SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
CYBERTHREAT LANDSCAPE -HOW
ORGANIZATIONS CANTAKE
PROACTIVE APPROACHTO BOLSTER
THEIR SECURITY POSTURE
Satyanandan Atyam, Associate Vice President, Data
Privacy Officer, Bharti AXA General Insurance
1
DISCLAIMER
The Document may contain material nonpublic
information/Information on public domain and is provided for
informational purpose only.The views presented here are the
sole views of the Speaker and doesn’t represent the views of
the Organization where he is / was working
2
DO WE KNOW WHERE ISTHE
THREAT LANDSCAPE ?
 APTs commonly seek intellectual property (IP) and personally identifiable
information (PII) that resides within large financial institutions.
 Moving towards mobility : Opening up the corporate network to the unknown,
meaning this has to be structurally secured.
 Cloud data leakage is the biggest concern
 About 48 percent of data breaches were caused by malicious attacks from
people both inside and outside of the organization.
 Nearly 25 percent of breaches were associated with human error.
 The single biggest factor in reducing the cost of a data breach was having
an incident response team in place
3
THREATVECTORS : INSURANCE
INDUSTRY
 APTs commonly seek intellectual property (IP) and personally identifiable information (PII)
that resides within large financial institutions.
 The global insurance industry, worth close to $1 trillion annually
 They may try to compromise a vendor or, perhaps in the case of insurance, independent
agents, and use that as a conduit to the target entity. They often compromise one thing to
get to another
◦ Insurance Agent/Brokers
◦ Health-Third Party Administrators
◦ Policy ProcessingVendors
◦ IT Outsourcing –Software Development & Infrastructure
◦ Reinsurers
◦ Garages & Service Providers
 Not only do insurers possess this treasure trove of sensitive personal information, second
only to government, but also increasingly rely on integrated information systems, providing
multiple pathways for attack
4
ELEMENTS OFTHE ECOSYSTEM
 APT not detected by the traditional signature based controls
 Social Engineering and Social Networks being used to target
sensitive roles in organization's
 Goals
◦ Malware delivery
◦ Lasting footprints
◦ Persistence
◦ Obtaining targeted individual’s credentials
5
ARE BREACHES REALLY
INEVITABLE?
 YES & NO
 Is technology going to be a the panacea for all problems
 Is assessment of security processes around the technology for the
effective management of the potential threat vectors critical to
reduce breach events ?
◦ Insurance Use Cases
 Data Leakage
 Data Privacy breach
 Awareness
 Security Processes
6
WHAT’SYOUR POSTURE?
Every organization in always in reactive mode- Do we need any
preparation for this ?
Do we know what goes into having an Proactive approach to APT
• Business Questions
 Understand the Risk Posture :Align Board on the Risk (Threat Posture) Assessment Engagement
 Understand Business Risks and Aggregation of such risks due to weak IT Controls
 Are you concerned that your key employees and executives might be a enticed for IP theft?
 Do you wonder if any of your key systems have been compromised by malware?
 Are you concerned that sensitive data is exiting your network via corporate and personal email accounts?
 Would you like to know which sensitive files are vulnerable because they are accessible to everyone?
 Do you have a compliance initiative that mandates protecting sensitive payment card or personal data?
• IT Questions
 Security Controls review before Onboarding new application/Infrastructure/moving to cloud
 Employ Defense in depth strategy
 Basics of Layered Security-Management of Devices ( Monitoring )
 Data Leakage Solutions
 Outsourcing Risk
 Secure Configuration
 Review BYOD Policy
 Review Access Rights-PUM
 Awareness & Education
 Incident Management & Incident Reponses ( All threats cannot be prevented)
 Clear Acceptable use Policy
 Logging and Monitoring
7
THANK YOU
8

Contenu connexe

Tendances

Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defensekajal kumari
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Intelligence soc as a service
Intelligence soc as a serviceIntelligence soc as a service
Intelligence soc as a servicenairshyam
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider ThreatsLancope, Inc.
 
Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionObserveIT
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat KeynoteJohn D. Johnson
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2Chris Baldwin
 
Industry Check: Where Real Companies Stand With Threat Intelligence
Industry Check: Where Real Companies Stand With Threat IntelligenceIndustry Check: Where Real Companies Stand With Threat Intelligence
Industry Check: Where Real Companies Stand With Threat IntelligenceRecorded Future
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itAvancercorp
 

Tendances (20)

Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defense
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Intelligence soc as a service
Intelligence soc as a serviceIntelligence soc as a service
Intelligence soc as a service
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and Protection
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
 
Industry Check: Where Real Companies Stand With Threat Intelligence
Industry Check: Where Real Companies Stand With Threat IntelligenceIndustry Check: Where Real Companies Stand With Threat Intelligence
Industry Check: Where Real Companies Stand With Threat Intelligence
 
Strategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid itStrategically moving towards a secure hybrid it
Strategically moving towards a secure hybrid it
 

Similaire à Cyber Threat Landscape- Security Posture - ver 1.0

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2marchharvey
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 

Similaire à Cyber Threat Landscape- Security Posture - ver 1.0 (20)

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 

Cyber Threat Landscape- Security Posture - ver 1.0

  • 1. CYBERTHREAT LANDSCAPE -HOW ORGANIZATIONS CANTAKE PROACTIVE APPROACHTO BOLSTER THEIR SECURITY POSTURE Satyanandan Atyam, Associate Vice President, Data Privacy Officer, Bharti AXA General Insurance 1
  • 2. DISCLAIMER The Document may contain material nonpublic information/Information on public domain and is provided for informational purpose only.The views presented here are the sole views of the Speaker and doesn’t represent the views of the Organization where he is / was working 2
  • 3. DO WE KNOW WHERE ISTHE THREAT LANDSCAPE ?  APTs commonly seek intellectual property (IP) and personally identifiable information (PII) that resides within large financial institutions.  Moving towards mobility : Opening up the corporate network to the unknown, meaning this has to be structurally secured.  Cloud data leakage is the biggest concern  About 48 percent of data breaches were caused by malicious attacks from people both inside and outside of the organization.  Nearly 25 percent of breaches were associated with human error.  The single biggest factor in reducing the cost of a data breach was having an incident response team in place 3
  • 4. THREATVECTORS : INSURANCE INDUSTRY  APTs commonly seek intellectual property (IP) and personally identifiable information (PII) that resides within large financial institutions.  The global insurance industry, worth close to $1 trillion annually  They may try to compromise a vendor or, perhaps in the case of insurance, independent agents, and use that as a conduit to the target entity. They often compromise one thing to get to another ◦ Insurance Agent/Brokers ◦ Health-Third Party Administrators ◦ Policy ProcessingVendors ◦ IT Outsourcing –Software Development & Infrastructure ◦ Reinsurers ◦ Garages & Service Providers  Not only do insurers possess this treasure trove of sensitive personal information, second only to government, but also increasingly rely on integrated information systems, providing multiple pathways for attack 4
  • 5. ELEMENTS OFTHE ECOSYSTEM  APT not detected by the traditional signature based controls  Social Engineering and Social Networks being used to target sensitive roles in organization's  Goals ◦ Malware delivery ◦ Lasting footprints ◦ Persistence ◦ Obtaining targeted individual’s credentials 5
  • 6. ARE BREACHES REALLY INEVITABLE?  YES & NO  Is technology going to be a the panacea for all problems  Is assessment of security processes around the technology for the effective management of the potential threat vectors critical to reduce breach events ? ◦ Insurance Use Cases  Data Leakage  Data Privacy breach  Awareness  Security Processes 6
  • 7. WHAT’SYOUR POSTURE? Every organization in always in reactive mode- Do we need any preparation for this ? Do we know what goes into having an Proactive approach to APT • Business Questions  Understand the Risk Posture :Align Board on the Risk (Threat Posture) Assessment Engagement  Understand Business Risks and Aggregation of such risks due to weak IT Controls  Are you concerned that your key employees and executives might be a enticed for IP theft?  Do you wonder if any of your key systems have been compromised by malware?  Are you concerned that sensitive data is exiting your network via corporate and personal email accounts?  Would you like to know which sensitive files are vulnerable because they are accessible to everyone?  Do you have a compliance initiative that mandates protecting sensitive payment card or personal data? • IT Questions  Security Controls review before Onboarding new application/Infrastructure/moving to cloud  Employ Defense in depth strategy  Basics of Layered Security-Management of Devices ( Monitoring )  Data Leakage Solutions  Outsourcing Risk  Secure Configuration  Review BYOD Policy  Review Access Rights-PUM  Awareness & Education  Incident Management & Incident Reponses ( All threats cannot be prevented)  Clear Acceptable use Policy  Logging and Monitoring 7