Top Banner
Tony Chew Managing Director Regional Head of Information Security, Asia Pacific Global Head of Cyber Security Regulatory Strategy Cyber security threat landscape and systems resiliency Challenges and priorities for 2015 Kuala Lumpur, Malaysia 17 March 2015
19

Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

Jul 16, 2015

Download

Technology

Knowledge Group
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

Tony Chew

Managing Director

Regional Head of Information Security, Asia Pacific

Global Head of Cyber Security Regulatory Strategy

Cyber security threat landscape and systems resiliency

Challenges and priorities for 2015

Kuala Lumpur, Malaysia17 March 2015

Page 2: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

2014 was the year of cyber hacking.

Would 2015 be worse?

Page 3: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

TOP CYBER SECURITY THREATS

2

Methods

Page 4: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

2014 Significant Attacks

3

Page 5: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

Source

What lessons can we learn from the recent hacking

and data breach incidents?

Page 6: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew
Page 7: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew
Page 8: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew
Page 9: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

LESSONS LEARNT FROM HACKING AND DATA LEAKAGE INCIDENTS

1. STRENGTHEN ACCESS CONTROLS AND TIGHTEN ACCESS ENTITLEMENTS> IMPLEMENT TWO FACTOR AUTHENTICATION FOR ALL ACCESS TO CRITICAL SYSTEMS <

4. BLOCK DATA EXFILTRATION BY MALWARE> INTERCEPT MALWARE COMMUNICATION WITH C2 <

2. KEEP SYSTEM PATCHING UP TO DATE

3. ENHANCE DETECTION OF MALWARE ATTACKS AND INFILTRATIONS

5. VERIFY VENDOR CONTROLS FOR CUSTOMER DATA PROTECTION

Page 10: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew
Page 11: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew
Page 12: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

CYBER SECURITY COUNTERMEASURES

1. What is defense-in-depth?

2. How does it work?

3. What are the technologies, tools and processes?

Page 13: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

BOTNET

ZERO DAY

APT

MITM

CYBER SECURITY LANDSCAPE

EMAIL

PHISHING

THIRD PARTY (OUTSOURCING)

Cyber Attack Scenarios

Page 14: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

CYBER SECURITY COUNTERMEASURES

1. DEFENSE-IN-DEPTH / SECURITY OPERATIONS CENTRE

2. PREVENTION, PRE-EMPTION, DETECTION, RESPONSE

3. INTELLIGENCE SHARING, CYBER WAR GAMES

Page 15: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

AVAILABILITY TIERS - THE NINES

1. 99% >>>>> 3.6 DAYS

2. 99.9% >>>>> 8.8 HOURS

3. 99.95% >>>>> 4.4 HOURS

4. 99.99% >>>>> 53 MINUTES

5. 99.999% >>>>> 5.3 MINUTES

Page 16: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

New York Times20 November 2014

Page 17: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew
Page 18: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

DESIGNING AND ARCHITECTING RESILIENCE

1. RESILIENT OPERATIONS, PROCESSES AND SYSTEMS

2. PROTECTION OF FACILITIES, SYSTEMS AND DATA

3. BUILT TO SURVIVE FAILURE AND ATTACK

4. ABILITY TO FAIL-OVER WITH RAPID RECOVERABILITY

Page 19: Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - Tony Chew

end