SlideShare a Scribd company logo
CRITICAL
INFRASTRUCTURE
AND CYBER THREAT
SAFER CITIES. THRIVING COMMUNITIES.
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
Critical Infrastructure sectors
have become prime targets
for cyber criminals due to
their vitality to a nation’s
security and stability.
16 CRITICAL
INFRASTRUCTURE SECTORS
Department of Homeland Security classified the top 16 sectors at risk to cyber attacks
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
16 CRITICAL
INFRASTRUCTURE SECTORS
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
1. CHEMICAL
2. COMMERCIAL FACILITIES
3. COMMUNICATIONS SECTOR
4. CRITICAL MANUFACTURING
5. DAMS
6. DEFENSE INDUSTRIAL BASE
7. EMERGENCY SERVICES
8. ENERGY
9. FINANCIAL SERVICES
10. FOOD AND AGRICULTURE
11. GOVERNMENT FACILITIES
12. HEALTHCARE AND PUBLIC HEALTH
13. INFORMATION TECHNOLOGY
14. NUCLEAR REACTORS, MATERIALS, AND WASTE
15. TRANSPORTATION SYSTEMS
16. WATER AND WASTEWATER
DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT
RISK TO CYBER ATTACKS
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
INTERCONNECTED
SYSTEMS
• The continued increase of
interconnected systems and
devices provide cyber criminals
limitless attack vectors. 25 billion
networked devices are projected
by 2020.
Source: ITU’s Trends in Telecommunication Reform 2015,
http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
MALWARE OUTBREAK
• 1 million new malware instances released every day
• Ransomware attacks soared 113% in prior year
• Increasing number of zero day attacks
Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/
2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
UNAUTHORIZED CONNECTIONS
CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST
Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf
*Risk Ratio of Spear-Phishing Attacks by Industry
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
INDUSTRY RISK RATIO* INDUSTRY RISK RATIO”
Mining
Wholesale
Manufacturing
Transportation,
Communications,
Electric, Gas &
Sanitary Services
Public Administration
(Government)
Finance, Insurance
& Real Estate
44%
34%
33%
29%
21%
21%
1 in 3.41 in 2.3
1 in 2.9
1 in 3.0
1 in 3.4
1 in 4.8
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
SOURCE:, InformationWeek's 2013 enterprise security survey,
http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic-
Security-Survey.html
BRING YOUR
OWN DEVICE
(BYOD)
• 45% of organizations have had
a mobile device containing
enterprise data reported missing
• 11% have experienced a data
breach requiring public disclosure
SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft-
subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html
IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras-
installed-globally-in-2014
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
FIXED CAMERA
• More than 210 million CCTV
cameras worldwide
• 73,011 locations with unsecured
cameras in 256 countries
INSIDER THREAT
• 55% of threats come from insider abuse or misuse
• 32% of organizations report insider crimes are more
costly or damaging than incidents caused by outsiders
SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
Motorola Solutions has in depth experience, expertise and
robust capability to assist with today's cyber risk challenges.
We take a comprehensive approach to help customers
• Evaluate Environment
• Assess Threats
• Manage Risk
Unique to each customer's operational setting.
Visit us at motorolasolutions.com/cybersecurity
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
THANK YOU!

More Related Content

Critical Infrastructure and Cyber Threat

  • 1. CRITICAL INFRASTRUCTURE AND CYBER THREAT SAFER CITIES. THRIVING COMMUNITIES.
  • 2. CRITICAL INFRASTRUCTURE AND CYBER THREAT Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation’s security and stability.
  • 3. 16 CRITICAL INFRASTRUCTURE SECTORS Department of Homeland Security classified the top 16 sectors at risk to cyber attacks Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors CRITICAL INFRASTRUCTURE AND CYBER THREAT 16 CRITICAL INFRASTRUCTURE SECTORS Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors 1. CHEMICAL 2. COMMERCIAL FACILITIES 3. COMMUNICATIONS SECTOR 4. CRITICAL MANUFACTURING 5. DAMS 6. DEFENSE INDUSTRIAL BASE 7. EMERGENCY SERVICES 8. ENERGY 9. FINANCIAL SERVICES 10. FOOD AND AGRICULTURE 11. GOVERNMENT FACILITIES 12. HEALTHCARE AND PUBLIC HEALTH 13. INFORMATION TECHNOLOGY 14. NUCLEAR REACTORS, MATERIALS, AND WASTE 15. TRANSPORTATION SYSTEMS 16. WATER AND WASTEWATER DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT RISK TO CYBER ATTACKS
  • 4. CRITICAL INFRASTRUCTURE AND CYBER THREAT INTERCONNECTED SYSTEMS • The continued increase of interconnected systems and devices provide cyber criminals limitless attack vectors. 25 billion networked devices are projected by 2020. Source: ITU’s Trends in Telecommunication Reform 2015, http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf
  • 5. CRITICAL INFRASTRUCTURE AND CYBER THREAT MALWARE OUTBREAK • 1 million new malware instances released every day • Ransomware attacks soared 113% in prior year • Increasing number of zero day attacks Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/ 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
  • 6. UNAUTHORIZED CONNECTIONS CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf *Risk Ratio of Spear-Phishing Attacks by Industry CRITICAL INFRASTRUCTURE AND CYBER THREAT INDUSTRY RISK RATIO* INDUSTRY RISK RATIO” Mining Wholesale Manufacturing Transportation, Communications, Electric, Gas & Sanitary Services Public Administration (Government) Finance, Insurance & Real Estate 44% 34% 33% 29% 21% 21% 1 in 3.41 in 2.3 1 in 2.9 1 in 3.0 1 in 3.4 1 in 4.8
  • 7. CRITICAL INFRASTRUCTURE AND CYBER THREAT SOURCE:, InformationWeek's 2013 enterprise security survey, http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic- Security-Survey.html BRING YOUR OWN DEVICE (BYOD) • 45% of organizations have had a mobile device containing enterprise data reported missing • 11% have experienced a data breach requiring public disclosure
  • 8. SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft- subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras- installed-globally-in-2014 CRITICAL INFRASTRUCTURE AND CYBER THREAT FIXED CAMERA • More than 210 million CCTV cameras worldwide • 73,011 locations with unsecured cameras in 256 countries
  • 9. INSIDER THREAT • 55% of threats come from insider abuse or misuse • 32% of organizations report insider crimes are more costly or damaging than incidents caused by outsiders SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf CRITICAL INFRASTRUCTURE AND CYBER THREAT
  • 10. Motorola Solutions has in depth experience, expertise and robust capability to assist with today's cyber risk challenges. We take a comprehensive approach to help customers • Evaluate Environment • Assess Threats • Manage Risk Unique to each customer's operational setting. Visit us at motorolasolutions.com/cybersecurity CRITICAL INFRASTRUCTURE AND CYBER THREAT