SlideShare une entreprise Scribd logo
1  sur  28
The Cyber Crime Threat Landscape
A Focus on The Financial Industry
Presented by Morris Cody and William
McBorrough, Principals, MCGlobalTech
Presenters Profile
• Morris Cody, Managing Principal, MCGlobalTech
• 25+ yrs - IT Infrastructure Management
• 6+ yrs – Cyber Security Management
• Industries: Financial, Manufacturing, Consulting, Private, Public
• William J. McBorrough, Managing Principal, MCGlobalTech
• 15+ yrs – Cyber Security Management, Architecture, Engineering,
Operations, Awareness Training
• 6+ yrs – Adjunct Professor, Cyber Security – Undergraduate, Graduate
• Industries: Financial, Manufacturing, Healthcare, Higher Ed., Government
MCGlobalTech
• Provides strategic IT / Security advisory services;
• Align technology and security solutions to drive and support business goals;
• Assess IT security posture;
• Experienced in the private and public sector;
• Promotes IS education and awareness;
• Focused on four primary consulting services;
• Enterprise Information Security Management
• IT Infrastructure Management
• IT Governance & Compliance
• Cloud Computing Migration
Protect Your Assets, Protect Your Brand
Know Your Threat Landscape
Hacking - Primary Cause of Data Breach
Symantec Corporation: Internet Security Threat Report 2014 :: Volume 19
MEDIA FRENZY - HEADLINES
• ATM thieves conduct massive cyber attacks;
– $45 million from automated teller machines (Washington Post);
• More banks hit by cyberattacks than Initially
thought;
– JPMorgan Chase, Bank of America, Citibank, PNC Financial,
Union Bank, BB&T and Capital One (American Banker);
• Major banks hit with biggest cyberattacks in history
– These denial of service attacks were the largest recorded by a
wide margin (CNN Money).
Reports - Symantec / Telegraph
• There was a 42 percent increase in cyberattacks
against U.S. businesses in 2012;
• These attacks are becoming more powerful and more
sophisticated with each passing year;
• Major financial institutions are continually under assault
and the total number of attacks are increasing;
• This has caused a negative impact on company brand,
public trust, customer retention, bottom line profits
Threat Landscape Actors
PwC, CIO, CSO Magazine - Key findings from The Global State of Information Security Survey 2014
How was your organization
impacted by the security incidents?
PwC Magazine - Key findings from The Global State of Information Security Survey 2014
Frequency of Incidents Per Industry
Verizon 2014 Data Breach Investigations Report
Web App Attacks Motivation Factors
Verizon 2014 Data Breach Investigations Report
Payment Card Skimmers
Verizon 2014 Data Breach Investigations Report
DoS Attacks Increase in Effectiveness
Verizon 2014 Data Breach Investigations Report
Poll Questions
• Do you have a good understanding about the threat
landscape facing your organization?
– Yes
– No
– Unsure
• What best describes the level of knowledge among non-IT
executive about your company’s cyber security defenses?
– Good
– Some
– Poor
– None
Are you the next Target?
2013 has been dubbed
the year of the “mega-
breach”!
Don’t become a 2014
statistic.
Target CFO to Congress
“The unfortunate reality is that we suffered a
breach, and all businesses — and their
customers — are facing increasingly
sophisticated threats from cybercriminals,”
-John Mulligan, Target CFO
Case Study – The Target Breach
• Initially reported 40,
then 70, then 110
million customers’
data compromised.
• 40 million =
population of NY +
LA + other 25 largest
US cities.
Anatomy of the Target Breach
Typical Data Breach Example
Now do you all come in?
What Finance managers must know about
their role in thwarting cyber attacks?
There are four general steps to become
more ready to face and deal with the threats
we’ve discussed thus far:
Step 1 – Know the threat
1. Know the threat
Step 2 – Know the business
1. Know the threat
2. Understand your
Business
.
Step 3 – Know your weaknesses
1. Know the threat
2. Understand your
business
3. Identify your
weaknesses
.
Step 4 – Be proactive
•
1. Know the threat
• 2. Understand your
business
• 3. Identify your
weaknesses
• 4. Be Proactive
.
Poll Questions
• In the past 12 months, have you participated in role-
based security awareness training that focuses on your
specific duties ?
– Yes
– No
• How confident are you that your organization’s security
staff understands your business and finance operations?
– Very Confident
– Somewhat Confident
– Not Confident at all
Summary Points
Considerations
• Financial services companies
are funding information
security initiatives
• Can’t fight todays cyber crimes
with yesterday’s technology
• Threat landscape is become
more sophisticated
• Cyber attacks are growing
exponentially
Call To Action
• Create threat awareness
• Know your threat landscape
• Understand your business
security needs
• Identify your security
weaknesses
• Proactive Actions
• Create / Implement a good
cyber security program
Questions?
MCGlobalTech Contact Information
Mission Critical Global Technology Group
1776 I Street, NW
9th Floor
Washington, District of Columbia 20006
Phone: 571-249-3932
Website: www.mcglobaltech.com
Email: Info@mcglobaltech.com
William McBorrough Morris Cody
Managing Principal Managing Principal
wjm4@mcglobaltech.com mcody@mcglobaltech.com

Contenu connexe

Tendances

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Tendances (20)

Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cyber security
Cyber securityCyber security
Cyber security
 

En vedette

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

En vedette (20)

Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Ht seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscapeHt seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscape
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
 
Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
Cybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to KnowCybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to Know
 
Security Threat Mapping
Security Threat MappingSecurity Threat Mapping
Security Threat Mapping
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
Security Digital Connect
Security Digital ConnectSecurity Digital Connect
Security Digital Connect
 
Sarwono sutikno nisd2013 - transforming cybersecurity
Sarwono sutikno   nisd2013 - transforming cybersecuritySarwono sutikno   nisd2013 - transforming cybersecurity
Sarwono sutikno nisd2013 - transforming cybersecurity
 
Uud amandemen
Uud amandemenUud amandemen
Uud amandemen
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data Breaches
 
Being the best cybersecurity strategy - Failing Forward
Being the best cybersecurity strategy - Failing ForwardBeing the best cybersecurity strategy - Failing Forward
Being the best cybersecurity strategy - Failing Forward
 
Today's Security Threat Landscape
Today's Security Threat LandscapeToday's Security Threat Landscape
Today's Security Threat Landscape
 
Grc t17
Grc t17Grc t17
Grc t17
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor Types
 

Similaire à Cyber Crime Threat Landscape - A Focus on the Financial Industry

A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
Daren Dunkel
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
FERMA
 

Similaire à Cyber Crime Threat Landscape - A Focus on the Financial Industry (20)

Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise Digital trust and cyber challenge now extends beyond the Enterprise
Digital trust and cyber challenge now extends beyond the Enterprise
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 

Plus de William McBorrough

MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
William McBorrough
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
William McBorrough
 

Plus de William McBorrough (20)

MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
 
MCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance ProgramMCGlobalTech Managed Security Compliance Program
MCGlobalTech Managed Security Compliance Program
 
MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement MCGlobalTech Cyber Capability Statement
MCGlobalTech Cyber Capability Statement
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
Improving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity FrameworkImproving Cyber Readiness with the NIST Cybersecurity Framework
Improving Cyber Readiness with the NIST Cybersecurity Framework
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
 
MCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_FinalMCGlobalTech Cyber Capability Statement_Final
MCGlobalTech Cyber Capability Statement_Final
 
MCG_OnePageBrochure_Final
MCG_OnePageBrochure_FinalMCG_OnePageBrochure_Final
MCG_OnePageBrochure_Final
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
MCGlobalTech Capability Statement
MCGlobalTech Capability StatementMCGlobalTech Capability Statement
MCGlobalTech Capability Statement
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential Information
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
FCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data SnoopingFCC Report on Google Street View Wi-Fi Data Snooping
FCC Report on Google Street View Wi-Fi Data Snooping
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Cyber Crime Threat Landscape - A Focus on the Financial Industry

  • 1. The Cyber Crime Threat Landscape A Focus on The Financial Industry Presented by Morris Cody and William McBorrough, Principals, MCGlobalTech
  • 2. Presenters Profile • Morris Cody, Managing Principal, MCGlobalTech • 25+ yrs - IT Infrastructure Management • 6+ yrs – Cyber Security Management • Industries: Financial, Manufacturing, Consulting, Private, Public • William J. McBorrough, Managing Principal, MCGlobalTech • 15+ yrs – Cyber Security Management, Architecture, Engineering, Operations, Awareness Training • 6+ yrs – Adjunct Professor, Cyber Security – Undergraduate, Graduate • Industries: Financial, Manufacturing, Healthcare, Higher Ed., Government
  • 3. MCGlobalTech • Provides strategic IT / Security advisory services; • Align technology and security solutions to drive and support business goals; • Assess IT security posture; • Experienced in the private and public sector; • Promotes IS education and awareness; • Focused on four primary consulting services; • Enterprise Information Security Management • IT Infrastructure Management • IT Governance & Compliance • Cloud Computing Migration
  • 4. Protect Your Assets, Protect Your Brand Know Your Threat Landscape
  • 5. Hacking - Primary Cause of Data Breach Symantec Corporation: Internet Security Threat Report 2014 :: Volume 19
  • 6. MEDIA FRENZY - HEADLINES • ATM thieves conduct massive cyber attacks; – $45 million from automated teller machines (Washington Post); • More banks hit by cyberattacks than Initially thought; – JPMorgan Chase, Bank of America, Citibank, PNC Financial, Union Bank, BB&T and Capital One (American Banker); • Major banks hit with biggest cyberattacks in history – These denial of service attacks were the largest recorded by a wide margin (CNN Money).
  • 7. Reports - Symantec / Telegraph • There was a 42 percent increase in cyberattacks against U.S. businesses in 2012; • These attacks are becoming more powerful and more sophisticated with each passing year; • Major financial institutions are continually under assault and the total number of attacks are increasing; • This has caused a negative impact on company brand, public trust, customer retention, bottom line profits
  • 8. Threat Landscape Actors PwC, CIO, CSO Magazine - Key findings from The Global State of Information Security Survey 2014
  • 9. How was your organization impacted by the security incidents? PwC Magazine - Key findings from The Global State of Information Security Survey 2014
  • 10. Frequency of Incidents Per Industry Verizon 2014 Data Breach Investigations Report
  • 11. Web App Attacks Motivation Factors Verizon 2014 Data Breach Investigations Report
  • 12. Payment Card Skimmers Verizon 2014 Data Breach Investigations Report
  • 13. DoS Attacks Increase in Effectiveness Verizon 2014 Data Breach Investigations Report
  • 14. Poll Questions • Do you have a good understanding about the threat landscape facing your organization? – Yes – No – Unsure • What best describes the level of knowledge among non-IT executive about your company’s cyber security defenses? – Good – Some – Poor – None
  • 15. Are you the next Target? 2013 has been dubbed the year of the “mega- breach”! Don’t become a 2014 statistic.
  • 16. Target CFO to Congress “The unfortunate reality is that we suffered a breach, and all businesses — and their customers — are facing increasingly sophisticated threats from cybercriminals,” -John Mulligan, Target CFO
  • 17. Case Study – The Target Breach • Initially reported 40, then 70, then 110 million customers’ data compromised. • 40 million = population of NY + LA + other 25 largest US cities.
  • 18. Anatomy of the Target Breach
  • 20. Now do you all come in? What Finance managers must know about their role in thwarting cyber attacks? There are four general steps to become more ready to face and deal with the threats we’ve discussed thus far:
  • 21. Step 1 – Know the threat 1. Know the threat
  • 22. Step 2 – Know the business 1. Know the threat 2. Understand your Business .
  • 23. Step 3 – Know your weaknesses 1. Know the threat 2. Understand your business 3. Identify your weaknesses .
  • 24. Step 4 – Be proactive • 1. Know the threat • 2. Understand your business • 3. Identify your weaknesses • 4. Be Proactive .
  • 25. Poll Questions • In the past 12 months, have you participated in role- based security awareness training that focuses on your specific duties ? – Yes – No • How confident are you that your organization’s security staff understands your business and finance operations? – Very Confident – Somewhat Confident – Not Confident at all
  • 26. Summary Points Considerations • Financial services companies are funding information security initiatives • Can’t fight todays cyber crimes with yesterday’s technology • Threat landscape is become more sophisticated • Cyber attacks are growing exponentially Call To Action • Create threat awareness • Know your threat landscape • Understand your business security needs • Identify your security weaknesses • Proactive Actions • Create / Implement a good cyber security program
  • 28. MCGlobalTech Contact Information Mission Critical Global Technology Group 1776 I Street, NW 9th Floor Washington, District of Columbia 20006 Phone: 571-249-3932 Website: www.mcglobaltech.com Email: Info@mcglobaltech.com William McBorrough Morris Cody Managing Principal Managing Principal wjm4@mcglobaltech.com mcody@mcglobaltech.com

Notes de l'éditeur

  1. .