SlideShare a Scribd company logo
Unifying the
Global Response
to Cybercrime
Cyber Security – awareness,
vulnerabilities and solutions
Prof. Manel Medina
Scientific Coordinator of APWG.eu
Founder of esCERT-inLab-UPC
Director MsC Cibersecurity – UPC-Talent
manel@apwg.eu – medina@escert.upc.edu
Content
2
• Awareness
– Threats to IoT/ICS/SCADA, CIIP:
• CPS, Protocols, supply chain, dependencies
– Threats from IoT:
• DDoS, cascade effects
• Vulnerabilities
– Resilience of IoT platforms:
• Access control, identification, back doors, malware…
• Solutions
– Response to cyber-attacks:
• Recovery, Restore
• Conclusions
AWARENESS
3
4
Threats to IoT: Who?
• Script kiddies: no money interest, no professionals,
repeated errors.
• GrayHats: shared criminal and not criminal activities.
SPAMmers spread any kind of emails
• Blackhats: experts, toolkits, business models, unique and
novel,
• States Sponsored: economic and security interest.
Technical
• Hacktivists
• Leaks: criminals that have patience and technical
expertise. Wait years to rob the information they want.
Apply to industry and government. Regional business.
5
Threats to IoT: Why?
• Script kiddies: Show their skills and our weakiness.
• GrayHats: 3rd part services: Politics, socials, cultural
• Blackhats: Economics
• States Sponsored: Steal estrategic Information
• Hacktivists: same as above
• Leaks: criminals that have patience and technical
expertise, wait years to rob the information they
want. Apply to industry and government. Regional
business
6
7
Tendencies: long term  Cyber-war
• Cyber-guns: Hacking Team
• Department of Defense Concludes Three-Weeks of Cyber War Games
http://bit.ly/1uLsdsS http://bit.ly/1eGaGPA
• Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says -
SC Magazine http://ow.ly/PmQyO
• 3 dangerous habits that make companies less #cyber secure:
http://lmt.co/1Ga2v7w #GartnerSEC (by @LM_AngelaHeise)
• How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber
Attacks. by @jcmason http://entm.ag/1Af8Cbu via @Entrepreneur
• Cibercrimen: https://www.amazon.es/CIBERCRIMEN-Manel-Medina-
ebook/dp/B010GJOUDM
8
Threats to IoT: What?
• CIIP: IoT/ICS/SCADA:
– CPS,
– Protocols,
– supply chain,
– Dependencies of IoT from service providers
• Defcon conf.: hacking an electronic wheelchair or
bluetooth lock from a quarter-mile away
• Hack a real car
• Intercept flying airplane communications
9
Threats to IoT: What?
10
Threats FROM IoT: What?
11
• 6.8B devices
• 20 B by 2020
• 50 families
• 3 attacks in
3 weeks
• Just PoC
Threats FROM IoT: What?
• DDoS:
– Authentication
– Malware
– Protocol bugs
• Cascade effects
– supply chain,
– Dependencies of CI from IoT
12
VULNERABILITIES
13
Who do we trust?
14
• 90% of incidents start from inside the
organization
– Spear-phishing
– Ransomware
– Lack of skills or capabilities
– Lack of awareness
– Human Errors
• Internal Audit: Readiness
So, what? Cybersecurity life cycle
15
• Plan:
– Goals, Strategy, Timeframe, Resources
• Do:
– Assets, Threats & Vulnerability identification
– Risk Analysis (evaluation), Management
• Check
– Measure: people, cybersecurity tools,
– Monitor: network, CPS, behaviour
• Act:
– Response, Recovery, Restore, (minimise impact)
– Learn, Report (internal & external), Review/update
External support
16
• CISO
– Business aware
• External providers
– Learn from others’ errors
– Intelligence information
– New Attack patterns
SOLUTIONS TO CYBER ATTACKS
17
Cooperation & coordination Plan
• Risk & impact evaluation & analysis
• Personnel roles & responsibilities
• Cooperation opportunities & covert channels
• Plan ciber-exercises & training.
• Document lessons learnt
• Schedule plan’s updates.
18
Risk Management: Resilience
• Impact on Organization’s mission: Business
continuity
– Identify areas of risk
– Incident response capabilities
• Risk tolerance: Regulatory environment
• Budget: ROSI, implementation Phases, priorities
• Policy adoption & Procedures implementation.
– Early Detection
– Quick response
– Identification & selection of controls
19
Risk Response Strategy
• Probability:
– Avoidance,
– Perimeter,
– Training,
– Readiness,
– Resilience.
• Impact:
– Detection,
– Mitigation,
– Response,
– Recovery
• Risk Acceptance &
Transfer
20
Resilience Assessment Summary
• Where: Available / Collectable data
• What: Scope: Scenario (set of assets)
• How: Time-frame: rigorousness, meaningful.
• Aim: Co. Social responsibility: risk culture
• Who: Compliance & sectorial regulation
• When: Changing environment: external
(hacktivism), internal (infrastructure, asset values),
growth, customers sensitivity
22
Roadmap 2018
• Cybersecurity culture: raise awareness
• Risk measurement and analysis
• Protection: risk reduction and impacts
mitigation
• Detection and management of events
• Collaboration and coordination
• Research, Development and Innovation
• Continuing and efficient training and education
23
Short-term corporative strategy
• Cyber- Responsibility:
– Cyber-risk
– Cyber-trust
– Cyber-insurance
– Hiring of cyber-security profiles
• 3 levels education
– Corporate management
– Cybersecurity management and operations
– ICT Operations
– Final end-user
24
Education and awareness
Continuous training TITULACIÓN Oficial
LE Operations and maintenance (on-line, in-house) Continuous education (PsG)
SME Operations (capsule, education module) Experts (MsC)
25
Shared (or not) responsibilities:
- Data Protection Officer
- Chief Information Security Officer
- Intelligence Officer
- Information Systems Auditor
- Computer Sec. Incident Coordinator
- Data breach communication advisor
- Operation…
- Training…
CORPORATE PROTECTION
TOOLS & STRATEGIES
26
5 essential cybersecurity measures
• Perimeter: Firewall & gateways
• Safe Configuration
• Access Control
• Anti-malware Protection
• Patch & updates management
Best practices in IoT cybersecurity
• Back-up data and configuration choices
• Protect programs and data with e-Signature or
hash
• Documents Mid-Long term Archive
• Anti-DDoS
• User and devices Access Control
• Access & operations: logs & warnings
• User & TIC staff training & awareness
29
Recommendations
• Review network infrastructure and ICT policy
• Foster internal capacity building
• Take any guidelines or collective recommendation
• External consultants to identify planning
• Establish secure communication channels with
team(s) of incident coordination
• Establish cooperation agreements cyber security
management and incident response
• Get some certification / audit
external help: Cyber-guards
• Capability to
– mitigate / recover
• Private vs. Public:
– Incibe
– CERT_SI
– CESIcat
– CERT.EU
– …
– esCERT.UPC
30
European
CERT (?)
n/g CERT
Sectorial
CERT
Industry
n/g CERT
Sectorial
CERT
SME
n/g CERT
CIIP CERT
CI
ENISA
 user ->CPD -> SOC -> CSIRT -> CERT
Final remarks
• Legal requirements:
– Risk analysis
– Incident reporting
• Self-protection:
– internal controls
– Use safe devices
– Update software and passwords
• Provide evidences of:
– capabilities
– good practices
– External audits
• Subcontract external experts
31
PREGUNTAS (& RESPUESTAS)
Muchas gracias
por la atención!
Prof. Manel Medina
Coordinador científico de APWG.eu
Fundador esCERT-inLab-UPC
Director Máster Ciberseguridad – UPC-Talent
manel@apwg.eu – medina@escert.upc.edu
605 284 388

More Related Content

What's hot (20)

PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
PPT
Network Security
MAJU
 
PPTX
Sql injection - security testing
Napendra Singh
 
PPTX
Ethical Hacking
Tharindu Kalubowila
 
PDF
Cyber Security Vulnerabilities
Siemplify
 
PDF
End-User Security Awareness
Surya Bathulapalli
 
PPTX
Cyber security
Sabir Raja
 
PDF
Information Security Awareness Training
Randy Bowman
 
PPT
Introduction Network security
IGZ Software house
 
PPTX
Ethical hacking
Goutham Shetty
 
PPTX
Web application security
Kapil Sharma
 
PDF
What is Social Engineering? An illustrated presentation.
Pratum
 
DOCX
Ethical Hacking
Sanu Subham
 
PPTX
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
PPTX
Cross Site Request Forgery (CSRF) Scripting Explained
Valency Networks
 
PPSX
Security Awareness Training
William Mann
 
PPTX
Cybersecurity Awareness
JoshuaWisniewski3
 
PPTX
Social engineering presentation
pooja_doshi
 
PPTX
Threats of Public Wi-Fi
The TNS Group
 
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Network Security
MAJU
 
Sql injection - security testing
Napendra Singh
 
Ethical Hacking
Tharindu Kalubowila
 
Cyber Security Vulnerabilities
Siemplify
 
End-User Security Awareness
Surya Bathulapalli
 
Cyber security
Sabir Raja
 
Information Security Awareness Training
Randy Bowman
 
Introduction Network security
IGZ Software house
 
Ethical hacking
Goutham Shetty
 
Web application security
Kapil Sharma
 
What is Social Engineering? An illustrated presentation.
Pratum
 
Ethical Hacking
Sanu Subham
 
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
Cross Site Request Forgery (CSRF) Scripting Explained
Valency Networks
 
Security Awareness Training
William Mann
 
Cybersecurity Awareness
JoshuaWisniewski3
 
Social engineering presentation
pooja_doshi
 
Threats of Public Wi-Fi
The TNS Group
 

Viewers also liked (20)

PDF
Cyber Security Awareness
Ramiro Cid
 
PPTX
Principals of IoT security
IoT613
 
ODP
Cyber security awareness
Jason Murray
 
PPTX
Cybercrime.ppt
Aeman Khan
 
PPTX
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 
PDF
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 
PDF
Scaling IoT Security
Bill Harpley
 
PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
ODP
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Mauro Risonho de Paula Assumpcao
 
PPTX
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
PPT
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
PPT
General Awareness On Cyber Security
Dominic Rajesh
 
PPT
cyber terrorism
Accenture
 
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
PDF
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
PPT
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
PPTX
Cyber security presentation
Bijay Bhandari
 
PDF
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
PPTX
Cyber crime and security ppt
Lipsita Behera
 
Cyber Security Awareness
Ramiro Cid
 
Principals of IoT security
IoT613
 
Cyber security awareness
Jason Murray
 
Cybercrime.ppt
Aeman Khan
 
IoT based on cyber security in defense industry and critical infrastructures
UITSEC Teknoloji A.Ş.
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Capgemini
 
Scaling IoT Security
Bill Harpley
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Dataconomy Media
 
Owasp IoT top 10 + IoTGOAT Cyber Security Meeting Brazil 3rd 2015
Mauro Risonho de Paula Assumpcao
 
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
ClicTest
 
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
General Awareness On Cyber Security
Dominic Rajesh
 
cyber terrorism
Accenture
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
CA Technologies
 
Cyber Wars And Cyber Terrorism
Ganesh DNP
 
Cyber security presentation
Bijay Bhandari
 
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Cyber crime and security ppt
Lipsita Behera
 
Ad

Similar to Cyber Security - awareness, vulnerabilities and solutions (20)

PPTX
The Future of Cybersecurity - October 2015
Security Innovation
 
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
PPT
Lecture 4 presentation of cyber security
jitendrachettri894
 
PPTX
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
 
PDF
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
TelecomValley
 
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
PPTX
Lecture 3 Country Specific Strategy.pptx
jitendrachettri894
 
PPTX
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
PPTX
Cyber threat enterprise leadership required march 2014
Peter ODell
 
PPTX
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
 
PDF
2015 Cyber Security
Allen Zhang
 
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
PPTX
Cybersecurity in Singapore: Trends, Careers & Training Path
AkhilKumar529314
 
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
Liming Zhu
 
PPTX
Cyber risks in supply chains
Aparajita Banerjee
 
PPTX
Cyber Security in the market place: HP CTO Day
Symantec
 
PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
PDF
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
PPTX
CyberSecurity_Presefxgdrfffntation_final.pptx
ManishYadav243888
 
PPTX
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
SurfWatch Labs
 
The Future of Cybersecurity - October 2015
Security Innovation
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
Lecture 4 presentation of cyber security
jitendrachettri894
 
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
TelecomValley
 
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
Lecture 3 Country Specific Strategy.pptx
jitendrachettri894
 
How to Get into Cybersecurity 2024 Action Plan.pptx
AkhilKumar529314
 
Cyber threat enterprise leadership required march 2014
Peter ODell
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
 
2015 Cyber Security
Allen Zhang
 
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Cybersecurity in Singapore: Trends, Careers & Training Path
AkhilKumar529314
 
Responsible AI & Cybersecurity: A tale of two technology risks
Liming Zhu
 
Cyber risks in supply chains
Aparajita Banerjee
 
Cyber Security in the market place: HP CTO Day
Symantec
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
CyberSecurity_Presefxgdrfffntation_final.pptx
ManishYadav243888
 
Credit Unions Caught in the Cybercrime Cross Hairs: How to Get Ahead of the C...
SurfWatch Labs
 
Ad

More from inLabFIB (20)

PDF
Modelling and Simulation for Industry 4.0 SUCCESS CASES
inLabFIB
 
PDF
inLab FIB & Industry 4.0
inLabFIB
 
PDF
ALTAIR-SIGVI: Descobreix les teves vulnerabilitats
inLabFIB
 
PPTX
Simulació Social per l'anàlisi demogràfic
inLabFIB
 
PPTX
Smart Mobility
inLabFIB
 
PPTX
Learning Analytics
inLabFIB
 
PPTX
inLab
inLabFIB
 
PPTX
inLab FIB presentation MWC2014
inLabFIB
 
PDF
inLab FIB MeteorJS workshop by uLab UPC - Telefonica I+D
inLabFIB
 
PPTX
somUPC: Integració de les intranets de la UPC
inLabFIB
 
PPTX
UPCnet uTalk : Eina de missatgeria corporativa amb fil social
inLabFIB
 
PPTX
Sistemes GIS aplicats a l’àmbit de la mobilitat, l’esport i la salut
inLabFIB
 
PPTX
inLab FIB Presentation at ICT2013EU
inLabFIB
 
PDF
Artículo sobre modelos para los sistemas de logística urbana
inLabFIB
 
PPTX
Modelos para sistemas de logística urbana: retos y oportunidades
inLabFIB
 
PPTX
Projectes inLab en l'àrea de les comunicacions mòbils
inLabFIB
 
PPTX
Entorns segurs especials per als laboratoris d'informàtica a la FIB
inLabFIB
 
PPTX
Nous entorns de formació per als enginyers informàtics del futur: Aplicacions...
inLabFIB
 
PPTX
Projecte per a l'ús de dispositius de resposta interactiva a les escoles del ...
inLabFIB
 
PPTX
Green cities
inLabFIB
 
Modelling and Simulation for Industry 4.0 SUCCESS CASES
inLabFIB
 
inLab FIB & Industry 4.0
inLabFIB
 
ALTAIR-SIGVI: Descobreix les teves vulnerabilitats
inLabFIB
 
Simulació Social per l'anàlisi demogràfic
inLabFIB
 
Smart Mobility
inLabFIB
 
Learning Analytics
inLabFIB
 
inLab
inLabFIB
 
inLab FIB presentation MWC2014
inLabFIB
 
inLab FIB MeteorJS workshop by uLab UPC - Telefonica I+D
inLabFIB
 
somUPC: Integració de les intranets de la UPC
inLabFIB
 
UPCnet uTalk : Eina de missatgeria corporativa amb fil social
inLabFIB
 
Sistemes GIS aplicats a l’àmbit de la mobilitat, l’esport i la salut
inLabFIB
 
inLab FIB Presentation at ICT2013EU
inLabFIB
 
Artículo sobre modelos para los sistemas de logística urbana
inLabFIB
 
Modelos para sistemas de logística urbana: retos y oportunidades
inLabFIB
 
Projectes inLab en l'àrea de les comunicacions mòbils
inLabFIB
 
Entorns segurs especials per als laboratoris d'informàtica a la FIB
inLabFIB
 
Nous entorns de formació per als enginyers informàtics del futur: Aplicacions...
inLabFIB
 
Projecte per a l'ús de dispositius de resposta interactiva a les escoles del ...
inLabFIB
 
Green cities
inLabFIB
 

Recently uploaded (20)

PPTX
Fluid statistics and Numerical on pascal law
Ravindra Kolhe
 
PPTX
Smart_Cities_IoT_Integration_Presentation.pptx
YashBhisade1
 
PDF
NOISE CONTROL ppt - SHRESTH SUDHIR KOKNE
SHRESTHKOKNE
 
PPTX
Dolphin_Conservation_AI_txhasvssbxbanvgdghng
jeeaspirant2026fr
 
PDF
13th International Conference of Networks and Communications (NC 2025)
JohannesPaulides
 
PPTX
Sensor IC System Design Using COMSOL Multiphysics 2025-July.pptx
James D.B. Wang, PhD
 
PDF
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
PPTX
Cyclic_Redundancy_Check_Presentation.pptx
alhjranyblalhmwdbdal
 
PPTX
Data_Analytics_Presentation_By_Malik_Azanish_Asghar.pptx
azanishmalik1
 
PPTX
Abstract Data Types (ADTs) in Data Structures
mwaslam2303
 
PPTX
File Strucutres and Access in Data Structures
mwaslam2303
 
PDF
SMART HOME AUTOMATION PPT BY - SHRESTH SUDHIR KOKNE
SHRESTHKOKNE
 
PDF
MRI Tool Kit E2I0500BC Plus Presentation
Ing. Ph. J. Daum GmbH & Co. KG
 
PPTX
UNIT III CONTROL OF PARTICULATE CONTAMINANTS
sundharamm
 
PDF
IEEE EMBC 2025 「Improving electrolaryngeal speech enhancement via a represent...
NU_I_TODALAB
 
PPTX
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
PPTX
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
jayarao21
 
PPTX
ENSA_Module_8.pptx_nice_ipsec_presentation
RanaMukherjee24
 
PDF
LEARNING CROSS-LINGUAL WORD EMBEDDINGS WITH UNIVERSAL CONCEPTS
kjim477n
 
PPT
Hazard identification and risk assessment PPT
SUNILARORA51
 
Fluid statistics and Numerical on pascal law
Ravindra Kolhe
 
Smart_Cities_IoT_Integration_Presentation.pptx
YashBhisade1
 
NOISE CONTROL ppt - SHRESTH SUDHIR KOKNE
SHRESTHKOKNE
 
Dolphin_Conservation_AI_txhasvssbxbanvgdghng
jeeaspirant2026fr
 
13th International Conference of Networks and Communications (NC 2025)
JohannesPaulides
 
Sensor IC System Design Using COMSOL Multiphysics 2025-July.pptx
James D.B. Wang, PhD
 
ADVXAI IN MALWARE ANALYSIS FRAMEWORK: BALANCING EXPLAINABILITY WITH SECURITY
ijscai
 
Cyclic_Redundancy_Check_Presentation.pptx
alhjranyblalhmwdbdal
 
Data_Analytics_Presentation_By_Malik_Azanish_Asghar.pptx
azanishmalik1
 
Abstract Data Types (ADTs) in Data Structures
mwaslam2303
 
File Strucutres and Access in Data Structures
mwaslam2303
 
SMART HOME AUTOMATION PPT BY - SHRESTH SUDHIR KOKNE
SHRESTHKOKNE
 
MRI Tool Kit E2I0500BC Plus Presentation
Ing. Ph. J. Daum GmbH & Co. KG
 
UNIT III CONTROL OF PARTICULATE CONTAMINANTS
sundharamm
 
IEEE EMBC 2025 「Improving electrolaryngeal speech enhancement via a represent...
NU_I_TODALAB
 
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
jayarao21
 
ENSA_Module_8.pptx_nice_ipsec_presentation
RanaMukherjee24
 
LEARNING CROSS-LINGUAL WORD EMBEDDINGS WITH UNIVERSAL CONCEPTS
kjim477n
 
Hazard identification and risk assessment PPT
SUNILARORA51
 

Cyber Security - awareness, vulnerabilities and solutions

  • 1. Unifying the Global Response to Cybercrime Cyber Security – awareness, vulnerabilities and solutions Prof. Manel Medina Scientific Coordinator of APWG.eu Founder of esCERT-inLab-UPC Director MsC Cibersecurity – UPC-Talent [email protected][email protected]
  • 2. Content 2 • Awareness – Threats to IoT/ICS/SCADA, CIIP: • CPS, Protocols, supply chain, dependencies – Threats from IoT: • DDoS, cascade effects • Vulnerabilities – Resilience of IoT platforms: • Access control, identification, back doors, malware… • Solutions – Response to cyber-attacks: • Recovery, Restore • Conclusions
  • 4. 4
  • 5. Threats to IoT: Who? • Script kiddies: no money interest, no professionals, repeated errors. • GrayHats: shared criminal and not criminal activities. SPAMmers spread any kind of emails • Blackhats: experts, toolkits, business models, unique and novel, • States Sponsored: economic and security interest. Technical • Hacktivists • Leaks: criminals that have patience and technical expertise. Wait years to rob the information they want. Apply to industry and government. Regional business. 5
  • 6. Threats to IoT: Why? • Script kiddies: Show their skills and our weakiness. • GrayHats: 3rd part services: Politics, socials, cultural • Blackhats: Economics • States Sponsored: Steal estrategic Information • Hacktivists: same as above • Leaks: criminals that have patience and technical expertise, wait years to rob the information they want. Apply to industry and government. Regional business 6
  • 7. 7
  • 8. Tendencies: long term  Cyber-war • Cyber-guns: Hacking Team • Department of Defense Concludes Three-Weeks of Cyber War Games http://bit.ly/1uLsdsS http://bit.ly/1eGaGPA • Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says - SC Magazine http://ow.ly/PmQyO • 3 dangerous habits that make companies less #cyber secure: http://lmt.co/1Ga2v7w #GartnerSEC (by @LM_AngelaHeise) • How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber Attacks. by @jcmason http://entm.ag/1Af8Cbu via @Entrepreneur • Cibercrimen: https://www.amazon.es/CIBERCRIMEN-Manel-Medina- ebook/dp/B010GJOUDM 8
  • 9. Threats to IoT: What? • CIIP: IoT/ICS/SCADA: – CPS, – Protocols, – supply chain, – Dependencies of IoT from service providers • Defcon conf.: hacking an electronic wheelchair or bluetooth lock from a quarter-mile away • Hack a real car • Intercept flying airplane communications 9
  • 10. Threats to IoT: What? 10
  • 11. Threats FROM IoT: What? 11 • 6.8B devices • 20 B by 2020 • 50 families • 3 attacks in 3 weeks • Just PoC
  • 12. Threats FROM IoT: What? • DDoS: – Authentication – Malware – Protocol bugs • Cascade effects – supply chain, – Dependencies of CI from IoT 12
  • 14. Who do we trust? 14 • 90% of incidents start from inside the organization – Spear-phishing – Ransomware – Lack of skills or capabilities – Lack of awareness – Human Errors • Internal Audit: Readiness
  • 15. So, what? Cybersecurity life cycle 15 • Plan: – Goals, Strategy, Timeframe, Resources • Do: – Assets, Threats & Vulnerability identification – Risk Analysis (evaluation), Management • Check – Measure: people, cybersecurity tools, – Monitor: network, CPS, behaviour • Act: – Response, Recovery, Restore, (minimise impact) – Learn, Report (internal & external), Review/update
  • 16. External support 16 • CISO – Business aware • External providers – Learn from others’ errors – Intelligence information – New Attack patterns
  • 17. SOLUTIONS TO CYBER ATTACKS 17
  • 18. Cooperation & coordination Plan • Risk & impact evaluation & analysis • Personnel roles & responsibilities • Cooperation opportunities & covert channels • Plan ciber-exercises & training. • Document lessons learnt • Schedule plan’s updates. 18
  • 19. Risk Management: Resilience • Impact on Organization’s mission: Business continuity – Identify areas of risk – Incident response capabilities • Risk tolerance: Regulatory environment • Budget: ROSI, implementation Phases, priorities • Policy adoption & Procedures implementation. – Early Detection – Quick response – Identification & selection of controls 19
  • 20. Risk Response Strategy • Probability: – Avoidance, – Perimeter, – Training, – Readiness, – Resilience. • Impact: – Detection, – Mitigation, – Response, – Recovery • Risk Acceptance & Transfer 20
  • 21. Resilience Assessment Summary • Where: Available / Collectable data • What: Scope: Scenario (set of assets) • How: Time-frame: rigorousness, meaningful. • Aim: Co. Social responsibility: risk culture • Who: Compliance & sectorial regulation • When: Changing environment: external (hacktivism), internal (infrastructure, asset values), growth, customers sensitivity 22
  • 22. Roadmap 2018 • Cybersecurity culture: raise awareness • Risk measurement and analysis • Protection: risk reduction and impacts mitigation • Detection and management of events • Collaboration and coordination • Research, Development and Innovation • Continuing and efficient training and education 23
  • 23. Short-term corporative strategy • Cyber- Responsibility: – Cyber-risk – Cyber-trust – Cyber-insurance – Hiring of cyber-security profiles • 3 levels education – Corporate management – Cybersecurity management and operations – ICT Operations – Final end-user 24
  • 24. Education and awareness Continuous training TITULACIÓN Oficial LE Operations and maintenance (on-line, in-house) Continuous education (PsG) SME Operations (capsule, education module) Experts (MsC) 25 Shared (or not) responsibilities: - Data Protection Officer - Chief Information Security Officer - Intelligence Officer - Information Systems Auditor - Computer Sec. Incident Coordinator - Data breach communication advisor - Operation… - Training…
  • 26. 5 essential cybersecurity measures • Perimeter: Firewall & gateways • Safe Configuration • Access Control • Anti-malware Protection • Patch & updates management
  • 27. Best practices in IoT cybersecurity • Back-up data and configuration choices • Protect programs and data with e-Signature or hash • Documents Mid-Long term Archive • Anti-DDoS • User and devices Access Control • Access & operations: logs & warnings • User & TIC staff training & awareness
  • 28. 29 Recommendations • Review network infrastructure and ICT policy • Foster internal capacity building • Take any guidelines or collective recommendation • External consultants to identify planning • Establish secure communication channels with team(s) of incident coordination • Establish cooperation agreements cyber security management and incident response • Get some certification / audit
  • 29. external help: Cyber-guards • Capability to – mitigate / recover • Private vs. Public: – Incibe – CERT_SI – CESIcat – CERT.EU – … – esCERT.UPC 30 European CERT (?) n/g CERT Sectorial CERT Industry n/g CERT Sectorial CERT SME n/g CERT CIIP CERT CI ENISA  user ->CPD -> SOC -> CSIRT -> CERT
  • 30. Final remarks • Legal requirements: – Risk analysis – Incident reporting • Self-protection: – internal controls – Use safe devices – Update software and passwords • Provide evidences of: – capabilities – good practices – External audits • Subcontract external experts 31
  • 31. PREGUNTAS (& RESPUESTAS) Muchas gracias por la atención! Prof. Manel Medina Coordinador científico de APWG.eu Fundador esCERT-inLab-UPC Director Máster Ciberseguridad – UPC-Talent [email protected][email protected] 605 284 388