SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
War Against Terrorism:
The Role of Today’s CIO
Ayo Rotibi
Managing Director
Forts & Shields Ltd
(US, Kenya, Nigeria)
“The Internet is a prime example
of how terrorists can behave in a
truly transnational way; in
response, States need to think and
function in an equally
transnational manner.”
Ban ki-moon
The Art of War
The Art of War is simple
enough. Find out where
your enemy is. Get at
him as soon as you can.
Strike him as hard as
you can and as often as
you can, and keep
moving on.(Ulysses S. Grant)
18th US President. Led
the Union to victory over
the Confederacy in the
American Civil War
www.terror.net – The Modern Terrorists
Internet-aided terrorism is a dynamic
phenomenon and transnational
Terrorist websites target three different
audiences: current and potential supporters;
international public opinion; and enemy publics
Ways contemporary terrorists use the Internet:
•From conducting psychological warfare to
gathering information, from training to
fundraising, from propagandizing to recruiting,
and from networking to planning and coordinating
terrorist acts.
www.terror.net – The Modern Terrorists
Workplace has been the primary target of terrorism
•WTC Building, Garisa University, Westgate Mall
Many workplaces upon which citizens rely to reach
work are relatively unprotected
•St Pancreas Underground
"We use Facebook to schedule the protests, Twitter
to co-ordinate and YouTube to tell the world.“ An
Egyptian Arab Spring Activist
www.terror.net – The Modern Terrorists
Dateline: September 2013
•Al Qaeda opens first official Twitter account
•@shomokhalislam, issued 29 tweets, followed
one account, and attracted 1,532 followers in 24
hours (including several high-profile digital
jihadists)
@shomokhalislam
www.terror.net – The Modern Terrorists
Breaking News...
Amazon Halts sales of ISIS propaganda Magazine
Darknet – The New Terror Frontier
Adopted platform for direct communication among
global jihadi activists
• Over 50,000 sites and 300 forums for terrorist
organizations
• Used to distribute material for recruitment, training, and
coordination of terrorist
• Informed the travel warning and closure of some US
embassies in August 2013
Darknet – The New Terror Frontier
A Course in the Art of Recruiting
• https://ia800300.us.archive.org/32/items/ACourseInTheArtOfRecruiting-
RevisedJuly2010/A_Course_in_the_Art_of_Recruiting_-_Revised_July2010.pdf
ISIS and the Lonely Young American
• http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html
Kenya’s Global Terrorism Index (GTI)
Year Incidents Fatalities Injuries Properties GTI Rank (out
of 162)
2009 1 0 0 0 4.47 27
2010 12 19 159 4 4.81 24
2011 38 37 98 7 5.15 19
2012 73 98 410 34 6.06 14
2013 74 201 442 22 6.58 12
http://www.visionofhumanity.org/#page/indexes/terrorism-index/2013/KEN/FATA
Cyber-threat Barometer: Any Ideas?
Leading Cyber Attack Method
•Social Engineering
Leading Threat
•Insider (with Authorized Access)
Leading Vulnerability
•People
Kenya’s Cyber Goals
Enhance the nation’s cybersecurity posture in a manner
that facilitates the country’s growth, safety, and
prosperity.
Build national capability by raising cybersecurity
awareness and developing Kenya’s workforce to
address cybersecurity needs.
Foster information sharing and collaboration among
relevant stakeholders to facilitate an information
sharing environment focused on achieving the
Strategy’s goals and objectives.
Insider threat
Have legitimate access to systems
Often familiar with the
organization's data
Abuse privileges to harm the
organization
Circumvent security controls of
which they are aware
Have physical proximity to data
Harder to defend against than
attacks from outsiders
The 58% Theory-The Insider Family
The Rogue Employee
•AKA: Shadow IT, Rogue
IT
•Description: They have
many aliases, but one
definite goal – to take
valuable data and
leverage it into
monetary gain, revenge
or even some
revolutionary crusade
The 58% Theory-The Insider Family
Fired / Disgruntled
Worker
•AKA: Pinch a Penny
from a 1 million
Transactions
•Description: Think
Office Space – where
workers on their way
out devise a way to rip
off the company
The 58% Theory-The Insider Family
3rd Party and Outside Insider
•AKA: The Ulterior
Motivator
•Description: Your
temporary contractor or
third-party vendor is
around so much that your
office is almost his second
home. He may fraternize
with employees and gain
the trust of your crew – but
who is really watching over
The 58% Theory-The Insider Family
Inadvertent Users
•AKA: Not the Brightest
Crayon in the Box
•Description: Believe it not,
inadvertent insider threats
make up a good portion of
data breaches– thanks to
the consumerization of
IT, the mobility of data and
the smartphone trend, it is
easier for company data to
move beyond traditional
firewalls
The 58% Theory-The Insider Family
Personalization Guru
•AKA: The Guy Who Brings
Home to Work
•Description: This guy is a
disaster waiting to happen.
They are the ones who
want their workstation to
be a basic clone of their
personal laptop. They want
to have all the applications,
tools and software –to
bypass admin rights
The 58% Theory-The Insider Family
The Night Janitor
•AKA: The Unsuspecting Pirate
•Description: The support staff
is in your office at strange
hours with no supervision
really at all. Don't let the false
characterizations and
stereotypes fool you –
criminals and social engineers
would not lose a sweat
getting employed as a janitor
just to have your server room
to themselves.
Exposure in the Workplace
Types of Sensitive Corporate Information Employees Access
(http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
Exposure in the Workplace
Types of Personal Tasks Employees Do in the Workplace
(http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
Exposure in the Workplace
Content Accessed on Mobile Devices As Permitted By Enterprise
(http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
Food For Thought
What Will You Do
If You Knew You
Were Under
Surveillance?
4 Cyber-Breach Questions
What:
•Happened? Was Stolen? Was Compromised?
How:
•Did They Do It? To Prevent Reoccurrence?
Who:
•Did It? Is Affected?
When:
•Did They Do It? Can Recovery Begin?
CIOs must leverage this singular advantage and
take a stand on the new encryption regime
introduced by FB, Google and Apple
Nothing is Hidden Under the Hood
Every online activity leaves a Digital Footprint
The Role of The CIO
Due Care: Conduct a reasonable person would
exercise in a particular situation
•Security is Good Business
•Security is Everybody’s Business
Due Diligence: Gathers facts to make an informed
decision
•Additional Internal Control procedure – Network Forensics
Threat awareness, assessment, and perception
Efficient information flow within corporations,
between corporations, and between corporations
and local and federal government agencies
National Domestic Communication Assistance Center
Core functions:
• Law Enforcement
Coordination
• Industry Relations
• Technology Sharing
• CALEA Implementation
Government's first ever
attempt to develop a centre
for electronic surveillance
knowledge management, and
facilitate the sharing of
technical solutions and know-
how among law enforcement
agencies
What if...
...we all work together for a common
purpose?
...we aspire to build a Regional NDCAC to
foster stronger collaboration and
complement Kenya CIRT/CERT?
...we foster stronger collective
relationship with LEA and Government
...we leave this conference with a
resolution to make SOMETING happen?
...we...?
Proposed Initiatives
Initiate targeted knowledge dissemination
programs
Provide real time knowledge dissemination to
corporate members
Develop lessons learned from corporate incidences
Modify existing Users and Internet Usage Policies to
include Internal Surveillance
Establish a Regional NDCAC
A Little Story
Breaking News
Eiffel Tower for Sale!
Moral Lesson:
Share Information
Conclusion
CIOs have been dragged into the War Against Terrorism
The Enterprise landscape has changed forever – FACT
The Internet offers us opportunity to prevent, detect
and deter acts of terrorism
CIOs have a responsibility to secure their enterprise
CIOs need to know about human psychology and
behavioural attitude
Real-time Digital Forensics will become a major tool in
identifying these threat agents
CIO must determine that their enterprise network does
not become a recruitment ground or a conduit for fund-
raising and propaganda
For Further Information and Demo:
•Email: arotibi@isecureconsulting.com
•Phone: +254-786-834-158, +254-772-299-802
•Skype: arotibi
•Forts & Shields, 63 Mandera Rd, Kileleshwa, Nairobi, Kenya
•www.fortsandshields.com
•www.isecureconsulting.com
Questions

Contenu connexe

Tendances

NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
Numaan Huq
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
at MicroFocus Italy ❖✔
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
svito
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
Sara-Jayne Terp
 

Tendances (20)

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 

En vedette

Crash course observation lab
Crash course observation labCrash course observation lab
Crash course observation lab
Augusto Ovelar
 
презентация элективного курса по обществознанию
презентация элективного курса по обществознаниюпрезентация элективного курса по обществознанию
презентация элективного курса по обществознанию
loksal
 
Overview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance MeasuresOverview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance Measures
serviceresources
 
Krzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl EmersonKrzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl Emerson
lpendse
 
Nutritional Intelligence
Nutritional IntelligenceNutritional Intelligence
Nutritional Intelligence
browncowdesign
 
Indefinite quantities
Indefinite quantitiesIndefinite quantities
Indefinite quantities
teacherhector
 
Španska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjiziŠpanska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjizi
Jasmina Nikolic
 
Hist 141 the little ice age
Hist 141   the little ice ageHist 141   the little ice age
Hist 141 the little ice age
flip7rider
 

En vedette (20)

My life project
My life projectMy life project
My life project
 
Education Focus Area
Education Focus AreaEducation Focus Area
Education Focus Area
 
Crash course observation lab
Crash course observation labCrash course observation lab
Crash course observation lab
 
Introduction by Dr K
Introduction by Dr KIntroduction by Dr K
Introduction by Dr K
 
презентация элективного курса по обществознанию
презентация элективного курса по обществознаниюпрезентация элективного курса по обществознанию
презентация элективного курса по обществознанию
 
Overview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance MeasuresOverview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance Measures
 
Krzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl EmersonKrzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl Emerson
 
Present simple
Present simplePresent simple
Present simple
 
Html5fun@東京 Bootstrapにアニメーションを付けよう
Html5fun@東京 Bootstrapにアニメーションを付けようHtml5fun@東京 Bootstrapにアニメーションを付けよう
Html5fun@東京 Bootstrapにアニメーションを付けよう
 
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
 
Nutritional Intelligence
Nutritional IntelligenceNutritional Intelligence
Nutritional Intelligence
 
บทที่ 2 ทวีชัย
บทที่ 2 ทวีชัยบทที่ 2 ทวีชัย
บทที่ 2 ทวีชัย
 
Mitppt
MitpptMitppt
Mitppt
 
My Life Project
My Life Project My Life Project
My Life Project
 
Indefinite quantities
Indefinite quantitiesIndefinite quantities
Indefinite quantities
 
Španska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjiziŠpanska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjizi
 
Hist 141 the little ice age
Hist 141   the little ice ageHist 141   the little ice age
Hist 141 the little ice age
 
Bucerias
BuceriasBucerias
Bucerias
 
Telesign impermium webinar deck-121312
Telesign impermium webinar deck-121312Telesign impermium webinar deck-121312
Telesign impermium webinar deck-121312
 
javascriptの基礎
javascriptの基礎javascriptの基礎
javascriptの基礎
 

Similaire à War Against Terrorism - CIO's Role

Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Stephanie McVitty
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
Ray Bugg
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
Kristin Judge
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
 

Similaire à War Against Terrorism - CIO's Role (20)

Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 

Dernier

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Dernier (15)

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 

War Against Terrorism - CIO's Role

  • 1. War Against Terrorism: The Role of Today’s CIO Ayo Rotibi Managing Director Forts & Shields Ltd (US, Kenya, Nigeria)
  • 2. “The Internet is a prime example of how terrorists can behave in a truly transnational way; in response, States need to think and function in an equally transnational manner.” Ban ki-moon
  • 3. The Art of War The Art of War is simple enough. Find out where your enemy is. Get at him as soon as you can. Strike him as hard as you can and as often as you can, and keep moving on.(Ulysses S. Grant) 18th US President. Led the Union to victory over the Confederacy in the American Civil War
  • 4. www.terror.net – The Modern Terrorists Internet-aided terrorism is a dynamic phenomenon and transnational Terrorist websites target three different audiences: current and potential supporters; international public opinion; and enemy publics Ways contemporary terrorists use the Internet: •From conducting psychological warfare to gathering information, from training to fundraising, from propagandizing to recruiting, and from networking to planning and coordinating terrorist acts.
  • 5. www.terror.net – The Modern Terrorists Workplace has been the primary target of terrorism •WTC Building, Garisa University, Westgate Mall Many workplaces upon which citizens rely to reach work are relatively unprotected •St Pancreas Underground "We use Facebook to schedule the protests, Twitter to co-ordinate and YouTube to tell the world.“ An Egyptian Arab Spring Activist
  • 6. www.terror.net – The Modern Terrorists Dateline: September 2013 •Al Qaeda opens first official Twitter account •@shomokhalislam, issued 29 tweets, followed one account, and attracted 1,532 followers in 24 hours (including several high-profile digital jihadists) @shomokhalislam
  • 7. www.terror.net – The Modern Terrorists Breaking News... Amazon Halts sales of ISIS propaganda Magazine
  • 8. Darknet – The New Terror Frontier Adopted platform for direct communication among global jihadi activists • Over 50,000 sites and 300 forums for terrorist organizations • Used to distribute material for recruitment, training, and coordination of terrorist • Informed the travel warning and closure of some US embassies in August 2013
  • 9. Darknet – The New Terror Frontier A Course in the Art of Recruiting • https://ia800300.us.archive.org/32/items/ACourseInTheArtOfRecruiting- RevisedJuly2010/A_Course_in_the_Art_of_Recruiting_-_Revised_July2010.pdf ISIS and the Lonely Young American • http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html
  • 10. Kenya’s Global Terrorism Index (GTI) Year Incidents Fatalities Injuries Properties GTI Rank (out of 162) 2009 1 0 0 0 4.47 27 2010 12 19 159 4 4.81 24 2011 38 37 98 7 5.15 19 2012 73 98 410 34 6.06 14 2013 74 201 442 22 6.58 12 http://www.visionofhumanity.org/#page/indexes/terrorism-index/2013/KEN/FATA
  • 11. Cyber-threat Barometer: Any Ideas? Leading Cyber Attack Method •Social Engineering Leading Threat •Insider (with Authorized Access) Leading Vulnerability •People
  • 12. Kenya’s Cyber Goals Enhance the nation’s cybersecurity posture in a manner that facilitates the country’s growth, safety, and prosperity. Build national capability by raising cybersecurity awareness and developing Kenya’s workforce to address cybersecurity needs. Foster information sharing and collaboration among relevant stakeholders to facilitate an information sharing environment focused on achieving the Strategy’s goals and objectives.
  • 13. Insider threat Have legitimate access to systems Often familiar with the organization's data Abuse privileges to harm the organization Circumvent security controls of which they are aware Have physical proximity to data Harder to defend against than attacks from outsiders
  • 14. The 58% Theory-The Insider Family The Rogue Employee •AKA: Shadow IT, Rogue IT •Description: They have many aliases, but one definite goal – to take valuable data and leverage it into monetary gain, revenge or even some revolutionary crusade
  • 15. The 58% Theory-The Insider Family Fired / Disgruntled Worker •AKA: Pinch a Penny from a 1 million Transactions •Description: Think Office Space – where workers on their way out devise a way to rip off the company
  • 16. The 58% Theory-The Insider Family 3rd Party and Outside Insider •AKA: The Ulterior Motivator •Description: Your temporary contractor or third-party vendor is around so much that your office is almost his second home. He may fraternize with employees and gain the trust of your crew – but who is really watching over
  • 17. The 58% Theory-The Insider Family Inadvertent Users •AKA: Not the Brightest Crayon in the Box •Description: Believe it not, inadvertent insider threats make up a good portion of data breaches– thanks to the consumerization of IT, the mobility of data and the smartphone trend, it is easier for company data to move beyond traditional firewalls
  • 18. The 58% Theory-The Insider Family Personalization Guru •AKA: The Guy Who Brings Home to Work •Description: This guy is a disaster waiting to happen. They are the ones who want their workstation to be a basic clone of their personal laptop. They want to have all the applications, tools and software –to bypass admin rights
  • 19. The 58% Theory-The Insider Family The Night Janitor •AKA: The Unsuspecting Pirate •Description: The support staff is in your office at strange hours with no supervision really at all. Don't let the false characterizations and stereotypes fool you – criminals and social engineers would not lose a sweat getting employed as a janitor just to have your server room to themselves.
  • 20. Exposure in the Workplace Types of Sensitive Corporate Information Employees Access (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
  • 21. Exposure in the Workplace Types of Personal Tasks Employees Do in the Workplace (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
  • 22. Exposure in the Workplace Content Accessed on Mobile Devices As Permitted By Enterprise (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
  • 23. Food For Thought What Will You Do If You Knew You Were Under Surveillance?
  • 24. 4 Cyber-Breach Questions What: •Happened? Was Stolen? Was Compromised? How: •Did They Do It? To Prevent Reoccurrence? Who: •Did It? Is Affected? When: •Did They Do It? Can Recovery Begin?
  • 25. CIOs must leverage this singular advantage and take a stand on the new encryption regime introduced by FB, Google and Apple Nothing is Hidden Under the Hood Every online activity leaves a Digital Footprint
  • 26. The Role of The CIO Due Care: Conduct a reasonable person would exercise in a particular situation •Security is Good Business •Security is Everybody’s Business Due Diligence: Gathers facts to make an informed decision •Additional Internal Control procedure – Network Forensics Threat awareness, assessment, and perception Efficient information flow within corporations, between corporations, and between corporations and local and federal government agencies
  • 27. National Domestic Communication Assistance Center Core functions: • Law Enforcement Coordination • Industry Relations • Technology Sharing • CALEA Implementation Government's first ever attempt to develop a centre for electronic surveillance knowledge management, and facilitate the sharing of technical solutions and know- how among law enforcement agencies
  • 28. What if... ...we all work together for a common purpose? ...we aspire to build a Regional NDCAC to foster stronger collaboration and complement Kenya CIRT/CERT? ...we foster stronger collective relationship with LEA and Government ...we leave this conference with a resolution to make SOMETING happen? ...we...?
  • 29. Proposed Initiatives Initiate targeted knowledge dissemination programs Provide real time knowledge dissemination to corporate members Develop lessons learned from corporate incidences Modify existing Users and Internet Usage Policies to include Internal Surveillance Establish a Regional NDCAC
  • 30. A Little Story Breaking News Eiffel Tower for Sale! Moral Lesson: Share Information
  • 31. Conclusion CIOs have been dragged into the War Against Terrorism The Enterprise landscape has changed forever – FACT The Internet offers us opportunity to prevent, detect and deter acts of terrorism CIOs have a responsibility to secure their enterprise CIOs need to know about human psychology and behavioural attitude Real-time Digital Forensics will become a major tool in identifying these threat agents CIO must determine that their enterprise network does not become a recruitment ground or a conduit for fund- raising and propaganda
  • 32. For Further Information and Demo: •Email: arotibi@isecureconsulting.com •Phone: +254-786-834-158, +254-772-299-802 •Skype: arotibi •Forts & Shields, 63 Mandera Rd, Kileleshwa, Nairobi, Kenya •www.fortsandshields.com •www.isecureconsulting.com Questions