SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
War Against Terrorism:
The Role of Today’s CIO
Ayo Rotibi
Managing Director
Forts & Shields Ltd
(US, Kenya, Nigeria)
“The Internet is a prime example
of how terrorists can behave in a
truly transnational way; in
response, States need to think and
function in an equally
transnational manner.”
Ban ki-moon
The Art of War
The Art of War is simple
enough. Find out where
your enemy is. Get at
him as soon as you can.
Strike him as hard as
you can and as often as
you can, and keep
moving on.(Ulysses S. Grant)
18th US President. Led
the Union to victory over
the Confederacy in the
American Civil War
www.terror.net – The Modern Terrorists
Internet-aided terrorism is a dynamic
phenomenon and transnational
Terrorist websites target three different
audiences: current and potential supporters;
international public opinion; and enemy publics
Ways contemporary terrorists use the Internet:
•From conducting psychological warfare to
gathering information, from training to
fundraising, from propagandizing to recruiting,
and from networking to planning and coordinating
terrorist acts.
www.terror.net – The Modern Terrorists
Workplace has been the primary target of terrorism
•WTC Building, Garisa University, Westgate Mall
Many workplaces upon which citizens rely to reach
work are relatively unprotected
•St Pancreas Underground
"We use Facebook to schedule the protests, Twitter
to co-ordinate and YouTube to tell the world.“ An
Egyptian Arab Spring Activist
www.terror.net – The Modern Terrorists
Dateline: September 2013
•Al Qaeda opens first official Twitter account
•@shomokhalislam, issued 29 tweets, followed
one account, and attracted 1,532 followers in 24
hours (including several high-profile digital
jihadists)
@shomokhalislam
www.terror.net – The Modern Terrorists
Breaking News...
Amazon Halts sales of ISIS propaganda Magazine
Darknet – The New Terror Frontier
Adopted platform for direct communication among
global jihadi activists
• Over 50,000 sites and 300 forums for terrorist
organizations
• Used to distribute material for recruitment, training, and
coordination of terrorist
• Informed the travel warning and closure of some US
embassies in August 2013
Darknet – The New Terror Frontier
A Course in the Art of Recruiting
• https://ia800300.us.archive.org/32/items/ACourseInTheArtOfRecruiting-
RevisedJuly2010/A_Course_in_the_Art_of_Recruiting_-_Revised_July2010.pdf
ISIS and the Lonely Young American
• http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html
Kenya’s Global Terrorism Index (GTI)
Year Incidents Fatalities Injuries Properties GTI Rank (out
of 162)
2009 1 0 0 0 4.47 27
2010 12 19 159 4 4.81 24
2011 38 37 98 7 5.15 19
2012 73 98 410 34 6.06 14
2013 74 201 442 22 6.58 12
http://www.visionofhumanity.org/#page/indexes/terrorism-index/2013/KEN/FATA
Cyber-threat Barometer: Any Ideas?
Leading Cyber Attack Method
•Social Engineering
Leading Threat
•Insider (with Authorized Access)
Leading Vulnerability
•People
Kenya’s Cyber Goals
Enhance the nation’s cybersecurity posture in a manner
that facilitates the country’s growth, safety, and
prosperity.
Build national capability by raising cybersecurity
awareness and developing Kenya’s workforce to
address cybersecurity needs.
Foster information sharing and collaboration among
relevant stakeholders to facilitate an information
sharing environment focused on achieving the
Strategy’s goals and objectives.
Insider threat
Have legitimate access to systems
Often familiar with the
organization's data
Abuse privileges to harm the
organization
Circumvent security controls of
which they are aware
Have physical proximity to data
Harder to defend against than
attacks from outsiders
The 58% Theory-The Insider Family
The Rogue Employee
•AKA: Shadow IT, Rogue
IT
•Description: They have
many aliases, but one
definite goal – to take
valuable data and
leverage it into
monetary gain, revenge
or even some
revolutionary crusade
The 58% Theory-The Insider Family
Fired / Disgruntled
Worker
•AKA: Pinch a Penny
from a 1 million
Transactions
•Description: Think
Office Space – where
workers on their way
out devise a way to rip
off the company
The 58% Theory-The Insider Family
3rd Party and Outside Insider
•AKA: The Ulterior
Motivator
•Description: Your
temporary contractor or
third-party vendor is
around so much that your
office is almost his second
home. He may fraternize
with employees and gain
the trust of your crew – but
who is really watching over
The 58% Theory-The Insider Family
Inadvertent Users
•AKA: Not the Brightest
Crayon in the Box
•Description: Believe it not,
inadvertent insider threats
make up a good portion of
data breaches– thanks to
the consumerization of
IT, the mobility of data and
the smartphone trend, it is
easier for company data to
move beyond traditional
firewalls
The 58% Theory-The Insider Family
Personalization Guru
•AKA: The Guy Who Brings
Home to Work
•Description: This guy is a
disaster waiting to happen.
They are the ones who
want their workstation to
be a basic clone of their
personal laptop. They want
to have all the applications,
tools and software –to
bypass admin rights
The 58% Theory-The Insider Family
The Night Janitor
•AKA: The Unsuspecting Pirate
•Description: The support staff
is in your office at strange
hours with no supervision
really at all. Don't let the false
characterizations and
stereotypes fool you –
criminals and social engineers
would not lose a sweat
getting employed as a janitor
just to have your server room
to themselves.
Exposure in the Workplace
Types of Sensitive Corporate Information Employees Access
(http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
Exposure in the Workplace
Types of Personal Tasks Employees Do in the Workplace
(http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
Exposure in the Workplace
Content Accessed on Mobile Devices As Permitted By Enterprise
(http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
Food For Thought
What Will You Do
If You Knew You
Were Under
Surveillance?
4 Cyber-Breach Questions
What:
•Happened? Was Stolen? Was Compromised?
How:
•Did They Do It? To Prevent Reoccurrence?
Who:
•Did It? Is Affected?
When:
•Did They Do It? Can Recovery Begin?
CIOs must leverage this singular advantage and
take a stand on the new encryption regime
introduced by FB, Google and Apple
Nothing is Hidden Under the Hood
Every online activity leaves a Digital Footprint
The Role of The CIO
Due Care: Conduct a reasonable person would
exercise in a particular situation
•Security is Good Business
•Security is Everybody’s Business
Due Diligence: Gathers facts to make an informed
decision
•Additional Internal Control procedure – Network Forensics
Threat awareness, assessment, and perception
Efficient information flow within corporations,
between corporations, and between corporations
and local and federal government agencies
National Domestic Communication Assistance Center
Core functions:
• Law Enforcement
Coordination
• Industry Relations
• Technology Sharing
• CALEA Implementation
Government's first ever
attempt to develop a centre
for electronic surveillance
knowledge management, and
facilitate the sharing of
technical solutions and know-
how among law enforcement
agencies
What if...
...we all work together for a common
purpose?
...we aspire to build a Regional NDCAC to
foster stronger collaboration and
complement Kenya CIRT/CERT?
...we foster stronger collective
relationship with LEA and Government
...we leave this conference with a
resolution to make SOMETING happen?
...we...?
Proposed Initiatives
Initiate targeted knowledge dissemination
programs
Provide real time knowledge dissemination to
corporate members
Develop lessons learned from corporate incidences
Modify existing Users and Internet Usage Policies to
include Internal Surveillance
Establish a Regional NDCAC
A Little Story
Breaking News
Eiffel Tower for Sale!
Moral Lesson:
Share Information
Conclusion
CIOs have been dragged into the War Against Terrorism
The Enterprise landscape has changed forever – FACT
The Internet offers us opportunity to prevent, detect
and deter acts of terrorism
CIOs have a responsibility to secure their enterprise
CIOs need to know about human psychology and
behavioural attitude
Real-time Digital Forensics will become a major tool in
identifying these threat agents
CIO must determine that their enterprise network does
not become a recruitment ground or a conduit for fund-
raising and propaganda
For Further Information and Demo:
•Email: arotibi@isecureconsulting.com
•Phone: +254-786-834-158, +254-772-299-802
•Skype: arotibi
•Forts & Shields, 63 Mandera Rd, Kileleshwa, Nairobi, Kenya
•www.fortsandshields.com
•www.isecureconsulting.com
Questions

Weitere ähnliche Inhalte

Was ist angesagt?

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy Mohit Kumar
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other thingsSara-Jayne Terp
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014vikawotar
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015Numaan Huq
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesJohn Bambenek
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 

Was ist angesagt? (20)

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Cognitive security: all the other things
Cognitive security: all the other thingsCognitive security: all the other things
Cognitive security: all the other things
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
SANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political BreachesSANSFIRE - Elections, Deceptions and Political Breaches
SANSFIRE - Elections, Deceptions and Political Breaches
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 

Andere mochten auch

My life project
My life projectMy life project
My life projectyessicavd
 
Crash course observation lab
Crash course observation labCrash course observation lab
Crash course observation labAugusto Ovelar
 
презентация элективного курса по обществознанию
презентация элективного курса по обществознаниюпрезентация элективного курса по обществознанию
презентация элективного курса по обществознаниюloksal
 
Overview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance MeasuresOverview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance Measuresserviceresources
 
Krzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl EmersonKrzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl Emersonlpendse
 
Html5fun@東京 Bootstrapにアニメーションを付けよう
Html5fun@東京 Bootstrapにアニメーションを付けようHtml5fun@東京 Bootstrapにアニメーションを付けよう
Html5fun@東京 Bootstrapにアニメーションを付けようMasayuki Abe
 
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...Andrey Sukhobokov
 
Nutritional Intelligence
Nutritional IntelligenceNutritional Intelligence
Nutritional Intelligencebrowncowdesign
 
My Life Project
My Life Project My Life Project
My Life Project yessicavd
 
Indefinite quantities
Indefinite quantitiesIndefinite quantities
Indefinite quantitiesteacherhector
 
Španska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjiziŠpanska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjiziJasmina Nikolic
 
Hist 141 the little ice age
Hist 141   the little ice ageHist 141   the little ice age
Hist 141 the little ice ageflip7rider
 
Telesign impermium webinar deck-121312
Telesign impermium webinar deck-121312Telesign impermium webinar deck-121312
Telesign impermium webinar deck-121312Dean Nicolls
 
javascriptの基礎
javascriptの基礎javascriptの基礎
javascriptの基礎Masayuki Abe
 

Andere mochten auch (20)

My life project
My life projectMy life project
My life project
 
Education Focus Area
Education Focus AreaEducation Focus Area
Education Focus Area
 
Crash course observation lab
Crash course observation labCrash course observation lab
Crash course observation lab
 
Introduction by Dr K
Introduction by Dr KIntroduction by Dr K
Introduction by Dr K
 
презентация элективного курса по обществознанию
презентация элективного курса по обществознаниюпрезентация элективного курса по обществознанию
презентация элективного курса по обществознанию
 
Overview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance MeasuresOverview of CNCS Priorities and Performance Measures
Overview of CNCS Priorities and Performance Measures
 
Krzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl EmersonKrzhizhanovsky 2008 by Professor Caryl Emerson
Krzhizhanovsky 2008 by Professor Caryl Emerson
 
Present simple
Present simplePresent simple
Present simple
 
Html5fun@東京 Bootstrapにアニメーションを付けよう
Html5fun@東京 Bootstrapにアニメーションを付けようHtml5fun@東京 Bootstrapにアニメーションを付けよう
Html5fun@東京 Bootstrapにアニメーションを付けよう
 
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
Simultaneous optimization of Transfer Prices and Flows of Goods in comparison...
 
Nutritional Intelligence
Nutritional IntelligenceNutritional Intelligence
Nutritional Intelligence
 
บทที่ 2 ทวีชัย
บทที่ 2 ทวีชัยบทที่ 2 ทวีชัย
บทที่ 2 ทวีชัย
 
Mitppt
MitpptMitppt
Mitppt
 
My Life Project
My Life Project My Life Project
My Life Project
 
Indefinite quantities
Indefinite quantitiesIndefinite quantities
Indefinite quantities
 
Španska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjiziŠpanska književnost 1 - o tekstu i knjizi
Španska književnost 1 - o tekstu i knjizi
 
Hist 141 the little ice age
Hist 141   the little ice ageHist 141   the little ice age
Hist 141 the little ice age
 
Bucerias
BuceriasBucerias
Bucerias
 
Telesign impermium webinar deck-121312
Telesign impermium webinar deck-121312Telesign impermium webinar deck-121312
Telesign impermium webinar deck-121312
 
javascriptの基礎
javascriptの基礎javascriptの基礎
javascriptの基礎
 

Ähnlich wie CIO Role in War on Terror

Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebeccaBoston Global Forum
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015Patrick Wheeler
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Kayode Yussuf
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 

Ähnlich wie CIO Role in War on Terror (20)

Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 
Catella e-Crime London2015
Catella e-Crime London2015Catella e-Crime London2015
Catella e-Crime London2015
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...Building a secure cyberspace for innovative enterprise, a collective responsi...
Building a secure cyberspace for innovative enterprise, a collective responsi...
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 

Kürzlich hochgeladen

Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxRoquia Salam
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitysandeepnani2260
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...Sebastiano Panichella
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per MVidyaAdsule1
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Sebastiano Panichella
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08LloydHelferty
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptxerickamwana1
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityApp Ethena
 
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...soumyapottola
 
Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Deliveryrishi338139
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE
 

Kürzlich hochgeladen (11)

Application of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptxApplication of GIS in Landslide Disaster Response.pptx
Application of GIS in Landslide Disaster Response.pptx
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber security
 
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...Testing with Fewer Resources:  Toward Adaptive Approaches for Cost-effective ...
Testing with Fewer Resources: Toward Adaptive Approaches for Cost-effective ...
 
General Elections Final Press Noteas per M
General Elections Final Press Noteas per MGeneral Elections Final Press Noteas per M
General Elections Final Press Noteas per M
 
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
Testing and Development Challenges for Complex Cyber-Physical Systems: Insigh...
 
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
Sunlight Spectacle 2024 Practical Action Launch Event 2024-04-08
 
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
05.02 MMC - Assignment 4 - Image Attribution Lovepreet.pptx
 
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunityDon't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
Don't Miss Out: Strategies for Making the Most of the Ethena DigitalOpportunity
 
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
Understanding Post Production changes (PPC) in Clinical Data Management (CDM)...
 
Scootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City DeliveryScootsy Overview Deck - Pan City Delivery
Scootsy Overview Deck - Pan City Delivery
 
GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024GESCO SE Press and Analyst Conference on Financial Results 2024
GESCO SE Press and Analyst Conference on Financial Results 2024
 

CIO Role in War on Terror

  • 1. War Against Terrorism: The Role of Today’s CIO Ayo Rotibi Managing Director Forts & Shields Ltd (US, Kenya, Nigeria)
  • 2. “The Internet is a prime example of how terrorists can behave in a truly transnational way; in response, States need to think and function in an equally transnational manner.” Ban ki-moon
  • 3. The Art of War The Art of War is simple enough. Find out where your enemy is. Get at him as soon as you can. Strike him as hard as you can and as often as you can, and keep moving on.(Ulysses S. Grant) 18th US President. Led the Union to victory over the Confederacy in the American Civil War
  • 4. www.terror.net – The Modern Terrorists Internet-aided terrorism is a dynamic phenomenon and transnational Terrorist websites target three different audiences: current and potential supporters; international public opinion; and enemy publics Ways contemporary terrorists use the Internet: •From conducting psychological warfare to gathering information, from training to fundraising, from propagandizing to recruiting, and from networking to planning and coordinating terrorist acts.
  • 5. www.terror.net – The Modern Terrorists Workplace has been the primary target of terrorism •WTC Building, Garisa University, Westgate Mall Many workplaces upon which citizens rely to reach work are relatively unprotected •St Pancreas Underground "We use Facebook to schedule the protests, Twitter to co-ordinate and YouTube to tell the world.“ An Egyptian Arab Spring Activist
  • 6. www.terror.net – The Modern Terrorists Dateline: September 2013 •Al Qaeda opens first official Twitter account •@shomokhalislam, issued 29 tweets, followed one account, and attracted 1,532 followers in 24 hours (including several high-profile digital jihadists) @shomokhalislam
  • 7. www.terror.net – The Modern Terrorists Breaking News... Amazon Halts sales of ISIS propaganda Magazine
  • 8. Darknet – The New Terror Frontier Adopted platform for direct communication among global jihadi activists • Over 50,000 sites and 300 forums for terrorist organizations • Used to distribute material for recruitment, training, and coordination of terrorist • Informed the travel warning and closure of some US embassies in August 2013
  • 9. Darknet – The New Terror Frontier A Course in the Art of Recruiting • https://ia800300.us.archive.org/32/items/ACourseInTheArtOfRecruiting- RevisedJuly2010/A_Course_in_the_Art_of_Recruiting_-_Revised_July2010.pdf ISIS and the Lonely Young American • http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html
  • 10. Kenya’s Global Terrorism Index (GTI) Year Incidents Fatalities Injuries Properties GTI Rank (out of 162) 2009 1 0 0 0 4.47 27 2010 12 19 159 4 4.81 24 2011 38 37 98 7 5.15 19 2012 73 98 410 34 6.06 14 2013 74 201 442 22 6.58 12 http://www.visionofhumanity.org/#page/indexes/terrorism-index/2013/KEN/FATA
  • 11. Cyber-threat Barometer: Any Ideas? Leading Cyber Attack Method •Social Engineering Leading Threat •Insider (with Authorized Access) Leading Vulnerability •People
  • 12. Kenya’s Cyber Goals Enhance the nation’s cybersecurity posture in a manner that facilitates the country’s growth, safety, and prosperity. Build national capability by raising cybersecurity awareness and developing Kenya’s workforce to address cybersecurity needs. Foster information sharing and collaboration among relevant stakeholders to facilitate an information sharing environment focused on achieving the Strategy’s goals and objectives.
  • 13. Insider threat Have legitimate access to systems Often familiar with the organization's data Abuse privileges to harm the organization Circumvent security controls of which they are aware Have physical proximity to data Harder to defend against than attacks from outsiders
  • 14. The 58% Theory-The Insider Family The Rogue Employee •AKA: Shadow IT, Rogue IT •Description: They have many aliases, but one definite goal – to take valuable data and leverage it into monetary gain, revenge or even some revolutionary crusade
  • 15. The 58% Theory-The Insider Family Fired / Disgruntled Worker •AKA: Pinch a Penny from a 1 million Transactions •Description: Think Office Space – where workers on their way out devise a way to rip off the company
  • 16. The 58% Theory-The Insider Family 3rd Party and Outside Insider •AKA: The Ulterior Motivator •Description: Your temporary contractor or third-party vendor is around so much that your office is almost his second home. He may fraternize with employees and gain the trust of your crew – but who is really watching over
  • 17. The 58% Theory-The Insider Family Inadvertent Users •AKA: Not the Brightest Crayon in the Box •Description: Believe it not, inadvertent insider threats make up a good portion of data breaches– thanks to the consumerization of IT, the mobility of data and the smartphone trend, it is easier for company data to move beyond traditional firewalls
  • 18. The 58% Theory-The Insider Family Personalization Guru •AKA: The Guy Who Brings Home to Work •Description: This guy is a disaster waiting to happen. They are the ones who want their workstation to be a basic clone of their personal laptop. They want to have all the applications, tools and software –to bypass admin rights
  • 19. The 58% Theory-The Insider Family The Night Janitor •AKA: The Unsuspecting Pirate •Description: The support staff is in your office at strange hours with no supervision really at all. Don't let the false characterizations and stereotypes fool you – criminals and social engineers would not lose a sweat getting employed as a janitor just to have your server room to themselves.
  • 20. Exposure in the Workplace Types of Sensitive Corporate Information Employees Access (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
  • 21. Exposure in the Workplace Types of Personal Tasks Employees Do in the Workplace (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
  • 22. Exposure in the Workplace Content Accessed on Mobile Devices As Permitted By Enterprise (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)
  • 23. Food For Thought What Will You Do If You Knew You Were Under Surveillance?
  • 24. 4 Cyber-Breach Questions What: •Happened? Was Stolen? Was Compromised? How: •Did They Do It? To Prevent Reoccurrence? Who: •Did It? Is Affected? When: •Did They Do It? Can Recovery Begin?
  • 25. CIOs must leverage this singular advantage and take a stand on the new encryption regime introduced by FB, Google and Apple Nothing is Hidden Under the Hood Every online activity leaves a Digital Footprint
  • 26. The Role of The CIO Due Care: Conduct a reasonable person would exercise in a particular situation •Security is Good Business •Security is Everybody’s Business Due Diligence: Gathers facts to make an informed decision •Additional Internal Control procedure – Network Forensics Threat awareness, assessment, and perception Efficient information flow within corporations, between corporations, and between corporations and local and federal government agencies
  • 27. National Domestic Communication Assistance Center Core functions: • Law Enforcement Coordination • Industry Relations • Technology Sharing • CALEA Implementation Government's first ever attempt to develop a centre for electronic surveillance knowledge management, and facilitate the sharing of technical solutions and know- how among law enforcement agencies
  • 28. What if... ...we all work together for a common purpose? ...we aspire to build a Regional NDCAC to foster stronger collaboration and complement Kenya CIRT/CERT? ...we foster stronger collective relationship with LEA and Government ...we leave this conference with a resolution to make SOMETING happen? ...we...?
  • 29. Proposed Initiatives Initiate targeted knowledge dissemination programs Provide real time knowledge dissemination to corporate members Develop lessons learned from corporate incidences Modify existing Users and Internet Usage Policies to include Internal Surveillance Establish a Regional NDCAC
  • 30. A Little Story Breaking News Eiffel Tower for Sale! Moral Lesson: Share Information
  • 31. Conclusion CIOs have been dragged into the War Against Terrorism The Enterprise landscape has changed forever – FACT The Internet offers us opportunity to prevent, detect and deter acts of terrorism CIOs have a responsibility to secure their enterprise CIOs need to know about human psychology and behavioural attitude Real-time Digital Forensics will become a major tool in identifying these threat agents CIO must determine that their enterprise network does not become a recruitment ground or a conduit for fund- raising and propaganda
  • 32. For Further Information and Demo: •Email: arotibi@isecureconsulting.com •Phone: +254-786-834-158, +254-772-299-802 •Skype: arotibi •Forts & Shields, 63 Mandera Rd, Kileleshwa, Nairobi, Kenya •www.fortsandshields.com •www.isecureconsulting.com Questions