SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Continuity & Resilience (CORE)
ISO 22301 BCM Consulting Firm
Presentations by speakers at the
8th ME Business & IT Resilience Summit
March 10, 2019 at The Address Hotel, Duabi Mall, Dubai, UAE
Cyber Resilience
Tips and Techniques For Protection & Response
C Kajwadkar (C K)
Mumbai
1: Get Right Connotation to words
Terminology
• Information Security v/s Cyber Security
• Security threats v/s Cyber Security threats
• Security events, incidents, IoC, compromise ,breach, data theft, attack
• Contain, Limit , Quarantine , Recover
• Disaster Recovery v/s Business Continuity
4
2: Get Understanding of Concepts
A few Key Concepts
• Cyber Kill Chain
• Triage
• Golden Hour
• Patient Zero
6
Cyber Kill Chain
7
Cyber Kill Chain
• Reconnaissance
• Weaponisation
• Delivery
• Exploitation
• Installation
• Command & control
• Actions on objective
• Research, identification, and selection of targets
• Pairing remote access malware with exploit into a
deliverable payload (e.g. Adobe PDF and Microsoft
Office files )
• Transmission of weapon to target (e.g. via email
attachments, websites, or USB devices)
• Once delivered, the weapon’s code is triggered,
exploiting vulnerable applications or systems
• The weapon installs a backdoor on a target’s
system allowing persistent access.
• Outside service communicates with the weapons
providing “hands on keyboard access” inside the
target’s network.
• The attacker works to achieve the objective of the
intrusion, which can include exfiltration or
destruction of data, or intrusion of another target
8
3: Get the Frame Work Right
12
Five Primary Risk Management
Categories-
• Governance;
• Identification;
• Protection;
• Detection; and
• Response and Recovery.
Three Overarching Components-
• Testing;
• Situational awareness; and
• Learning and evolving.
Cyber Resilience Framework
4: Cyber Crisis Management Plan
Cyber Crisis Management Plan
• Cyber Crisis Management Governance
• Identification and Validation
• Activation of Cyber Crisis Management Plan (CCMP)
• Response and Containment
• Communication
• Recovery
14
5: Cyber Crisis Management Strategy
Defender’s tool Kit
• Detect
• Deflect
• Deny
• Disrupt
• Degrade
• …..
• ….
16
6: Forensic Readiness
Log Collection, Storage, Analysis
• Change in perspective wrt Logs
• Conventionally and now
• Plethora of sources….
• More parameters for ‘Logging’
• Frequency of logging
• Rate & Size of logs
• Challenges of Storage, Analysis, Correlation, alert fatigue
• Meaningful outcome with superfast response
• Chain of Custody for forensics
18
7: People Factor
‘People’ factor in Cyber Security
• Culture across geographies is different, Plays role in its own way
• Human beings are ‘social’ by nature
• Official / social communications are part of life.
• Certain level of vulnerabilities will continue to exist
• We all appreciate that there is ‘no patch for human stupidity’
• Thus we have to find Systemic ways to deal with it.
• Despite best efforts, some silo’s will exist in organization
• Set processes to reduce gaps
• In routine BAU, we may tend to go on ‘Auto Pilot’
• What can help us get switch to ‘alert mode’ from BAU mode ?
20
‘People’ factor in Cyber Security
• Newer skills are required in organization, including at Board level
• Cyber Strategy is as important as business strategy
• Implementation of Cyber Security may require plethora of tools
• POC, selection, implementation requires skills & mindset
• Post implementation, ‘day to day’ admin is also important
• Processes are as important as tools
• Do we have people who can set right processes
• Investigation of Cyber incident is a different ball game
• Event correlation, connecting missing dots play important role
• Planning for forensic requires hacker’s mind set. Do we ethical hackers ?
• Tests/Drills
• Have we planned for Red & Blue team? How effectively we can use them.
21
8: Prepare For Targeted Attack
Preparing for Targeted Attacks
• Deep understanding of why would some one attack you
• Enhance capabilities to get early indicators reconnaissance
• Targeted threat intelligence
• Higher emphasis on insider threats
• Early Detection capabilities
• Active defense
• Active hunting
• Incident Response team with mind set of DGMO
• ….
23
9: Future Proofing
The Crystal Ball ..Horizon 2025
4th Industrial Revolution: Higher Momentum
• Drivers : ML, AI ,IOT, WNS*,C2X*
• Dominance of Matured CPS*
*CPS Cyber Physical Systems
*WNS: Wireless Sensor Networks , *C2X : Car to Everything
The Crystal Ball ..Horizon 2025
• Newer Areas of Applications
• Smart Cities
• Agri , Green House Asset management
• Healthcare Management
• Navigation & Rescue
• Intelligent Transportation Systems (ITSs), C2X
• Machine Vision
• Biological Network Analysis
• Military Robotic Controls
• …
10: ???
When Going Gets Tough, Tough Get Going…
Thank you
Continuity & Resilience (CORE)
ISO 22301 BCM Consulting Firm
Presentations by speakers at the
8th ME Business & IT Resilience Summit
March 10, 2019 at The Address Hotel, Duabi Mall, Dubai, UAE

Contenu connexe

Tendances

Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
Emily2014
 

Tendances (20)

Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Alexander Knorr Transcript
Alexander Knorr TranscriptAlexander Knorr Transcript
Alexander Knorr Transcript
 
It Governance in time of Covid-19
It Governance in time of Covid-19It Governance in time of Covid-19
It Governance in time of Covid-19
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Segregation of Duties
Segregation of DutiesSegregation of Duties
Segregation of Duties
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk PoolEXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
EXIGIS RiskWorks rm.Exposures Case Study - Public Entity Risk Pool
 
PECB Webinar: Why every company needs a CISO?
PECB Webinar: Why every company needs a CISO?PECB Webinar: Why every company needs a CISO?
PECB Webinar: Why every company needs a CISO?
 
Effectively managing operational risk
Effectively managing operational riskEffectively managing operational risk
Effectively managing operational risk
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Cyber threat enterprise leadership required march 2014
Cyber threat   enterprise leadership required  march 2014Cyber threat   enterprise leadership required  march 2014
Cyber threat enterprise leadership required march 2014
 
Erm talking points
Erm talking pointsErm talking points
Erm talking points
 
ISO 37001 – Preparing for Certification
ISO 37001 – Preparing for CertificationISO 37001 – Preparing for Certification
ISO 37001 – Preparing for Certification
 
CDCATInsurance 2016
CDCATInsurance 2016CDCATInsurance 2016
CDCATInsurance 2016
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
BCM Institute MTE Richard Stuart - IPS Securex: Journey to be Resilient
BCM Institute MTE Richard Stuart - IPS Securex: Journey to be ResilientBCM Institute MTE Richard Stuart - IPS Securex: Journey to be Resilient
BCM Institute MTE Richard Stuart - IPS Securex: Journey to be Resilient
 
Finding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO StudyFinding a Strategic Voice - IBM CISO Study
Finding a Strategic Voice - IBM CISO Study
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 

Similaire à Cyber Resilience Tips and Techniques For Protection & Response

Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
PECB
 

Similaire à Cyber Resilience Tips and Techniques For Protection & Response (20)

Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
 
BCI Hyd Forum Newsletter Aug'17
BCI Hyd Forum Newsletter Aug'17BCI Hyd Forum Newsletter Aug'17
BCI Hyd Forum Newsletter Aug'17
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
How to secure HCE
How to secure HCEHow to secure HCE
How to secure HCE
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
Acture Solutions - 5 Efficient Ways To Align Your District's Cybersecurity w/...
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022Ethical Hacking and Cybersecurity – Key Trends in 2022
Ethical Hacking and Cybersecurity – Key Trends in 2022
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdfCompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
 

Plus de Continuity and Resilience

The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
Continuity and Resilience
 

Plus de Continuity and Resilience (20)

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
 
DEFLUFFING RESILIENCE
DEFLUFFING RESILIENCEDEFLUFFING RESILIENCE
DEFLUFFING RESILIENCE
 
CREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAMCREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAM
 
BCM Challenges and Compliance
BCM Challenges and Compliance BCM Challenges and Compliance
BCM Challenges and Compliance
 
Thriving in the Crisis Situation
Thriving in the Crisis SituationThriving in the Crisis Situation
Thriving in the Crisis Situation
 
Cyber Security & IT Resilience
Cyber Security & IT Resilience Cyber Security & IT Resilience
Cyber Security & IT Resilience
 
Enterprise Resilience
Enterprise ResilienceEnterprise Resilience
Enterprise Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise Resilience
 
Bcm is all about people!
Bcm   is all about people!Bcm   is all about people!
Bcm is all about people!
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case Studies
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation Sector
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.
 
BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..BCM Regulations and Learnings from across the globe..
BCM Regulations and Learnings from across the globe..
 
Kerala floods case study automated two-way crisis communication
Kerala floods case study   automated two-way crisis communicationKerala floods case study   automated two-way crisis communication
Kerala floods case study automated two-way crisis communication
 
Social media influence in the field of bcm
Social media influence in the field of bcmSocial media influence in the field of bcm
Social media influence in the field of bcm
 
Renewed focus of Business and Practitioners on BCM (in Asia)
Renewed focus of Business and Practitioners on BCM (in Asia)Renewed focus of Business and Practitioners on BCM (in Asia)
Renewed focus of Business and Practitioners on BCM (in Asia)
 

Dernier

➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
aakahthapa70
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
Sheetaleventcompany
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Sana Rajpoot
 
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Hot Call Girls In Sector 58 (Noida)
 

Dernier (20)

➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment BookingHaldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
Nashik Call Girl 💋 9748763073 Call Girls in Nashik Escort service book now
Nashik Call Girl 💋 9748763073 Call Girls in Nashik Escort service book nowNashik Call Girl 💋 9748763073 Call Girls in Nashik Escort service book now
Nashik Call Girl 💋 9748763073 Call Girls in Nashik Escort service book now
 
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
 
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
Call Girls In {Laxmi Nagar Delhi}9667938988 Indian Russian Escort Service Ava...
 
Mysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort serviceMysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort service
 
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL INBhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL IN
 
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
💚Call Girls Chandigarh 💯Riya 📲🔝8868886958🔝Call Girls In Chandigarh No💰Advance...
 
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book nowVaranasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
 
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book nowKanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
 
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book nowJodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
 
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book nowPatna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
 
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
 
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋  Call Girl 9748763073 Call Girls in Shimla Escort service book nowShimla 💋  Call Girl 9748763073 Call Girls in Shimla Escort service book now
Shimla 💋 Call Girl 9748763073 Call Girls in Shimla Escort service book now
 
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
Bhopal ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Bhopal ESCORT SERVICE❤CALL GIRL I...
 
Raipur ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book now
Raipur  ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book nowRaipur  ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book now
Raipur ❣️ Call Girl 97487*63073 Call Girls in Raipur Escort service book now
 
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
Russian Call Girls New Delhi Whatsapp Numbers 07042364481 Russian Escorts Ser...
 
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book nowMysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
 
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book nowThane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
Thane 💋 Call Girls 7091864438 Call Girls in Thane Escort service book now
 

Cyber Resilience Tips and Techniques For Protection & Response

  • 1. Continuity & Resilience (CORE) ISO 22301 BCM Consulting Firm Presentations by speakers at the 8th ME Business & IT Resilience Summit March 10, 2019 at The Address Hotel, Duabi Mall, Dubai, UAE
  • 2. Cyber Resilience Tips and Techniques For Protection & Response C Kajwadkar (C K) Mumbai
  • 3. 1: Get Right Connotation to words
  • 4. Terminology • Information Security v/s Cyber Security • Security threats v/s Cyber Security threats • Security events, incidents, IoC, compromise ,breach, data theft, attack • Contain, Limit , Quarantine , Recover • Disaster Recovery v/s Business Continuity 4
  • 5. 2: Get Understanding of Concepts
  • 6. A few Key Concepts • Cyber Kill Chain • Triage • Golden Hour • Patient Zero 6
  • 8. Cyber Kill Chain • Reconnaissance • Weaponisation • Delivery • Exploitation • Installation • Command & control • Actions on objective • Research, identification, and selection of targets • Pairing remote access malware with exploit into a deliverable payload (e.g. Adobe PDF and Microsoft Office files ) • Transmission of weapon to target (e.g. via email attachments, websites, or USB devices) • Once delivered, the weapon’s code is triggered, exploiting vulnerable applications or systems • The weapon installs a backdoor on a target’s system allowing persistent access. • Outside service communicates with the weapons providing “hands on keyboard access” inside the target’s network. • The attacker works to achieve the objective of the intrusion, which can include exfiltration or destruction of data, or intrusion of another target 8
  • 9. 3: Get the Frame Work Right
  • 10. 12 Five Primary Risk Management Categories- • Governance; • Identification; • Protection; • Detection; and • Response and Recovery. Three Overarching Components- • Testing; • Situational awareness; and • Learning and evolving. Cyber Resilience Framework
  • 11. 4: Cyber Crisis Management Plan
  • 12. Cyber Crisis Management Plan • Cyber Crisis Management Governance • Identification and Validation • Activation of Cyber Crisis Management Plan (CCMP) • Response and Containment • Communication • Recovery 14
  • 13. 5: Cyber Crisis Management Strategy
  • 14. Defender’s tool Kit • Detect • Deflect • Deny • Disrupt • Degrade • ….. • …. 16
  • 16. Log Collection, Storage, Analysis • Change in perspective wrt Logs • Conventionally and now • Plethora of sources…. • More parameters for ‘Logging’ • Frequency of logging • Rate & Size of logs • Challenges of Storage, Analysis, Correlation, alert fatigue • Meaningful outcome with superfast response • Chain of Custody for forensics 18
  • 18. ‘People’ factor in Cyber Security • Culture across geographies is different, Plays role in its own way • Human beings are ‘social’ by nature • Official / social communications are part of life. • Certain level of vulnerabilities will continue to exist • We all appreciate that there is ‘no patch for human stupidity’ • Thus we have to find Systemic ways to deal with it. • Despite best efforts, some silo’s will exist in organization • Set processes to reduce gaps • In routine BAU, we may tend to go on ‘Auto Pilot’ • What can help us get switch to ‘alert mode’ from BAU mode ? 20
  • 19. ‘People’ factor in Cyber Security • Newer skills are required in organization, including at Board level • Cyber Strategy is as important as business strategy • Implementation of Cyber Security may require plethora of tools • POC, selection, implementation requires skills & mindset • Post implementation, ‘day to day’ admin is also important • Processes are as important as tools • Do we have people who can set right processes • Investigation of Cyber incident is a different ball game • Event correlation, connecting missing dots play important role • Planning for forensic requires hacker’s mind set. Do we ethical hackers ? • Tests/Drills • Have we planned for Red & Blue team? How effectively we can use them. 21
  • 20. 8: Prepare For Targeted Attack
  • 21. Preparing for Targeted Attacks • Deep understanding of why would some one attack you • Enhance capabilities to get early indicators reconnaissance • Targeted threat intelligence • Higher emphasis on insider threats • Early Detection capabilities • Active defense • Active hunting • Incident Response team with mind set of DGMO • …. 23
  • 23. The Crystal Ball ..Horizon 2025 4th Industrial Revolution: Higher Momentum • Drivers : ML, AI ,IOT, WNS*,C2X* • Dominance of Matured CPS* *CPS Cyber Physical Systems *WNS: Wireless Sensor Networks , *C2X : Car to Everything
  • 24. The Crystal Ball ..Horizon 2025 • Newer Areas of Applications • Smart Cities • Agri , Green House Asset management • Healthcare Management • Navigation & Rescue • Intelligent Transportation Systems (ITSs), C2X • Machine Vision • Biological Network Analysis • Military Robotic Controls • …
  • 26. When Going Gets Tough, Tough Get Going…
  • 28. Continuity & Resilience (CORE) ISO 22301 BCM Consulting Firm Presentations by speakers at the 8th ME Business & IT Resilience Summit March 10, 2019 at The Address Hotel, Duabi Mall, Dubai, UAE