Top Banner
CYBER STATE Threats, Opportunities and the Future of Cyber Strategy at a National Level Presented for: the Organization of American States Caribbean Telecommunications Union 9th Ministerial Strategic Seminar (Cyber Security) Thursday, December 8, 11
38

Cyber state

May 11, 2015

Download

Documents

Iftach Ian Amit

A presentation on the state of cyber security, current threats and opportunities at the national level.
An overview of current readiness analysis for countries, along-with a recommended strategic approach to developing capabilities and partnerships locally, regionally, and globally.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber state

CYBER STATEThreats, Opportunities and the Future of Cyber Strategy at a National Level

Presented for:

the Organization of American States Caribbean Telecommunications Union

9th Ministerial Strategic Seminar (Cyber Security)

Thursday, December 8, 11

Page 2: Cyber state

Iftach Ian Amit

VP Consulting at Security-Art

16 years in the Security Industry

Cyber Defense at the Israeli Air-Force

Founding member - the Penetration Testing Execution Standard

SME for NATO’s Cyber Commons Strategy 2011 (CCD-COE)

Thursday, December 8, 11

Page 3: Cyber state

AgendaReview of the current state of Cyber Threats at a national level

Linking criminal efforts to state interests

National readiness - where are we?

Creating Cyber Capabilities - the right way

eGovernance

Partnerships

Public-Private

Thursday, December 8, 11

Page 4: Cyber state

Cyber ThreatsLocality

Global

Regional

Local

Thursday, December 8, 11

Page 5: Cyber state

Cyber Threats

Criminals

Hacktivists

Terrorists

Threat CommunitiesLocality

Global

Regional

Local

Thursday, December 8, 11

Page 6: Cyber state

Cyber Threats

Criminals

Hacktivists

Terrorists

Threat Communities Approach Vectors

Public Internet

Communication Infrastructure

Private Networks

Locality

Global

Regional

Local

Thursday, December 8, 11

Page 7: Cyber state

Cyber Threats

Criminals

Hacktivists

Terrorists

Threat Communities Approach Vectors

Public Internet

Communication Infrastructure

Private Networks

Locality

Global

Regional

Local

Thursday, December 8, 11

Page 8: Cyber state

Cyber Threats

Criminals

Hacktivists

Terrorists

Threat Communities Approach Vectors

Public Internet

Communication Infrastructure

Private Networks

Locality

Global

Regional

Local

Assets

$

Public Opinion

Critical Infrastructure

Thursday, December 8, 11

Page 9: Cyber state

Cyber Threats

Criminals

Hacktivists

Terrorists

Threat Communities Approach Vectors

Public Internet

Communication Infrastructure

Private Networks

Locality

Global

Regional

Local

Assets

$

Public Opinion

Critical Infrastructure

Thursday, December 8, 11

Page 10: Cyber state

Quick Summary:

Crime and War are

NOT FAIR

Deal with it!

Thursday, December 8, 11

Page 11: Cyber state

CyberCrime

Thursday, December 8, 11

Page 12: Cyber state

A-Symmetrical conflict

Crime enterprises are operating like global businesses

Legislation is behind ==> more freedom to run fraud

Law enforcement success is only at the low-end (small fish)

Defensive mechanisms focus on post-infection

Thursday, December 8, 11

Page 13: Cyber state

Hacktivists

Thursday, December 8, 11

Page 14: Cyber state

Links (crime-hacktivists)?

Thursday, December 8, 11

Page 15: Cyber state

Links (crime-hacktivists)?

Thursday, December 8, 11

Page 16: Cyber state

Links (crime-hacktivists)?

Thursday, December 8, 11

Page 17: Cyber state

Cyber Terrorists

Much more disperse

Local

Regional

International

Focus on recruiting

Both physical actions, as well as Cyber actions

Thursday, December 8, 11

Page 18: Cyber state

Thursday, December 8, 11

Page 19: Cyber state

Thursday, December 8, 11

Page 20: Cyber state

Thursday, December 8, 11

Page 21: Cyber state

Thursday, December 8, 11

Page 22: Cyber state

Links (crime-hacktivists-terror)

Thursday, December 8, 11

Page 23: Cyber state

Links (crime-hacktivists-terror)

Thursday, December 8, 11

Page 24: Cyber state

13

Russian Government

Crime

ESTDom RBN

HostFresh

UkrTeleGroup

ESTDomains

McColo

Atrivo

Thursday, December 8, 11

Page 25: Cyber state

13

Russian Government

Crime

ESTDom RBN

HostFresh

UkrTeleGroup

ESTDomains

McColo

Atrivo

Hosted by

Thursday, December 8, 11

Page 26: Cyber state

13

Russian Government

Crime

ESTDom RBN

HostFresh

UkrTeleGroup

ESTDomains

McColo

Atrivo

Hosted byCustomer

Thursday, December 8, 11

Page 27: Cyber state

13

Russian Government

Crime

ESTDom RBN

HostFresh

UkrTeleGroup

ESTDomains

McColo

Atrivo

Hosted byCustomerNetwork provider

Thursday, December 8, 11

Page 28: Cyber state

13

Russian Government

Crime

ESTDom RBN

HostFresh

UkrTeleGroup

ESTDomains

McColo

Atrivo

Hosted byCustomerNetwork provider

Thursday, December 8, 11

Page 29: Cyber state

National Readiness?

More focus on eGovernance

Financial systems are still exposed

Critical Infrastructure is behind a “feel good” solution

Capability building is lacking a strategic goal!

Lack of Intelligence and correlation of data

Thursday, December 8, 11

Page 30: Cyber state

eGovernanceDeveloping outreach is great, efficient and transparent

Remember to THREAT MODEL when providing services

Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea)

Thursday, December 8, 11

Page 31: Cyber state

eGovernanceDeveloping outreach is great, efficient and transparent

Remember to THREAT MODEL when providing services

Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea)

Thursday, December 8, 11

Page 32: Cyber state

eGovernanceDeveloping outreach is great, efficient and transparent

Remember to THREAT MODEL when providing services

Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea)

Thursday, December 8, 11

Page 33: Cyber state

eGovernanceDeveloping outreach is great, efficient and transparent

Remember to THREAT MODEL when providing services

Threat communities may surprise you (examples: Mexico, Colombia, Russia, South Korea)

Thursday, December 8, 11

Page 34: Cyber state

Public-Private Partnerships

You don’t own the Internet

A lot of critical infrastructure and communication is privately owned or privately operated.

Symbiotic relationships are a MUST! (See US CyberStorm III)

Advantage (state): Access to more raw information, early warning

Advantage (private sector): More accessibility, broadening threat community detection and intelligence (readiness)

Thursday, December 8, 11

Page 35: Cyber state

Global Partnerships

Model after the CERT community

Global intelligence on threat communities

Early warning

Sample sharing

Proactive defense and incident handling

Helps to bypass legal/political issues

Thursday, December 8, 11

Page 36: Cyber state

Strategic ApproachStart from the basics

No - advanced offensive capabilities come LAST!

Build an intelligence and correlation infrastructure

Early warning, feeds from multiple sources (open and closed)

Remember social media!

Defense is not a reactive practice. Push forward, place yourself in “enemy” territory

Thursday, December 8, 11

Page 37: Cyber state

Strategic ApproachOffensive capability building

Coupled with the defensive requirements

Focused on what is needed - not what everyone else is using...

Working alone == FAIL. Establish partnerships, work on international legislation on crime/war treaties

NATO article 5 for the cyber commons?

Thursday, December 8, 11

Page 38: Cyber state

Questions?

Thank you!

Iftach Ian Amit

VP Consulting, Security-Art

[email protected]

www.iamit.org/blog

Thursday, December 8, 11