1 / 16

Current / Emerging Cyber Threats & Leadership Considerations June 2016

Explore the evolving landscape of cyber threats and the critical leadership considerations needed in today's digital world. Understand the impact of cyber risks on both physical and digital realms, and learn how to mitigate insider threats, supply chain vulnerabilities, and remote attacks. Discover the importance of proactive leadership in safeguarding your organization against cyber threats. Stay informed, stay secure.

gustafson
Download Presentation

Current / Emerging Cyber Threats & Leadership Considerations June 2016

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Current / Emerging Cyber Threats & Leadership Considerations June 2016

  2. Bio Information • 2016 100 CEO Leader in STEM • 2014 AT&T Innovator of the Year • 2014 SmartCEO Brava Award • 2010 American Express Open Government Contractor of the Year • Two companies focused on SCRM • Interos Solutions (2005 – present) • Vigillence (2014 – present) • US Delegate to the W20/G20 • President – WIPP International (2014 – present) • Virginia Governor’s Cybersecurity Commission • International Cyber Dialogue: Executive Committee • DHS IT-SCC Member • Open Group Member • Chairperson NDIA Cyber Division Co-chair (2013-2015) • DHS SSCA WG1 Co-chair (2012-2014) • ACT-IAC: Cyber Chair (2011-2013)

  3. Agenda • Why is this Relevant? • The Threats We Face • Changes & Cyber Specific Concerns • A Question of Leadership • A Discussion Cyber Expert? Listen and understand how to communicate with the rest of us!

  4. Why is this Relevant To You? With the increased convergence of cyber and physical worlds, attacks are no longer limited to office computers and networks Physical Safety is no longer your only – nor your most persistent - risk Exponential technologies are revolutionizing industries – and introducing risks that never existed before Cyber is not only a technical issue If cyber is not one of the primary considerations in your leadership planning, you will get burned

  5. The Who - a range of cyber threats to anyeconomy and national security Any economy, government and society relies on a digital infrastructure. That reliance creates vulnerabilities to cyber threats.

  6. The How – Three Threat Vectors • Insider Threats – Malicious and Good but Dumb: Most numerous • Remote / Proximate Threats– Hacking: Most well known • Supply Chain Threats: • Requirements Development • Design • Assembly • Transit • Installation & Maintenance • POS system interaction • Partner access to networks Verizon 2016 Data Breach Investigations Report

  7. The What - Cyber Ecosystem Supply Chain Threats Remote & Proximate Threats IT Infrastructures Supply chain threats are huge. Supply chain presents a long and inviting attack surface. Data Facilities Network Hackers shift exploit strategies & techniques as defenses improve. - Air Gap Hoppers Personnel Insider Threats Hardening systems & supply chains make the insider threat paramount

  8. Changes We face • Change 1: The impact and visibility of recent breaches calls into of traditional security measures – w/ good reason. (WikiLeaks, Stuxnet, RSA, Sony, Banks, Saudi ARAMCO, Target) • Change 2: Security challenges are impacting innovation adoption. (Mobile, Cloud, Social Media, Business Intel) • Change 3: The surface for a typical network is growing at an exponential rate – Target Rich Environment (People, Data, Infrastructure, Applications, BYOD, Others?!) • Change X: Snowden Disclosures

  9. Other Issues • Mobil Computing – Today’s biggest problem • Cloud Computing – The way of the future • Smart Grid – Ukraine attack brought this to the forefront • SCRM – Board and C-Suite Concern • Stuxnet / DuQu/ Flame - Elegant • Conficker – Who Knows? • Shamoon - Brute force “warning” • U.S. Programs – Will they continue? • Legislative solutions – Open Issue

  10. What Do We Do?Our Differentiator

  11. What is my Corporate Risk Posture?

  12. How Do My Vendors Stack Up?

  13. Who Is Hiding In My Supply Chain?

  14. The Role of Leadership in a Holistic Solution • Cyber Personal Hygiene – Like Salt • Awareness, Education, and Training – The forgotten foundation • Everyone needs to understand the Cyber Issues, not just the Geeks • You must enforce the rules, even on yourselves • Do not blow off SCRM! • You must have the best tech solutions - but w/o leadership it will still fail • Our biggest strength / Our biggest Vulnerability • It is YOUR responsibility to know and to act

  15. The New T-Shirt ‘We used to be a utility company that used technology…. …now we’re a technology company [in the industry sector]’

  16. Jennifer Bisceglie CEO Vigillence, Inc 1725 Duke Street Suite 510 Alexandria, VA 22314 jbisceglie@vigillence.net 703-927-3929 www.vigillence.net

More Related