You are on page 1of 47

Exploring the Landscape of Philippine Cybersecurity

www.SCIPPinternational.org

Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats

Freddy Tan, CISSP Chairperson, (ISC) Board of Directors

2006-2011 SCIPP International, Inc. All Rights Reserved.


Copyright 1989 2013 (ISC)2 All Rights Reserved
2006-2012 SCIPP International, Inc. All Rights Reserved.

(ISC)2 Overview & Background

Global leaders in certifying and educating information security professionals with the CISSP and related concentrations, CSSLP, CAP, and SSCP.

Formed in 1989, not-for-profit consortium of industry leaders.


Over 86,600 certified professionals in over 135 countries. Board of Directors - top information security professionals worldwide. All of the information security credentials are accredited ANSI/ISO/IEC Standard 17024 with the CISSP being the first technology-related credential to receive this accreditation.
Copyright 1989 2010, (ISC)2 All Rights Reserved

Click to edit Master title style

(ISC)2 Overview & Background


Palm Harbor Headquarters

London (Europe)

Hong Kong (Asia)

Virginia (America)

Click to edit Master title style


4 Regional Offices

Tokyo (Japan)

Copyright 1989 2010, (ISC)2 All Rights Reserved

Membership Honor Roll 2013


1000+ Australia Canada (2) Germany Hong Kong India Japan(1) Korea, South Netherlands Singapore (1)

United Kingdom

United States (5)

500+
China France Switzerland

200+

Brazil

Belgium Denmark Finland (1) (1)

Ireland (1)

Israel

Italy

Malaysia

Mexico

Poland Saudi Arabia South Africa (1)

Spain

Sweden

Taiwan

United Arab Emirates

Click to edit Master title style


100+
Copyright 1989 2010, (ISC)2 All Rights Reserved Argentina Austria Columbia New Zealand Nigeria Norway Russia Thailand Turkey

Number of (ISC) Members in Various Asian As of July 2011 Economies


Total worldwide member: 75,000+

2500 2000 1500 1000 500

Click to edit Master title style

Copyright 1989 2010, (ISC)2 All Rights Reserved

(ISC) Credential Positioning / Career Path

Click to edit Master title style

Copyright 1989 2010, (ISC)2 All Rights Reserved

What is Cyber Security?


www.SCIPPinternational.org

Why do I care about cyber security?

How can I make a difference?

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

PROPERTIES Allow user to leave interaction: Show Next Slide Button: Completion Button Label:

After viewing all the steps Show upon completion Next Slide

Business Requirements
www.SCIPPinternational.org

Information systems
Support business processes Store and process sensitive and critical data Are available to almost everyone

Information stored on all types of media

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Best Business Practices (1-5)


www.SCIPPinternational.org

1. Incident Reporting Who and When to Call 2. Access Controls Never Share with Others

3. Malicious Code Think Before You Click


4. Internet Avoid Communications Hazards 5. Asset Management Secure Your Valuables

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Best Business Practices (6-10)


www.SCIPPinternational.org

6. Human Factor Its All About the People

7. Physical Security Protect Your Workplace


8. Social Engineering Dont be Fooled 9. Business Continuity Survival of the Business 10. Policies/Compliance Your Responsibilities

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

1. Incident Reporting Who and When to Call


www.SCIPPinternational.org

Prompt identification and response is key Know


Who to call When to call What to do

Dont alter or turn off your system

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

2. Access Controls Never Share with Others


www.SCIPPinternational.org

First line of defense Passwords


Most common Weakest form

Other access controls


Tokens Smart cards Biometrics

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Password Selection Criteria


www.SCIPPinternational.org

MUST be kept private! Easy to remember


Dont write it down Something personal Meets company standards

PATRIOTS
(Weak)

P@tr10ts
(Strong)

Hard to guess
Use both uppercase and lowercase letters Substitute characters for letters (e.g., @ for a) Substitute numbers for letters (e.g., 1 for i)

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Log Off and Protect Your Screen


www.SCIPPinternational.org

Lock computers when away Terminate sessions when finished Beware of shoulder surfing

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

3. Malicious Code Think Before You Click


www.SCIPPinternational.org

What happens if you click on that link?


Virus Worm Trojan horse Logic bomb Keystroke logger

Think before you click!

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

4. The Internet Avoid Communications Hazards


www.SCIPPinternational.org

Who are you really chatting with? ID Theft Should you click that ad? Phishing Secure connections

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Safely Surfing the World Wide Web


www.SCIPPinternational.org

Be very careful! Sites may contain hidden programs Never change your security settings Dont download unknown files Spyware/Adware Cookies

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Email and Instant Messages


www.SCIPPinternational.org

Confidential information Permanent record Business purposes Networking and chat

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Email SPAM
www.SCIPPinternational.org

Sometimes dangerous Activate SPAM folders Do not open email from unknown senders Do not open attachments or links in those emails

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Portable Storage
www.SCIPPinternational.org

Can be a risk to sensitive corporate data Use only when permitted

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Mobile Devices
www.SCIPPinternational.org

Notebooks, tablets, etc. Tele-commuting, traveling, personal systems, and acceptable use

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Smartphones
www.SCIPPinternational.org

Contain personal or corporate data


Pictures of confidential data

Threat of theft/loss

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Wireless Equipment
www.SCIPPinternational.org

Must be used carefully Follow local policy Enable security measures Use encrypted VPN (virtual private network)

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

5. Asset Management Protect Your Valuables


www.SCIPPinternational.org

Asset an item of value Asset management


Identify Track Classify Assign ownership

Information assets Human assets

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Information Classification
www.SCIPPinternational.org

Identifies sensitive or critical information Have procedures for sensitive information


Protect Process Store Transmit

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Data Backup
www.SCIPPinternational.org

How much data are you willing to lose? Backup data, operating systems, applications, and configurations Automated saves

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

6. Human Factor Its All About the People


www.SCIPPinternational.org

Do Your Part
Be aware Recognize suspicious activities Follow procedures Ask if youre not sure

If in doubt, call the appropriate security office

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Monitoring and Supervision


www.SCIPPinternational.org

Insider threats
Watch for suspicious activity Report abnormal behavior

Pay attention to vendors and consultants

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

www.SCIPPinternational.org

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

7. Physical Security Protect Your Workplace


www.SCIPPinternational.org

Physical access can overcome almost all other controls Know the identity of visitors Lock it up

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Entry Controls
www.SCIPPinternational.org

Beware of tailgating Issue badges to visitors Display badges Report lost credentials

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Physical Protection
www.SCIPPinternational.org

Need to protect from loss, damage, and theft Power surges and spikes Manmade and natural threats

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

8. Social Engineering Dont Be Fooled


www.SCIPPinternational.org

Easiest form of hacking Dont be manipulated or persuaded When in doubt, follow policy and report an incident

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Identity Theft
www.SCIPPinternational.org

Stealing your identity


Personal information Banking details Credit cards

Takes hundreds of hours to fix

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Phishing Attacks
www.SCIPPinternational.org

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Dumpster Diving
www.SCIPPinternational.org

Retrieving sensitive information from garbage dumpsters In most jurisdictions, its not against the law

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

9. Business Continuity Staying in Business


www.SCIPPinternational.org

Be prepared for problems Know your role Know who to call

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

10. Policies/Compliance Your Responsibilities


www.SCIPPinternational.org

Be aware of and follow your


Organizations policies Compliance requirements
Education FERPA Energy FERC/NERC Financial Services FFIEC Healthcare HIPAA Retail PCI-DSS U.S. Government FISMA Workforce Safety and Security

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Privacy
www.SCIPPinternational.org

Personally Identifiable Information (PII) Policies, awareness, and controls

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Best Business Practices (1-5)


www.SCIPPinternational.org

1. Incident Reporting Who and When to Call 2. Access Controls Never Share with Others

3. Malicious Code Think Before You Click


4. Internet Avoid Communications Hazards 5. Asset Management Secure Your Valuables

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

Best Business Practices (6-10)


www.SCIPPinternational.org

6. Human Factor Its All About the People


7. Physical Security Protect Your Workplace 8. Social Engineering Dont be Fooled 9. Business Continuity Survival of the Business 10. Policies/Compliance Your Responsibilities

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

End-User Security Awareness Course Summary


www.SCIPPinternational.org

Cyber security is important We ALL have a role Be security aware!

Do the right things right!

2006-2011 SCIPP International, Inc. All Rights Reserved.


2006-2012 SCIPP International, Inc. All Rights Reserved.

For more information, please contact:

Mr Clayton Jones, Managing Director, Asia-Pacific, (ISC)2


cjones@isc2.org

Member Support

Click to edit Master title style


membersupport@isc2.org

Copyright 1989 2010, (ISC)2 All Rights Reserved

Thank you!
"All that is necessary for the triumph of evil is that good men do nothing.",

Click to edit Master Edmund titleBurke, style 1729 -1797

Copyright 1989 2010, (ISC)2 All Rights Reserved

You might also like