<<

Hacking

Iedereen kan het

© CGI Group Inc. CONFIDENTIAL

a is someone who seeks and exploits weaknesses in a computer system or computer network

1981 1971

1932 & 1942 1963 1903 1983 1995 2015

414s Cicada 3301 Croatian Revolution CyberVor Decocidio#Ө Digital DawgPound (DDP) Global kOS globalHell "" (GoatSec) Hackweiser Honker Union Level Seven () LulzSec Legion of Doom NCPH. P.H.I.R.M. TeaMp0isoN TeslaTeam TESO The Unknowns UGNazi Taskforce Cyber ? +? +? Joint SIGINT Cyber Unit (JSCU)

NSA Unit 61398

Unit 8200

Iranian Cyber Army

1 year in prison 3 years in prison & & $275,000 in $240.000 in restitution restitution Vladimir Albert Attoh Levin

6 years in prison 13 years in 5 years in prison prison

& 27.5M in Max Astra restitution Butler

5 years in prison 20 years in prison & $56.000 in restitution

Kevin Albert Poulsen Gonzalez

System Malicious Reconnaissance Scanning Exploitation Access Activity Cyber Attack Planning Cyber Attack Design Cyber Attack Initiation Phone Home Feedback Attack Phone Home Feedback Privilege Escalation Cross Site Scripting 4% 4% Multiple 3% Remote Code Protocol Vulnerability Execution 3% 7% SQL Injection 2% Directory Traversal 7% Integer Overflow 2% Stack Overflow 1% Memory Heap Corruption Corruption 9% 0,5%

Buffer Overflow 10% Use Alter Free 0,5%

Denial of Service 14% Authentication 33%

D > O

Tip @home!

One day hackers will save the world… CGI in Cyber Security & Resilience Helping keep Society & Economy Safe & Secure

Overview Presentation

© CGI Group Inc. CONFIDENTIAL 10 CGI Security Operation Centres (movie)

http://www.cgi.com/en/video/cgi-global-cybersecurity-operations-center

27 The business problem our clients have

GAP = Unacceptable Risk • Budget • Resources • Capability

Innovation

Cybersecurity

Threats

Regulations

PAST PRESENT

Innovation Threats Regulations Ex. People accessing their bank Used to be a single, smart individual Have increased and have managed to account once or twice a week via one trying to hack a system just to see if keep up with the threats and digital source (ATM) to people they could. Now, it’s organized crime innovation, but a company’s ability to accessing their account 4-5 times a with sophisticated teams on a global implement and comply with the day through multiple digital channels scale trying to steal and destruct. regulations has become increasingly difficult and costly. Traditional security models have been stretched to their limits of efficiency and effectiveness 28 The Modern Security Program Must…….

IDENTIFY PROTECT DETECT RESPOND

Develop the organizational Develop and implement the Develop and implement the Develop and implement the understanding to manage appropriate safeguards to appropriate activities to appropriate activities to cybersecurity risk to ensure delivery of critical identify the occurrence of a take action regarding a systems, assets, data, and infrastructure services. cybersecurity event. detected cybersecurity capabilities. event.

29 Prevention is not enough… As prevention by itself is no longer sufficient, it has become essential to develop organizational capabilities to effectively detect and respond to malicious behavior

Attack Begins

Discovery/ Attack Persistence Attacker Surveillance Set-up Cover-up Leap Frog Target System Starts Attacks Attacker Analysis Intrusion Access Complete capabilities probe Cover-up Complete

Attacker free time Need to collapse free time

Physical Monitoring & Impact security Defender Incident Controls analysis Defender discovery reporting capabilities Containment Thread Attack Damage Response Analysis forecast identification Attack Identified System Recovery reaction

30 What We Solve – Value Creation and Preservation

Protect your brand and assets – 1 the value you have created

Improve innovation, agility and 2 speed-to-change

Align cyber security costs to risk 3 and business context

Comply with diverse regulatory 4 obligations

31 CGI Global Cyber Security Strong Cyber Security Capability and Credentials

35+ years of experience across 10 Security Operations government and commercial sectors Centres globally

3 accredited test facilities 150+ clients in 16 countries use Canada, US and UK our managed security services

1400 cyber professionals - Tested and proven in some of the over 80% with government clearances worlds most sensitive and complex environments

Cybersecurity Certification & Managed Identity Business Incident Consulting & Test Labs Security Management Continuity Response Assessments Services

32 CGI is a best class security service provider…

• We defend the most attacked USA network on a 24 hour a day/ 7 days a week basis against 70 million cyber attack incidents per day • Services based on highest standards (eg USA FedRampSM and Cloud Security Provisional Authority to Operate: P-ATO, FIRST) • One of the 2 global companies with 3 accredited security certification facilities in USA, Canada and UK. • We Secure Industrial Control Systems / Critical Infrastructures based on CGI’s unique SECURE-ICS Methodology, Framework and Reference Architecture.

3333 CGI Cyber Security Offerings

We help our clients in government and organizations assess, monitor and protect against external and internal threats more effectively, taking a business-focused approach to security. We understand cyber security from all angles and have local experts supported by global experience.

Client challenges CGI offerings

• Ensuring that budget is spent Assess the risk wisely on the right level of CGI defends • Risk assessments security to get the most from any against 70 million investment • Cyber Security Strategy cyber attack • Understanding external and Protect the business incidents each day internal threats • Identity and access management solutions on military and • Protecting personal data and intelligence • Industrial Controls Systems Security privacy networks and • How to manage cloud securely • Security testing solutions infrastructure – this • Getting the right information to • Application and data security equates to an the right people at the right time Operate with confidence estimated 500 securely attacks per second • Managed security services

• Incident detection and response 34 34 Cyber Offerings – advisory to operations

We manage We give clients operational security confidence in their services security

We build systems and services securely

35 Assess the Risk

CGI helps clients understand cyber threats and vulnerabilities and effectively assess the likely risks. We work with clients to determine the ROI of security investments, build strong security business cases and determine the right cyber strategy for the organization.

Security and Risk Assement CGI helps you to understand the risks and vulnerabilities to your valuable information. It advises you how to protect it at the right level of investment by: • Risk management Consultancy • Security and Risk assesments

Cyber Security Strategy

CGI helps to create and manage your organisation’s cyber strategy, enabling the business objectives, embedding security in business processes and culture by: • Cyber Security Strategy consultancy • Workshops on Business case development & Roadmap development • awareness Trainings

36 36 Protect the Business

CGI works with clients to protect it’s infrastructures and data, to ensure that organizations are kept resilient using innovative solutions.

Identity & Access Solutions For you Identity and Access management is more and more vital for protecting your business data. With themes like IOT, BYOD, Cloud and Mobile I&AM is crucial. CGI helps with: • Biometrics solutions • I&AM, PKI & Certificate Services

Security Testing services CGI helps you to identify your weak spots by ethically hacking systems, networks and products to find vulnerabilities. Or by evaluating products and services. CGI delivers: • Vulnerability & penetration test services • Awareness Training • Security Test & Evaluation Services

Application security services

CGI helps you protect your business critical data. CGI delivers: • Secure Cloud solutions • Encryption solutions • Secure Industrial Control Systems framework 37 37 Operate with Confidence

CGI's Managed Security Services (MSS) help clients manage the complex realm of security needs – from compliance and audits to policies and architecture, with a business-focused approach. And with round-the-clock, end-to-end protection against cyber attacks, CGI provides the peace of mind to focus on what's most important – growing your business and serving customers.

Managed Security Services

CGI delivers Round-the-clock, end-to-end protection against cyber attacks and prompt action when events are detected. CGI Helps by delivering Managed Security Services: • Security Reporting Service • Security Information and Event Management SIEM Service • Log Management Service • Intrusion Detection Service 24x7 Security • Host Intrusion Prevention Service Operations Center • Host Intrusion Detection Service for all services • Endpoint Protection Service • Continuous Vulnerability Management Service • Privileged account managed Service • (Next-Generation) Firewall management Service • IAM and Certificate Management Service

38 38 CGI Managed Security Services

• Security Reporting Service Security • Security Information and Event Management SIEM Service starts with • Log Management Service knowing • Intrusion Detection Service your network. • Host Intrusion Prevention Service • Host Intrusion Detection Service • Endpoint Protection Service • Continuous Vulnerability Management Service 24x7 SOC : • Privileged account managed Service monitoring, • Strong authentication Service management, • (Next-Generation) Firewall management Service maintenance and Incident • IAM and Certificate Management Service Handling.

24x7 Security Operations Center for all services

39 Why CGI for Managed Security Services…

"CGI has been a trusted We lower your costs partner to the Canadian • Opex instead of Capex Payments Association for over • Multi tenant environment 20 years and we value the knowledge and expertise that • 100+ Client shared services CGI's security team provides.” • Typically 15-25% savings Nora Cox Director, Corporate Risk and Security, Canadian Payments Association

We increase your resilience Trusted fit • 10 Security Operations Centers in 4 countries • Business-focused versus supporting 24x7x365 technology approach to security • SANS and ITIL standardized processes issues • 100+ Clients threat intelligence • Vendor independent • Accredited test facility – ITSETF and three • Best fit products – Every service accredited security certification facilities, one in supports minimal two or three the US, one in the UK and one in Canada

40 Chosen Because

Global Reach and Scale Vendor Independent and Objective

Globally delivery capability ensures organizations of all size CGI has the flexibility to develop the right customer-specific benefit from our economies of scale, consistency of solutions based on unique client requirements and without delivery, global threat intelligence and situational a technology bias. awareness, and risk management best practices.

Shaping the future through Innovation Public and Private Sector Experience

We’re helping define emerging cybersecurity requirements We span the Public and Private sectors; we understand how and regulations through our leadership positions within they are shaping each other and the escalating public and private industry forums– informing strategies, dependencies. CGI uniquely serves federal government plans and innovative solution development. agencies and demanding commercial customers in all industries.

41 Our commitment to you We approach every engagement with one objective in mind: to help clients succeed