SlideShare a Scribd company logo
 LEX INFORMATICA CONFERENCE JULY 2009 PREVENTION IS BETTER THAN PROSECUTION:  DEEPENING THE DEFENCE AGAINST CYBER CRIME Adv Jacqueline Fick Risk and Compliance Management PwC Advisory Southern Africa
Contents Introduction and Approach Information Assurance Defence in Depth Strategy Conclusion Questions
Introduction and Approach President in State of the Nation Address specifically referred to an increased effort to combat cyber crime and identity theft Increase in cyber crime in both private and public sector  Criminals want information Law enforcement hampered in efforts to catch criminals Shift in paradigm:  Re-active v pro-active Prevention is better than Prosecution Devoting time and resources to implement strategies that prevent cyber crime  Information Assurance and Defence in Depth strategy
Information Assurance Definition Objective of Information Assurance Five pillars of Information Assurance

Recommended for you

Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program

This document presents a business case for establishing an information security program. It outlines the background, value, scope, and components of the program. The program aims to safeguard corporate information assets, establish security standards, comply with regulations, and align IT services with business needs. It involves categorizing data, determining risk appetite, analyzing business impacts, developing a security strategy and plans, and implementing controls. The goal is to effectively manage risks and threats, drive process maturity over time, and provide continuous improvements.

Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy

This document discusses information security policies and provides an overview of key topics: 1) It outlines a framework for designing security policies including commitment, risk assessment, and risk mitigation. 2) Risk assessment involves analyzing business, physical, technological, and human risks while risk mitigation uses administrative, physical, and technical controls. 3) The document also provides an example security policy for email at SandZ Technologies and discusses implementing policies through training, awareness programs, and audits.

informationsystemspolicy
Event security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukEvent security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.uk

This document provides guidance on organizing security functions within an organization. It discusses establishing security documentation, organizing the security function, and information security practices. The key points are: 1. Security documentation is organized into three tiers - policy, operational standards, and technical documentation - to provide requirements and guidance. Responsibilities for developing and approving documentation are outlined. 2. The security function should be organized to provide overall planning, coordination, and evaluation of physical, personnel, and IT security. A departmental security officer should coordinate the security program. 3. Information security practices include classifying information, designating personal or sensitive data, and applying minimum safeguards based on the potential harm from compromise or disclosure.

security services
Information Assurance Definition The practice of managing information-related risks (Wikipedia). Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.  This includes providing for restoration of information systems by incorporating protection, detection and reaction capabilities (US DoD). Umbrella concept bringing together issues of Information Security and Dependability. Includes other corporate governance issues such as privacy, audits, business continuity and disaster recovery. Information Assurance
Objective The objective of Information Assurance is to minimise the risk that information systems and information stored, transmitted and processed thereon is vulnerable to threats. If an attack does take place, the damage it might cause will be minimised. It also provides for method to recover from attack as efficiently and effectively as possible.  Information Assurance focuses on: Access controls Individual Accountability Audit trails Information Assurance
Five pillars of Information Assurance Information Security based on CIA triad Information Assurance:  CIA triad, authenticity and non-repudiation NSA:  application of five pillars should be based on protect, detect and react paradigm Electronic Communications and Transactions Act, No. 25 of 2002 Incorporates principles of five pillars Criminalises attacks Information Assurance
Five pillars of Information Assurance Information Assurance

Recommended for you

Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements

The document discusses several key aspects of developing an effective business information security policy, including: 1) Upholding the principles of confidentiality, integrity, and availability. 2) Applying the principle of least privilege and data provenance. 3) Creating a policy that is easily understood, reviewed over time, and supports proper risk management and regulatory compliance. 4) Evaluating how the policy may impact other security programs and processes like risk assessment, auditing, training, and culture.

Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level

Information security is often misunderstood, undervalued and often tackled as an afterthought. This presentation was given in 2014 during an ISACA educational event.

information technologyinformation security
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide

This document provides an overview and introduction to Microsoft's Security Risk Management Guide. It discusses the challenges of managing security risks in today's environment and introduces a four-phase security risk management process developed by Microsoft. The process uses both qualitative and quantitative risk assessment methods to identify, analyze, and prioritize security risks. It then provides frameworks for making risk management decisions and measuring the effectiveness of security controls. The guide is intended to help organizations of all sizes establish a formal security risk management program to proactively manage risks in a cost-effective manner.

Defence in Depth Strategy Introduction Focus areas Core principles Implementing strategy Layered defence approach Maintaining strategy
Definition Strategy that can be implemented to achieve Information Assurance in today’s highly networked environments (NSA).  Also defined as systematic security management of people, processes and technologies in a holistic risk-management approach (TISN): “Best practices” strategy in that it relies on the intelligent application of techniques and technologies. Based on balancing protection capability and cost, performance and operational considerations. Delivers: Effective risk-based decisions; Enhanced operational effectiveness; Reduced overall cost and risk;  and Improved information security. Defence in Depth Strategy
Threats To protect an organisations’ information and information systems against cyber attacks, it is necessary to determine who the enemy is, why they would want to launch an attack and how they would attack the organisation.  Threats can be internal and external and can be as a result of intentional and unintentional actions.   Defence in Depth Strategy Faster networks More storage in smaller devices Technological convergence Increasingly mobile workforce Hackers Organised crime Changes in regulatory framework TECHNOLOGICAL INNOVATION EXTERNAL THREATS Business partners with poor data    security Physical access to shared systems Misunderstanding of allowed access Competitive environment Disgruntled employees Financially troubled employees Corporate espionage Uneducated/uninformed users TRADING PARTNERS PEOPLE
Focus areas Achieving Information Assurance requires a balanced focus on: People Processes Technology Governance Defence in Depth Strategy

Recommended for you

Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)

This document discusses the information security life cycle, which includes 6 steps: 1) security planning, 2) security analysis, 3) security design, 4) security implementation, 5) security review, and 6) continual security. It focuses on the first two steps of security planning and security analysis. For security planning, it covers asset definition, security policy, security objectives, and security scope. For security analysis, it describes the key activities of asset analysis, impact analysis, threat analysis, exposure analysis, vulnerability analysis, analyzing existing security controls, and risk analysis to define security requirements.

informationinformation securityinformation security management
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016

Cybersecurity risks must be addressed at the executive level through an enterprise-wide risk management framework. While cybersecurity has traditionally been viewed as a technical issue managed by IT, it is critical that top management be fully engaged in cybersecurity risk governance to ensure proper protection is incorporated as a business goal. There are various models for integrating cybersecurity management into risk management structures, with the most effective approach ensuring board visibility, balanced governance of both IT and non-IT risks, and authority across the organization to enforce protocols.

develop security policy
develop security policydevelop security policy
develop security policy

The development and deployment of an enterprise Security Policy that defines the what and how of enterprise security is now mandated by numerous regulatory and industry standards, such as HIPAA and PCI-DSS. The development of a Security Policy, however, generally takes specialized skills that most organizations do not have. As a result, the process either takes a significant amount of time, or a significant amount of money. Info-Tech’s Security Policy Solution Set will help you: •Understand what goes into a Security Policy and why. •Determine which specific policies are required by your organization. •Streamline the creation of a policy set via customizable standards-based templates. •Implement policies in an order that makes sense. •Understand policy enforcement. Use this material to build the Policies you need to be protected and compliant without spending a penny.

security-policysecurity-incidentpolicy-management
Focus areas (continued) Technology  Refers to solutions that organisations employ that enable them to achieve and sustain their business objectives.  Key focus areas for implementing a Defence in Depth strategy: Management of network architecture Infrastructure management Application security Communications management Important to ensure that procurement policy aligned to overall Defence in Depth strategy:  right technology procured in accordance with overall business objectives. Defence in Depth Strategy
Core principles TISN defines the core principles as follows: Implementing measures according to business risks. Using a layered approach Implementing controls to increase effort needed to attack and breach the system. Implementing personnel, procedural and technical controls. Defence in Depth Strategy
Focus areas (continued) People Refers to the security roles and responsibilities for internal and external persons. Important to define, maintain and enforce security roles and responsibilities for employees, contractors or business partners. User awareness (both internal and external people). Defence in Depth Strategy
Focus areas (continued) Processes (or Operations) Refer to standardised actions which are used to ensure that the organisations’ position on security is sustained. Organisations must define, maintain and enforce standardised actions/processes which are used to develop and sustain its position on security. Key focus areas would typically include: Identity and user-access management Incident response management Disaster recovery management Audit management Defence in Depth Strategy

Recommended for you

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011

The document discusses developing effective information security policies through a multi-step process. It begins with defining different types of policies like enterprise, issue-specific, and systems-specific policies. It then outlines the key phases to developing policies which include investigation, analysis, design, implementation, and maintenance. Specific guidance is provided for each phase, such as conducting a risk assessment in investigation and specifying enforcement in design. Effective policy development requires planning, funding, participation from stakeholders, and periodic reviews.

How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha

This document provides guidance on writing an effective network security policy. It explains that writing security policies is challenging and requires understanding what should be included and who is responsible. The author developed a Network Security Policy Manual (NSPM) based on standards from ISF and ISO to provide an example. When writing policies, it is important to transform standard language into enforceable policy statements, avoid defining specific technologies, and ensure all sections work together cohesively. Maintaining and updating the security policy is crucial to protecting organizational assets and data.

security policy guide - tareq hanaysha
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning

This document outlines the business case for enterprise continuity planning. It discusses establishing strategic, financial, and organizational drivers to account for changes and ensure business viability. The scope section covers determining risk appetite, conducting a business impact analysis to identify critical departments, analyzing threats, and developing continuity requirements, strategies, and plans. It emphasizes developing a continuous improvement process to foster resilience.

information securitycisobusiness continuity
Focus areas (continued) Governance Refers to the oversight and coordination of technology, people and processes provided in terms of a management framework and begins with commitment from senior management level.  This is followed by: Integration and alignment to overall strategy;  alignment and incorporation into business objectives and goals;  drafting and implementing appropriate policies; and  deriving procedures from it. Key focus areas for implementation include: Risk management. Information security and policy. Compliance Management. Defence in Depth Strategy
Implementing the strategy Requires a shift in paradigm:  IT security/Information Assurance cannot be viewed as stand-alone issues, but must become part of business planning, overall strategy, governance and operations. Reasons for implementing strategy: Expanding organisational boundaries. Mobile workforce. Decentralisation of services. Increasing value of information. Defence in Depth Strategy
Implementing the strategy (continued) Steps Analysis of internal and external environment. Determining the risks. Implementation of strategy. Maintenance, monitoring and review. Defence in Depth Strategy
Layered Defence Approach as part of Defence in Depth Strategy The most effective way to secure information within modern day parameters would be through implementing different layers of control as part of Defence in Depth strategy (Murali 2007).  Controls include both technical and process control mechanisms. Defence in Depth Strategy

Recommended for you

Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards

This document discusses information security policies and standards, outlining the challenges in defining, measuring compliance with, reporting violations of, and correcting violations to conform with policies. It describes policies as high-level guidance and standards as specific technical requirements. The foundation of information security is establishing a framework of policies to provide management direction for decisions across the enterprise through clearly defined security goals.

information securitymcitindonesia
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...

Security Risk Management: ovvero come mitigare e gestire i rischi dei dati attraverso i servizi gestiti. - by Hitachi Systems - festival ICT 2015 Relatore: Denis Cassinerio Security Business Unit Director di Hitachi Systems CBT

hitachy systemssecurityfestival ict 2015
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management

Risk Management Strategy is an approach to dealing with global risks focused to anticipate the events, designing and implementing procedures to minimize the occurrence of the event or its impact if it occurs. In era of globalization and interconnected world the task to protect the company from global risks became complicated. Any kind of internally or externally risk can cause distortion to its usual business activities. The source of potential risk can be human being, technology failure, sabotage or Mother Nature. All the risks must be considered individually since they overlap to a large degree. Then our Global Risk Management consulting focuses on: terrorism, internal sabotage, external espionage, technology failure.

security risk managementglobal riskrisks assessment
Layered Defence Approach (continued) An organisation must deploy multiple defence mechanisms between the attacker and the target.  Must increase the difficulty of successfully penetrating the network and thereby reducing risk, but also increase the chances of detecting the intruder: Must identify users of a system e.g. through passwords and usernames. Must be able to provide mechanisms to effectively and efficiently recover from damage after attack. Must provide intelligence and correlate information between various departments in a business with aim to prevent future attacks. Defence in Depth Strategy
Maintaining the strategy Maintaining strategy includes continuous monitoring and evaluation of effectiveness of the implemented program.  Would include evaluating strategy to determine alignment where there are changes to: Business objectives and/or overall enterprise strategy. Security profile or specific breaches in security or increases in particular type of security breach occurs. Weaknesses or gaps identified in current strategy. Defence in Depth Strategy
Practical guidelines for maintaining strategy Know and understand your organisation. Define security roles and responsibilities. Adopt appropriate policies and procedures. Continuous auditing and assessment of process. Stay up to date. Effective public private partnerships. Defence in Depth strategy
Conclusion Value of information:  organisations and the criminals Critical to preserve the integrity of information, to ensure that it is stored, transmitted and accessed securely. Systems designed to manage and secure information must be reliable, aligned to business objectives and inline with risk management approach of organisation. Achieve Information Assurance through implementation of Defence in Depth strategy. Shift in paradigm:  pro-active vs re-active. SHARE INFORMATION!

Recommended for you

Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy

Organizations are struggling to keep up with today’s evolving threat landscape. From technology sophistication and business adoption to the proliferation of hacking techniques and the expansion of hacking motivations, organizations are facing major security risks. Every organization needs some kind of information security program to protect their systems and assets. Organizations today face pressure from regulatory or legal obligations, customer requirement, and now, senior management expectations.

information technologycisosecurity
NTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John WhitedNTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John Whited

John Whited, Principal Engineer, Raytheon Software Assurance Software Assurance (SwA) is also known by many other names -- application security, software security, secure application development, and others. The numbers vary from study to study, but a vast majority of cyber-attacks at least involve an element of attack on one or more software applications. Fundamentally, SwA provides a level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its lifecycle, and that the software functions in the intended manner. SwA is a development lifecycle endeavor requiring the participation of many disciplines. This presentation will explore some of the best practices in secure software development across its lifecycle.

software assurancentxissacybersecurity
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation

Cyber security involves protecting computers, networks, programs and data from unauthorized access and cyber attacks. It includes communication security, network security and information security to safeguard organizational assets. Cyber crimes are illegal activities that use digital technologies and networks, and include hacking, data and system interference, fraud, and illegal device usage. Some early forms of cyber crime date back to the 1970s. Maintaining antivirus software, firewalls, backups and strong passwords can help protect against cyber threats while being mindful of privacy and security settings online. The document provides an overview of cyber security, cyber crimes, their history and basic safety recommendations.

#cybersecurity#security in it
Questions? Thank you!

More Related Content

What's hot

Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
Micheal Isreal
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
Lennart Bredberg
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
Ali Sadhik Shaik
 
Event security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukEvent security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.uk
Ahsan Gill
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
gurneyhal
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)
Rois Solihin
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
Ben Browning
 
develop security policy
develop security policydevelop security policy
develop security policy
Info-Tech Research Group
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
codka
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
Hanaysha
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
William Godwin
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
festival ICT 2016
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
G3 intelligence Ltd
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 

What's hot (19)

Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys2. Improving an Existing Sec Sys
2. Improving an Existing Sec Sys
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
Event security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukEvent security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.uk
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Information security management (bel g. ragad)
Information security management (bel g. ragad)Information security management (bel g. ragad)
Information security management (bel g. ragad)
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
How to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq HanayshaHow to write an IT security policy guide - Tareq Hanaysha
How to write an IT security policy guide - Tareq Hanaysha
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 

Viewers also liked

NTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John WhitedNTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John Whited
North Texas Chapter of the ISSA
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (6)

NTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John WhitedNTXISSACSC2 - Software Assurance (SwA) by John Whited
NTXISSACSC2 - Software Assurance (SwA) by John Whited
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Prevention Is Better Than Prosecution: Deepening the defence against cyber crime

Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
Hamed Moghaddam
 
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital AssetsDefensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
CyberPro Magazine
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
AmeliaJonas2
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
Toronto Innovation College
 
Information Security Training: Bridging the Gap to Compliance Requirements
Information Security Training: Bridging the Gap to Compliance RequirementsInformation Security Training: Bridging the Gap to Compliance Requirements
Information Security Training: Bridging the Gap to Compliance Requirements
Milind Agarwal
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
ciso_insights
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
CyberPro Magazine
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
Toronto Innovation College
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
Md Shaifullar Rabbi
 
Clark Swanson: Empowering Health with Halo Beauty
Clark Swanson: Empowering Health with Halo BeautyClark Swanson: Empowering Health with Halo Beauty
Clark Swanson: Empowering Health with Halo Beauty
Clark Swanson
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
R_Yanus
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
AlliedConSapCourses
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
soulscout02
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
kelyn Technology
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
Ciente
 

Similar to Prevention Is Better Than Prosecution: Deepening the defence against cyber crime (20)

Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital AssetsDefensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
 
Information Security Training: Bridging the Gap to Compliance Requirements
Information Security Training: Bridging the Gap to Compliance RequirementsInformation Security Training: Bridging the Gap to Compliance Requirements
Information Security Training: Bridging the Gap to Compliance Requirements
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Clark Swanson: Empowering Health with Halo Beauty
Clark Swanson: Empowering Health with Halo BeautyClark Swanson: Empowering Health with Halo Beauty
Clark Swanson: Empowering Health with Halo Beauty
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
Protecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdfProtecting the Portals - Strengthening Data Security.pdf
Protecting the Portals - Strengthening Data Security.pdf
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 

More from Jacqueline Fick

Organised crime and presenting evidence on racketeering
Organised crime and presenting evidence on racketeeringOrganised crime and presenting evidence on racketeering
Organised crime and presenting evidence on racketeering
Jacqueline Fick
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Jacqueline Fick
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Jacqueline Fick
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
Jacqueline Fick
 
A Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber SyndicateA Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber Syndicate
Jacqueline Fick
 
A Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber SyndicateA Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber Syndicate
Jacqueline Fick
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnerships
Jacqueline Fick
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
Jacqueline Fick
 

More from Jacqueline Fick (8)

Organised crime and presenting evidence on racketeering
Organised crime and presenting evidence on racketeeringOrganised crime and presenting evidence on racketeering
Organised crime and presenting evidence on racketeering
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
International Trends in Mobile Law
International Trends in Mobile LawInternational Trends in Mobile Law
International Trends in Mobile Law
 
A Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber SyndicateA Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber Syndicate
 
A Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber SyndicateA Day In The Life Of A Cyber Syndicate
A Day In The Life Of A Cyber Syndicate
 
Cybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnershipsCybercrime In South Africa and the benefits of public private partnerships
Cybercrime In South Africa and the benefits of public private partnerships
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 

Prevention Is Better Than Prosecution: Deepening the defence against cyber crime

  • 1.  LEX INFORMATICA CONFERENCE JULY 2009 PREVENTION IS BETTER THAN PROSECUTION: DEEPENING THE DEFENCE AGAINST CYBER CRIME Adv Jacqueline Fick Risk and Compliance Management PwC Advisory Southern Africa
  • 2. Contents Introduction and Approach Information Assurance Defence in Depth Strategy Conclusion Questions
  • 3. Introduction and Approach President in State of the Nation Address specifically referred to an increased effort to combat cyber crime and identity theft Increase in cyber crime in both private and public sector Criminals want information Law enforcement hampered in efforts to catch criminals Shift in paradigm: Re-active v pro-active Prevention is better than Prosecution Devoting time and resources to implement strategies that prevent cyber crime Information Assurance and Defence in Depth strategy
  • 4. Information Assurance Definition Objective of Information Assurance Five pillars of Information Assurance
  • 5. Information Assurance Definition The practice of managing information-related risks (Wikipedia). Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection and reaction capabilities (US DoD). Umbrella concept bringing together issues of Information Security and Dependability. Includes other corporate governance issues such as privacy, audits, business continuity and disaster recovery. Information Assurance
  • 6. Objective The objective of Information Assurance is to minimise the risk that information systems and information stored, transmitted and processed thereon is vulnerable to threats. If an attack does take place, the damage it might cause will be minimised. It also provides for method to recover from attack as efficiently and effectively as possible. Information Assurance focuses on: Access controls Individual Accountability Audit trails Information Assurance
  • 7. Five pillars of Information Assurance Information Security based on CIA triad Information Assurance: CIA triad, authenticity and non-repudiation NSA: application of five pillars should be based on protect, detect and react paradigm Electronic Communications and Transactions Act, No. 25 of 2002 Incorporates principles of five pillars Criminalises attacks Information Assurance
  • 8. Five pillars of Information Assurance Information Assurance
  • 9. Defence in Depth Strategy Introduction Focus areas Core principles Implementing strategy Layered defence approach Maintaining strategy
  • 10. Definition Strategy that can be implemented to achieve Information Assurance in today’s highly networked environments (NSA). Also defined as systematic security management of people, processes and technologies in a holistic risk-management approach (TISN): “Best practices” strategy in that it relies on the intelligent application of techniques and technologies. Based on balancing protection capability and cost, performance and operational considerations. Delivers: Effective risk-based decisions; Enhanced operational effectiveness; Reduced overall cost and risk; and Improved information security. Defence in Depth Strategy
  • 11. Threats To protect an organisations’ information and information systems against cyber attacks, it is necessary to determine who the enemy is, why they would want to launch an attack and how they would attack the organisation. Threats can be internal and external and can be as a result of intentional and unintentional actions. Defence in Depth Strategy Faster networks More storage in smaller devices Technological convergence Increasingly mobile workforce Hackers Organised crime Changes in regulatory framework TECHNOLOGICAL INNOVATION EXTERNAL THREATS Business partners with poor data security Physical access to shared systems Misunderstanding of allowed access Competitive environment Disgruntled employees Financially troubled employees Corporate espionage Uneducated/uninformed users TRADING PARTNERS PEOPLE
  • 12. Focus areas Achieving Information Assurance requires a balanced focus on: People Processes Technology Governance Defence in Depth Strategy
  • 13. Focus areas (continued) Technology Refers to solutions that organisations employ that enable them to achieve and sustain their business objectives. Key focus areas for implementing a Defence in Depth strategy: Management of network architecture Infrastructure management Application security Communications management Important to ensure that procurement policy aligned to overall Defence in Depth strategy: right technology procured in accordance with overall business objectives. Defence in Depth Strategy
  • 14. Core principles TISN defines the core principles as follows: Implementing measures according to business risks. Using a layered approach Implementing controls to increase effort needed to attack and breach the system. Implementing personnel, procedural and technical controls. Defence in Depth Strategy
  • 15. Focus areas (continued) People Refers to the security roles and responsibilities for internal and external persons. Important to define, maintain and enforce security roles and responsibilities for employees, contractors or business partners. User awareness (both internal and external people). Defence in Depth Strategy
  • 16. Focus areas (continued) Processes (or Operations) Refer to standardised actions which are used to ensure that the organisations’ position on security is sustained. Organisations must define, maintain and enforce standardised actions/processes which are used to develop and sustain its position on security. Key focus areas would typically include: Identity and user-access management Incident response management Disaster recovery management Audit management Defence in Depth Strategy
  • 17. Focus areas (continued) Governance Refers to the oversight and coordination of technology, people and processes provided in terms of a management framework and begins with commitment from senior management level. This is followed by: Integration and alignment to overall strategy; alignment and incorporation into business objectives and goals; drafting and implementing appropriate policies; and deriving procedures from it. Key focus areas for implementation include: Risk management. Information security and policy. Compliance Management. Defence in Depth Strategy
  • 18. Implementing the strategy Requires a shift in paradigm: IT security/Information Assurance cannot be viewed as stand-alone issues, but must become part of business planning, overall strategy, governance and operations. Reasons for implementing strategy: Expanding organisational boundaries. Mobile workforce. Decentralisation of services. Increasing value of information. Defence in Depth Strategy
  • 19. Implementing the strategy (continued) Steps Analysis of internal and external environment. Determining the risks. Implementation of strategy. Maintenance, monitoring and review. Defence in Depth Strategy
  • 20. Layered Defence Approach as part of Defence in Depth Strategy The most effective way to secure information within modern day parameters would be through implementing different layers of control as part of Defence in Depth strategy (Murali 2007). Controls include both technical and process control mechanisms. Defence in Depth Strategy
  • 21. Layered Defence Approach (continued) An organisation must deploy multiple defence mechanisms between the attacker and the target. Must increase the difficulty of successfully penetrating the network and thereby reducing risk, but also increase the chances of detecting the intruder: Must identify users of a system e.g. through passwords and usernames. Must be able to provide mechanisms to effectively and efficiently recover from damage after attack. Must provide intelligence and correlate information between various departments in a business with aim to prevent future attacks. Defence in Depth Strategy
  • 22. Maintaining the strategy Maintaining strategy includes continuous monitoring and evaluation of effectiveness of the implemented program. Would include evaluating strategy to determine alignment where there are changes to: Business objectives and/or overall enterprise strategy. Security profile or specific breaches in security or increases in particular type of security breach occurs. Weaknesses or gaps identified in current strategy. Defence in Depth Strategy
  • 23. Practical guidelines for maintaining strategy Know and understand your organisation. Define security roles and responsibilities. Adopt appropriate policies and procedures. Continuous auditing and assessment of process. Stay up to date. Effective public private partnerships. Defence in Depth strategy
  • 24. Conclusion Value of information: organisations and the criminals Critical to preserve the integrity of information, to ensure that it is stored, transmitted and accessed securely. Systems designed to manage and secure information must be reliable, aligned to business objectives and inline with risk management approach of organisation. Achieve Information Assurance through implementation of Defence in Depth strategy. Shift in paradigm: pro-active vs re-active. SHARE INFORMATION!