   vic.ms  and  other  affected  interests   •  Unit  has  its  hand  full  tackling  local  crimes  plus   loHo/telemarke.ng  scams  targeted  at  the  US   •  LoHo  scams  are  affec.ng  country’s  reputa.on   –  “Beware  876”  campaign  
  • 7. CCU  tackled  32  cases  in  2011  
  • 8. So  far,  Jan—May  2012:  26  cases  
  • 9. CCU  data  doesn’t  tell  us  much   •  Incidents  reported  as  cyber  crimes  are  done   according  to  Cybercrimes  Act   •  CCU’s  main  goal  is  prosecu.on   •  Focus  likely  to  be  incidents  origina.ng  in   Jamaica   •  LiHle  or  possibly  no  framework  for  incidents   affec.ng  Jamaicans  but  origina.ng  elsewhere   •  Cases  reported  to  CCU  only  a  drop  in  the   bucket    
  • 10. How  can   we  stem   the  )de?  
  • 11. Cyber  incidents  can  be     debilita)ng  and  isola)ng   •  Majority  of  organisa.ons  are  unaware  that   they  have  been  compromised   •  Incidents  cost  organisa.ons  $MM  –  .me,   revenues,  produc.vity,  remedia.on   •  Many  organisa.ons  could  be  having  iden.cal   experiences  –  unbeknownst  to  the  other   •  Oaen  limited  insight  into  scope  of  incidents  -­‐     frequency,  characteris.cs,  paHerns,  possible   solu.ons,  etc.  
  • 12. Internally,  we  must  be  beUer   prepared  and  equipped   •  Comprehensively  examine  systems,  networks,   equipment   •  Strategically  establish  priori.es  &   con.ngencies   •  Invest  in  the  con.nual  maintenance  and   update  of  defences   •  Exercise  even  greater  vigilance     •  Support  staff  training  and  capacity  building  
  • 13. We  must  also  be  prepared  to   establish  trust  rela)onships   CERTs/CSIRTs  are  urgently  needed:   •  Provide  expert  informa.on  and  support   •  Supplement  internal  security  plans/structures     •  Increase  awareness  of  incidents  -­‐  frequency,   characteris.cs,  commonali.es,  possible   solu.ons,  etc.   •  Ensure  that  appropriate  industry  standards   and  prac.ces  are  established  
  • 14.   Thank  you!   Michele  Marius   Blog:    ict-­‐pulse.com   FB:  facebook.com/ICTPulse   TwiHer:  @ictpulse  
  • 15. Image  credits   •  Stethoscope:  dreams  designs  /  FreeDigitalPhotos.net,   hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=1449   •  Binocular  image:  Ntwowe  /  FreeDigitalPhotos.net,   hHp://www.freedigitalphotos.net/images/view_photog.php?photogid=2043     •  Hermosa  Wave  image:  watch4u  /  flickr,  hHp://www.flickr.com/photos/look4u/