Joseph ingemi strategic cyber security

43
Strategic Cyber-Security Joseph Ingemi

description

 

Transcript of Joseph ingemi strategic cyber security

Page 1: Joseph ingemi strategic cyber security

Strategic Cyber-Security

Joseph Ingemi

Page 2: Joseph ingemi strategic cyber security

Agenda

• Introduction

• Trends, Motivations, and Innovations

• Cyber-attacker Geography

• Recommendations

• Case Study

• Conclusion

Page 3: Joseph ingemi strategic cyber security

Introduction

“From this day forward, any nation that continues

to harbor or support terrorism will be regarded

by the United States as a hostile regime.” –

George W. Bush

Page 4: Joseph ingemi strategic cyber security

Introduction

• Expresses a fundamental truth

• Acts of terror require a base of operation

• Similarly, cyber-attacks do so as well

• Each cyber-attack has a country of origin

Page 5: Joseph ingemi strategic cyber security

Introduction

• Cyber Security is Top-Down not Bottom-up

• Managers and Decision-makers drive

cyber-security

• Information Technology Departments

simply support decisions

Page 6: Joseph ingemi strategic cyber security

Introduction

• Cyber-Security is about Risk Management

• Mitigation and controls should address risk

• One size does not fit all

Page 7: Joseph ingemi strategic cyber security

Introduction

What is a cyber-attack?

? ? ?

? ? ? ?

?

Page 8: Joseph ingemi strategic cyber security

Introduction

What is a cyber-attack?

Any effort to steal from, defraud, disrupt or

destroy personal or enterprise-level

operations through networked systems or

maliciously causes a data breach

Page 9: Joseph ingemi strategic cyber security

Trends

Where are we?

Where are we

vulnerable?

Where are we going?

Page 10: Joseph ingemi strategic cyber security

Trends

Security Gaps and

Vulnerabilities

Security Gaps and

Vulnerabilities

Past

Present

Future

Page 11: Joseph ingemi strategic cyber security

Vulnerabilities

Why exploit a vulnerability?

• Attacker Intent

• Type of information or data

(Why do you rob banks, Willie?)

Because that’s where the money is. –Willie Sutton

Page 12: Joseph ingemi strategic cyber security

Motivations

Integrity Violation • Embarrass

• Political Agenda

• Not damaging other than emotional distress

• Demonstrate weakness, bragging rights

• Examples

Page 13: Joseph ingemi strategic cyber security

Motivations

Profit • Piracy

• Theft

• Learn corporate strategies

• Examples

Page 14: Joseph ingemi strategic cyber security

Motivations

Physical Damage • Destroy property

• Induce casualties

• Weaken defense capabilities

• Direct or indirect

• Example

Page 15: Joseph ingemi strategic cyber security

Innovation: Cloud

• IaaS

• PaaS

• Applications

• Public vs Private vs Hybrid

• Where is the data stored?

• Who accesses the data?

• Is whole greater than the parts?

Page 16: Joseph ingemi strategic cyber security

Innovation: Internet of Things

• Mobile Devices

• Controllers

• Sensors

• UAVs

• Information

Technology has a

physical impact

Page 17: Joseph ingemi strategic cyber security

Innovation: 3D Printing

• Disruptive technology

• Revolutionizes supply chains

• Intellectual property more valuable than

physical inventories

Page 18: Joseph ingemi strategic cyber security

Innovation vs Motivation

Integrity

Violation

Profit Physical

Damage

Cloud X X

3D Printing

Internet of

Things

Page 19: Joseph ingemi strategic cyber security

Innovation vs Vulnerability

Integrity

Violation

Profit Physical

Damage

Cloud X X

3D Printing X X ?

Internet of

Things

Page 20: Joseph ingemi strategic cyber security

Innovation vs Vulnerability

Integrity

Violation

Profit Physical

Damage

Cloud X X

3D Printing X X ?

Internet of

Things

X X X

Page 21: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

Russia

• Cyber-command (US Intel)

• Attacks on Baltic

• Georgia War

• Attacks on Ukraine PM, White House

• Attack on Western Energy Companies

• Gangsters Steal 1.2 Billion Passwords

• Industrial Control Systems

Page 22: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

China

• People Liberation Army Unit 61398

– Activities since 2006

– Targets align with strategic priorities

– China has denied these attacks

• Little Panda/ Anthem, US Community Health; Greatfirewall vs Greatfire vs Great Cannon

• ASEAN Monitoring

Page 23: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

Iran

• Strong push to develop cyber-warfare

capabilities

• Attack on Saudi Aramco

• Attack on US financial institutions

• Israeli-Iranian cyber-competition

Page 24: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

North Korea

• Attacks on South Korean commercial,

government and military targets, 2009-

2011

• Sony Attack

• Unit 121, 91, 35, Lab 110

Page 25: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

ISIS

• Fluid:

– Lone-wolf sympathizers abroad

– Westerners joining ISIS

• Focus on social media

• CENTCOM Twitter hacked

Page 26: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

Syria

• Syrian Electronic Army

• Defend Assad; connected to the regime

• DDOS and Malware attacks

• Spam, hack and deface western media

• Hacked AP, sent out fake news report, Dow dropped

• Sands

Page 27: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

Similarities

• High-level of internet surveillance

– Open-Net Initiative, “Enemies of the Internet”

• Corruption

• Lack of Civil Society

• Un-liberal

• Hostility towards/Rivalry with West

• State-sponsored cyber-groups

Page 28: Joseph ingemi strategic cyber security

Cyber-Attacker Geography Internet

surveillance

Corruption Lack of

civil

society

Un-liberal Hostility State-

Sponsorship

China X X X X X X

Russia X X X X X X

Iran X X X X X X

N.

Korea X X X X X X

ISIS ? X X X X X

Syria X X X X X X

Page 29: Joseph ingemi strategic cyber security

Cyber-Attacker Geography

• Cyber-Attacks are a low cost vector of

attack by our nation’s enemies

• Relationship between international

relations and cyber-security threats – Regimes

– Power Blocs

• Cannot separate global markets from

global rivalries – Economic liberalism does not assure good behavior

Page 30: Joseph ingemi strategic cyber security

Recommendations

• Organizational

• State and Local

• Federal Government

Page 31: Joseph ingemi strategic cyber security

Recommendations

Organizational

• Inventory

– Data and Processes

– Hardware and Software

• Access

• Risk Assessment

• Mitigation and Controls

• Monitor

Page 32: Joseph ingemi strategic cyber security

Recommendations

Organizational

Critical Considerations:

• Analysis drives technology and framework

• Everything has a value

• Location, Location, Location

– Be Aware of the one-off, eg, India

Page 33: Joseph ingemi strategic cyber security

Recommendations

State-Local

• Develop public-private partnerships to build

resiliency – Build awareness

– Spread best practices, esp., small businesses

– Economic Development

• Law Enforcement

• Education – Encourage good behavior

– Build next generation of cyber-security experts

Page 34: Joseph ingemi strategic cyber security

Recommendations

Federal • Develop a cyber-security regulatory regime/PPP/best practices

– Systemic vs Individual Risk

– 3 Bills

• Evaluate the international environment and rate nations based on cyber-threat – Advisory list

– Intelligence

– Examine outside trade relationships and alliances among partners

• Maintain and strengthen alliances to assure that our strategic interests are aligned with our allies.

– Egypt

– Great Britain

– India

– Indonesia

– Israel

• Integrate cyber-security with both non-defense and defense relationships – Make cyber-security a consideration in response options

• Depends on the impact on physical world

– Make cyber-security an integrated part of diplomacy and assistance.

– International economic bodies should have a cyber-security component.

Page 35: Joseph ingemi strategic cyber security

Recommendations

• Integrate cyber-security with both non-defense and defense relationships – The Defense Department, Homeland Security and the Justice Department

should conduct regular joint exercises with allies for countering cyber-attacks. • South Korea

• Eastern Europe

– Prosecuting cyber-attackers must be made a law-enforcement priority • Joint Cybercrime Action Task Force

• Interpol

• Prosecution and extradition treaties

– Cyber-security must be a component of immigration policy

• Develop cyber-security Centers of Excellence as inter-disciplinary research and instruction centers.

– USMA CTC

– CDC-like National Department

– Cyber Red Cross

– ISAOs

Page 36: Joseph ingemi strategic cyber security

Case Study

• Trans-Pacific Partnership (TPP)

• Includes: Australia, Brunei, Canada, Chile,

Japan, Malaysia, Mexico, New Zealand, Peru,

Singapore, and Vietnam

• E-commerce in terms of tariffs

• Integrated telecommunications

• Regulatory coherence

• Intellectual Property

Page 37: Joseph ingemi strategic cyber security

Case Study Internet

surveillance

Corruption Lack of civil

society

Un-liberal Hostility State-

Sponsorship

Aus ?

Bru ? x

Can

Chile

Jap

Mal ? ?

Mex x

NZ

Per x

Sing ? ? ?

Viet x x ? x

Page 38: Joseph ingemi strategic cyber security

Case Study

China

Chile Aus

Japan Mal HK

Sing Viet

Page 39: Joseph ingemi strategic cyber security

Case Study

Approach-Government

• Special care to information sharing with

Australia, New Zealand and Japan

• Collective Security-Mutual Defense Agreement

– Aus, NZ, Chile, Japan, Malaysia, Singapore, Vietnam

– Coordinated law enforcement

– Cyber-defense umbrella

• Trilateral talks at G20

Page 40: Joseph ingemi strategic cyber security

Case Study

China-centric FTAA

• US Isolation vs Cyber-Security Exposure

• Fast-Track TPP

• Cyber-security Alliance within FTAA

• Private Sector Vigilance

Page 41: Joseph ingemi strategic cyber security

Case Study

Approach-Private

• Evaluate supply chains and human

resource policies for business partners

– Aus, Chile, Japan, Malaysia, Singapore,

Vietnam

• Evaluate business partners relationships

based on their relationship with China

– Higher risk premiums

Page 42: Joseph ingemi strategic cyber security

Conclusion

“Economic globalization, in its essence, ignores national frontiers. Foreign policy affirms them, even as it seeks to reconcile conflicting national aims or ideals of world order”

–Henry Kissinger

Page 43: Joseph ingemi strategic cyber security

References

• Mandiant, APT 1: Exposing of China’s

Cyber Espionage Units (2013)

• Akamai, State of the Internet

• The HIll, Cybersecurity Update

• Politico, Morning Cybersecurity Update

• Sophos, Naked Security

• RealClearDefense

• MS-ISAC