Presentation Title
Total Page:16
File Type:pdf, Size:1020Kb
Hacking Iedereen kan het © CGI Group Inc. CONFIDENTIAL a hacker is someone who seeks and exploits weaknesses in a computer system or computer network 1981 1971 1932 & 1942 1963 1903 1983 1995 2015 414s Cicada 3301 Croatian Revolution Hackers Cult of the Dead Cow CyberVor Decocidio#Ө DERP Digital DawgPound (DDP) Chaos Computer Club Global kOS globalHell "Equation Group" Goatse Security (GoatSec) Hackweiser Honker Union L0pht Level Seven (hacker group) Lizard Squad LulzSec Legion of Doom milw0rm Anonymous NCPH. P.H.I.R.M. Syrian Electronic Army TeaMp0isoN TeslaTeam TESO The Unknowns UGNazi Taskforce Cyber ? +? +? Joint SIGINT Cyber Unit (JSCU) NSA Unit 61398 Unit 8200 Iranian Cyber Bureau 121 Army 1 year in prison 3 years in prison & & $275,000 in $240.000 in restitution restitution Vladimir Albert Attoh Levin Kevin Mitnick 6 years in prison 13 years in 5 years in prison prison & 27.5M in Max Astra restitution Butler 5 years in prison 20 years in prison & $56.000 in restitution Kevin Albert Poulsen Gonzalez System Malicious Reconnaissance Scanning Exploitation Access Activity Cyber Attack Planning Cyber Attack Design Cyber Attack Initiation Phone Home Feedback Attack Phone Home Feedback Privilege Escalation Cross Site Scripting 4% 4% Multiple 3% Remote Code Protocol Vulnerability Execution 3% 7% SQL Injection 2% Directory Traversal 7% Integer Overflow 2% Stack Overflow 1% Memory Heap Corruption Corruption 9% 0,5% Buffer Overflow 10% Use Alter Free 0,5% Denial of Service 14% Authentication 33% D > O Tip @home! One day hackers will save the world… CGI in Cyber Security & Resilience Helping keep Society & Economy Safe & Secure Overview Presentation © CGI Group Inc. CONFIDENTIAL 10 CGI Security Operation Centres (movie) http://www.cgi.com/en/video/cgi-global-cybersecurity-operations-center 27 The business problem our clients have GAP = Unacceptable Risk • Budget • Resources • Capability Innovation Cybersecurity Threats Regulations PAST PRESENT Innovation Threats Regulations Ex. People accessing their bank Used to be a single, smart individual Have increased and have managed to account once or twice a week via one trying to hack a system just to see if keep up with the threats and digital source (ATM) to people they could. Now, it’s organized crime innovation, but a company’s ability to accessing their account 4-5 times a with sophisticated teams on a global implement and comply with the day through multiple digital channels scale trying to steal and destruct. regulations has become increasingly difficult and costly. Traditional security models have been stretched to their limits of efficiency and effectiveness 28 The Modern Security Program Must……. IDENTIFY PROTECT DETECT RESPOND Develop the organizational Develop and implement the Develop and implement the Develop and implement the understanding to manage appropriate safeguards to appropriate activities to appropriate activities to cybersecurity risk to ensure delivery of critical identify the occurrence of a take action regarding a systems, assets, data, and infrastructure services. cybersecurity event. detected cybersecurity capabilities. event. 29 Prevention is not enough… As prevention by itself is no longer sufficient, it has become essential to develop organizational capabilities to effectively detect and respond to malicious behavior Attack Begins Discovery/ Attack Persistence Attacker Surveillance Set-up Cover-up Leap Frog Target System Starts Attacks Attacker Analysis Intrusion Access Complete capabilities probe Cover-up Complete Attacker free time Need to collapse free time Physical Monitoring & Impact security Defender Incident Controls analysis Defender discovery reporting capabilities Containment Thread Attack Damage Response Analysis forecast identification Attack Identified System Recovery reaction 30 What We Solve – Value Creation and Preservation Protect your brand and assets – 1 the value you have created Improve innovation, agility and 2 speed-to-change Align cyber security costs to risk 3 and business context Comply with diverse regulatory 4 obligations 31 CGI Global Cyber Security Strong Cyber Security Capability and Credentials 35+ years of experience across 10 Security Operations government and commercial sectors Centres globally 3 accredited test facilities 150+ clients in 16 countries use Canada, US and UK our managed security services 1400 cyber professionals - Tested and proven in some of the over 80% with government clearances worlds most sensitive and complex environments Cybersecurity Certification & Managed Identity Business Incident Consulting & Test Labs Security Management Continuity Response Assessments Services 32 CGI is a best class security service provider… • We defend the most attacked USA network on a 24 hour a day/ 7 days a week basis against 70 million cyber attack incidents per day • Services based on highest standards (eg USA FedRampSM and Cloud Security Provisional Authority to Operate: P-ATO, FIRST) • One of the 2 global companies with 3 accredited security certification facilities in USA, Canada and UK. • We Secure Industrial Control Systems / Critical Infrastructures based on CGI’s unique SECURE-ICS Methodology, Framework and Reference Architecture. 3333 CGI Cyber Security Offerings We help our clients in government and organizations assess, monitor and protect against external and internal threats more effectively, taking a business-focused approach to security. We understand cyber security from all angles and have local experts supported by global experience. Client challenges CGI offerings • Ensuring that budget is spent Assess the risk wisely on the right level of CGI defends • Risk assessments security to get the most from any against 70 million investment • Cyber Security Strategy cyber attack • Understanding external and Protect the business incidents each day internal threats • Identity and access management solutions on military and • Protecting personal data and intelligence • Industrial Controls Systems Security privacy networks and • How to manage cloud securely • Security testing solutions infrastructure – this • Getting the right information to • Application and data security equates to an the right people at the right time Operate with confidence estimated 500 securely attacks per second • Managed security services • Incident detection and response 34 34 Cyber Offerings – advisory to operations We manage We give clients operational security confidence in their services security We build systems and services securely 35 Assess the Risk CGI helps clients understand cyber threats and vulnerabilities and effectively assess the likely risks. We work with clients to determine the ROI of security investments, build strong security business cases and determine the right cyber strategy for the organization. Security and Risk Assement CGI helps you to understand the risks and vulnerabilities to your valuable information. It advises you how to protect it at the right level of investment by: • Risk management Consultancy • Security and Risk assesments Cyber Security Strategy CGI helps to create and manage your organisation’s cyber strategy, enabling the business objectives, embedding security in business processes and culture by: • Cyber Security Strategy consultancy • Workshops on Business case development & Roadmap development • awareness Trainings 36 36 Protect the Business CGI works with clients to protect it’s infrastructures and data, to ensure that organizations are kept resilient using innovative solutions. Identity & Access Solutions For you Identity and Access management is more and more vital for protecting your business data. With themes like IOT, BYOD, Cloud and Mobile I&AM is crucial. CGI helps with: • Biometrics solutions • I&AM, PKI & Certificate Services Security Testing services CGI helps you to identify your weak spots by ethically hacking systems, networks and products to find vulnerabilities. Or by evaluating products and services. CGI delivers: • Vulnerability & penetration test services • Awareness Training • Security Test & Evaluation Services Application security services CGI helps you protect your business critical data. CGI delivers: • Secure Cloud solutions • Encryption solutions • Secure Industrial Control Systems framework 37 37 Operate with Confidence CGI's Managed Security Services (MSS) help clients manage the complex realm of security needs – from compliance and audits to policies and architecture, with a business-focused approach. And with round-the-clock, end-to-end protection against cyber attacks, CGI provides the peace of mind to focus on what's most important – growing your business and serving customers. Managed Security Services CGI delivers Round-the-clock, end-to-end protection against cyber attacks and prompt action when events are detected. CGI Helps by delivering Managed Security Services: • Security Reporting Service • Security Information and Event Management SIEM Service • Log Management Service • Intrusion Detection Service 24x7 Security • Host Intrusion Prevention Service Operations Center • Host Intrusion Detection Service for all services • Endpoint Protection Service • Continuous Vulnerability Management Service • Privileged account managed Service • (Next-Generation) Firewall management Service • IAM and Certificate Management Service 38 38 CGI Managed Security Services • Security Reporting Service Security • Security Information and Event Management SIEM Service starts with • Log Management Service knowing • Intrusion Detection Service your network. • Host Intrusion