SlideShare a Scribd company logo
1 of 21
Achieving Caribbean Cyber
Security
Shiva Bissessar, BSc (Hons), MBA, MSc
Managing & Technical Director
Pinaka Technology Solutions
@Beascycle
• 17 years ICT experience, 5 of which in Senior Professional
roles delivering major Telecommunications and
Information Security projects.
• 2008: Founding member of Information Security focused
Organizational Unit. Established digital forensics lab, had
oversight of vulnerability analysis and penetration testing,
assisted policy development process.
• M.Sc. Information Security comes from University College
London
• Information Security Advisory & ICT Programme
Management
In Brief
The Caribbean Is Immune…Is it?
• Feb 2014: NGC issues Invitation to prequalify document for
Audit Services citing: “Information and Communication
Technology, Systems and Controls review” and
“CYBERCrime” (Trinidad)
• Nov 2013: TSTT issues Network & Session Initiation Protocol
(SIP) Security Audit RFP. Prior news reports speak to several
mobile and bypass fraud activities (Trinidad)
• Nov 2013: Flow identifies cybersecurity as a major threat
(Jamaica)
• Mar 2012: LIME Internet infrastructure attacked (Barbados)
http://www.digitalattackmap.com/
DDoS Activity: Destination TT, Dec 26th 2013
TT Parliament Website hacked, April 2012
“Greatz to admin, Your website hacked due to security
vulnerabilities, patch your website, keep it updated.
Don’t worry all your files and your database are still
here. This is a warning, what other hackers can do to
your website. Keep it in mind,”
CoD3X
What is Cyber Security?
Source: Adapted from ISO, ISO/IEC FCD 27032, Information technology—Security techniques—Guidelines for cybersecurity, May, 2011.
http://www.unapcict.org/ecohub/apcict-knowledge-sharing-series-cybersecurity/at_download/attachment1
Cybercrime & Developing Economies
McAfee Net Losses: Estimating the Global Cost of Cybercrime Economic impact of cybercrime II
• Cybercrime produces high returns at low risk and (relatively) low cost for the
hackers.
• Most cybercrime incidents go unreported. Few of the biggest cybercriminals
have been caught or even identified.
• High-income countries loss averaged 0.9% GDP & developing economies loss
averaged 0.2% of GDP
• Trend can shift as developing economies increase their access to and use of
the internet for commercial purposes and as cybercriminals continue to
refocus their activities onto mobile platforms
• Wealthier countries are more attractive targets for hackers but they also
have better defenses. Developing economies are more vulnerable.
• Strong correlations between national income levels and losses from
cybercrime since risk for cybercriminals is the same (rich or poor target)
Varying Levels of Caribbean Readiness
• International bodies incl. OAS, ITU, Commonwealth
Cybercrime Initiative (CCI), are ready and willing to assist,
however there seems to be a lack of corresponding urgency
or inability to receive such assistance, on behalf of Caribbean
governments. Lack of cyber security champions on board!
• There is an undertow of dissatisfaction with the model law
documents produced from EGRIP and HIPCAR exercises. This
is not only at the technical level!
• Dominica novel approach to seek guidance from CCI in
executing a Cyber-security Needs Assessment Workshop and
ensure legislative efforts and Cybercrime Strategy is in
accordance with Budapest Convention on Cybercrime.
Authoritative Sources of Information
• 2012: OAS, CICTE & CTU Cyber Security Framework
Very digestible providing short, medium & long-
term prioritization of recommendations towards
implementation for Caribbean
• 2014: OAS/Symantec
Cyber Security
trends &
development in 13
CARICOM states
• 2012: UNESCAP /
ACPiCT, General
Understanding of
Cyber Security
• 2011: ITU
Comprehensive
Cyber Security
National Strategy
guide
• CTO website:
National Cyber
Security strategies
from various
countries
• 2013: UNODC
Comprehensive
Study on
Cybercrime
CARICOM Cyber Security Impediments
Member
Recognition
Strategy,
Policy Legislation CSIRT Funding People
Capacity
Building Awareness
Ant. & Barbuda X X X X
Barbados X
Dominica X X X
Grenada X
Guyana X X X
Hati X X
Jamaica X X X
St. Kitts & Nevis
X X X
STVG
Suriname X X X X X
TTO X X X X
Distilled from: OAS/Symantec Latin American + Caribbean Cyber Security Trends, June 2014
• National Cyber Security Strategy (NCSS)
• Framework, Agenda, Strategy, Policy
• Legislation
• Council of Europe Budapest Convention
• Cybercrime Unit
• Digital forensics, investigations cybercrime
• CSIRT
• Collaboration, partnerships, communication within CSIRT network
• Capacity building
• Awareness
• Child protection, cyber security, phishing, email security etc
• Education
• Availability of tertiary education in area of Information Security
• Info Sharing, Incident Reporting
• Legal obligation to report incidents
• Information sharing between private sector and Government
• Statistics & Benchmarking
• International Assistance
• OAS, CTU, CICTE
• ITU, Commonwealth Secretariat, CCI, IMPACS
Common Themes in Cyber Security Development
Current legislative approach working?
Missing Components
• Lack of technical expertise (capacity building only
after the fact)
• The Cybersecuirty champion (need someone to drive
the local/regional effort)
• Intersection between Policy and Technology gap to be
filled
• Private sector involvement (lots to learn from private
sector her
Proposed Cyber Security NCCS Aims & Structure
Structure
1) Executive summary.
2) Introduction.
3) Strategic national vision on cyber security.
4) Relationship of the NCSS with other strategies, both national and international, and
existing legal frameworks.
5) Guidance principles.
6) Relationship with other strategies, both national and international, and existing legal
frameworks.
7) Cyber security objective(s), preferably one to four.
8) Outline of the tactical action lines.
9) Glossary, preferably based on an international harmonised set of definitions.
10) [Optional] Annex. Envisioned operational activities defined in a SMART way
Aims
1) To align the whole of government
2)To coherently focus and coordinate public and private planning and to convey the
envisioned roles, responsibilities and relationships between all stakeholders
3) To convey one’s national intent to other nations and stakeholders.
Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security strategies." International journal of critical infrastructures 9, no. 1 (2013): 3-31.
Noteworthy NCSS Vision, Objectives & Principles
Nation Statement
Vision
Estonia
Advocates international cooperation and supports the
enhancement of cyber security in other countries
8 nations
Economic prosperity of the digital society including AUS, GER, UK,
IND , JPN , UGA
Objective
France
Stated ambition to become a world power in cyber security and
maintain information superiority within cyberspace
Japan
Explicitly recognizes the need for agile adaption to new and
upcoming cyber security threats including IPv6, appliances & cloud
computing
UK
Use of intelligence on adverse actors to disrupt cyber crime and to
reduce the motivation and capabilities of cyberspace adversaries
Guiding
Principles
8 nations Civil liberties and other (inter)national democratic core values
8 nations Cooperation and public-private partnerships (PPP)
All nations explicitly address protection of their own CIs including
the government’s own ICT (except Uganda)
All nations but mention plan to develop a cyber security awareness
programme. (except South Africa)
Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security strategies." International journal of critical infrastructures 9, no. 1 (2013): 3-31.
TT Cybercrime Bill 2014, §23 "Offence by body
corporate"
Where a body corporate commits an offence under
this Act and the Court is satisfied that a director,
manager, secretary or other similar officer of the body
corporate, or any person who purports to act in such capacity–
(a) connived in or consented to the commission
of the offence; or
(b) failed to exercise due diligence to prevent the
commission of the offence,
the director, manager, secretary or other similar officer or
person purporting to act in that capacity also commits the
offence.
Information Security
Governance Required
• This now places responsibility and
accountability on an individual within the
organization to ensure that said
organizations’ ICT infrastructure, processes
and people do not pose a threat to the public
network and its constituents which also
includes “critical infrastructure” elements.
I’m Safe…Bought Latest Hardware Solution
Securing People and Processes
• Information Security must become part of Risk Management
strategy.
• Senior/Executive management must have oversight and be
responsible for the Information Security Governance.
• Information Security must be properly aligned with
organizational structure and organizational behaviour.
• Information Security specific roles
• Change user behaviours to foster culture of Information
Security.
Securing People and Processes
• Information Security at design stage of project’s System
Development Life Cycle
• Continuous awareness of the evolution of external (and
internal) threats.
• When incidents do occur proper escalation procedures and
remediation efforts need to be put in place.
• Controls and response in accordance with International
Information Security standards such as ISO 27001 (2013).
Shiva Bissessar, BSc (Hons), MBA, MSc
Managing & Technical Director
Pinaka Technology Solutions
@Beascycle
18686785078
spbisses@gmail.com
technewstt.com/ttcybercrime
www.slideshare.net/ShivaBissessar1

More Related Content

What's hot

Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Benjamin Ang
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategiesBenjamin Ang
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportBenjamin Ang
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...BCM Institute
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Benjamin Ang
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesKroll
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017IGN MANTRA
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteWork-Bench
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 

What's hot (18)

Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
Lessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI ReportLessons learned from the SingHealth Data Breach COI Report
Lessons learned from the SingHealth Data Breach COI Report
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
Workshop Computer & Cyber Security, STTB Bandung, 23 Desember 2017
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 

Similar to Achieving Caribbean Cybersecuirty

WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachITU
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfjasonuchiha2
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.AbutalebFahmi Albaheth
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...greendigital
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
What is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesWhat is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesFluidscapes
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 

Similar to Achieving Caribbean Cybersecuirty (20)

WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Protecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approachProtecting Critical Infrastructure: a multi-layered approach
Protecting Critical Infrastructure: a multi-layered approach
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Cybercrime Surveillance.docx
Cybercrime Surveillance.docxCybercrime Surveillance.docx
Cybercrime Surveillance.docx
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
What is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesWhat is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapes
 
C3i Group Cyber Law
C3i Group Cyber LawC3i Group Cyber Law
C3i Group Cyber Law
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 

More from Shiva Bissessar

UR Caribbean Pinaka 2019
UR Caribbean Pinaka 2019UR Caribbean Pinaka 2019
UR Caribbean Pinaka 2019Shiva Bissessar
 
Caribbean CBR de-risking & blockchain
Caribbean CBR de-risking & blockchainCaribbean CBR de-risking & blockchain
Caribbean CBR de-risking & blockchainShiva Bissessar
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection MeasuresShiva Bissessar
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintShiva Bissessar
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationShiva Bissessar
 
Threats to your identity online
Threats to your identity onlineThreats to your identity online
Threats to your identity onlineShiva Bissessar
 
Digital currencies new technology new business model
Digital currencies new technology new business modelDigital currencies new technology new business model
Digital currencies new technology new business modelShiva Bissessar
 

More from Shiva Bissessar (8)

UR Caribbean Pinaka 2019
UR Caribbean Pinaka 2019UR Caribbean Pinaka 2019
UR Caribbean Pinaka 2019
 
Caribbean CBR de-risking & blockchain
Caribbean CBR de-risking & blockchainCaribbean CBR de-risking & blockchain
Caribbean CBR de-risking & blockchain
 
Threats & Cyber Protection Measures
Threats & Cyber Protection MeasuresThreats & Cyber Protection Measures
Threats & Cyber Protection Measures
 
Protecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital FootprintProtecting Financial Records, Privacy & Digital Footprint
Protecting Financial Records, Privacy & Digital Footprint
 
Caribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpationCaribbean needs more inclusive approach towards digital economy particpation
Caribbean needs more inclusive approach towards digital economy particpation
 
Threats to your identity online
Threats to your identity onlineThreats to your identity online
Threats to your identity online
 
Caribbean DDoS activity
Caribbean DDoS activityCaribbean DDoS activity
Caribbean DDoS activity
 
Digital currencies new technology new business model
Digital currencies new technology new business modelDigital currencies new technology new business model
Digital currencies new technology new business model
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Achieving Caribbean Cybersecuirty

  • 1. Achieving Caribbean Cyber Security Shiva Bissessar, BSc (Hons), MBA, MSc Managing & Technical Director Pinaka Technology Solutions @Beascycle
  • 2. • 17 years ICT experience, 5 of which in Senior Professional roles delivering major Telecommunications and Information Security projects. • 2008: Founding member of Information Security focused Organizational Unit. Established digital forensics lab, had oversight of vulnerability analysis and penetration testing, assisted policy development process. • M.Sc. Information Security comes from University College London • Information Security Advisory & ICT Programme Management In Brief
  • 3. The Caribbean Is Immune…Is it? • Feb 2014: NGC issues Invitation to prequalify document for Audit Services citing: “Information and Communication Technology, Systems and Controls review” and “CYBERCrime” (Trinidad) • Nov 2013: TSTT issues Network & Session Initiation Protocol (SIP) Security Audit RFP. Prior news reports speak to several mobile and bypass fraud activities (Trinidad) • Nov 2013: Flow identifies cybersecurity as a major threat (Jamaica) • Mar 2012: LIME Internet infrastructure attacked (Barbados)
  • 5. TT Parliament Website hacked, April 2012 “Greatz to admin, Your website hacked due to security vulnerabilities, patch your website, keep it updated. Don’t worry all your files and your database are still here. This is a warning, what other hackers can do to your website. Keep it in mind,” CoD3X
  • 6. What is Cyber Security? Source: Adapted from ISO, ISO/IEC FCD 27032, Information technology—Security techniques—Guidelines for cybersecurity, May, 2011. http://www.unapcict.org/ecohub/apcict-knowledge-sharing-series-cybersecurity/at_download/attachment1
  • 7. Cybercrime & Developing Economies McAfee Net Losses: Estimating the Global Cost of Cybercrime Economic impact of cybercrime II • Cybercrime produces high returns at low risk and (relatively) low cost for the hackers. • Most cybercrime incidents go unreported. Few of the biggest cybercriminals have been caught or even identified. • High-income countries loss averaged 0.9% GDP & developing economies loss averaged 0.2% of GDP • Trend can shift as developing economies increase their access to and use of the internet for commercial purposes and as cybercriminals continue to refocus their activities onto mobile platforms • Wealthier countries are more attractive targets for hackers but they also have better defenses. Developing economies are more vulnerable. • Strong correlations between national income levels and losses from cybercrime since risk for cybercriminals is the same (rich or poor target)
  • 8. Varying Levels of Caribbean Readiness • International bodies incl. OAS, ITU, Commonwealth Cybercrime Initiative (CCI), are ready and willing to assist, however there seems to be a lack of corresponding urgency or inability to receive such assistance, on behalf of Caribbean governments. Lack of cyber security champions on board! • There is an undertow of dissatisfaction with the model law documents produced from EGRIP and HIPCAR exercises. This is not only at the technical level! • Dominica novel approach to seek guidance from CCI in executing a Cyber-security Needs Assessment Workshop and ensure legislative efforts and Cybercrime Strategy is in accordance with Budapest Convention on Cybercrime.
  • 9. Authoritative Sources of Information • 2012: OAS, CICTE & CTU Cyber Security Framework Very digestible providing short, medium & long- term prioritization of recommendations towards implementation for Caribbean • 2014: OAS/Symantec Cyber Security trends & development in 13 CARICOM states • 2012: UNESCAP / ACPiCT, General Understanding of Cyber Security • 2011: ITU Comprehensive Cyber Security National Strategy guide • CTO website: National Cyber Security strategies from various countries • 2013: UNODC Comprehensive Study on Cybercrime
  • 10. CARICOM Cyber Security Impediments Member Recognition Strategy, Policy Legislation CSIRT Funding People Capacity Building Awareness Ant. & Barbuda X X X X Barbados X Dominica X X X Grenada X Guyana X X X Hati X X Jamaica X X X St. Kitts & Nevis X X X STVG Suriname X X X X X TTO X X X X Distilled from: OAS/Symantec Latin American + Caribbean Cyber Security Trends, June 2014
  • 11. • National Cyber Security Strategy (NCSS) • Framework, Agenda, Strategy, Policy • Legislation • Council of Europe Budapest Convention • Cybercrime Unit • Digital forensics, investigations cybercrime • CSIRT • Collaboration, partnerships, communication within CSIRT network • Capacity building • Awareness • Child protection, cyber security, phishing, email security etc • Education • Availability of tertiary education in area of Information Security • Info Sharing, Incident Reporting • Legal obligation to report incidents • Information sharing between private sector and Government • Statistics & Benchmarking • International Assistance • OAS, CTU, CICTE • ITU, Commonwealth Secretariat, CCI, IMPACS Common Themes in Cyber Security Development
  • 13. Missing Components • Lack of technical expertise (capacity building only after the fact) • The Cybersecuirty champion (need someone to drive the local/regional effort) • Intersection between Policy and Technology gap to be filled • Private sector involvement (lots to learn from private sector her
  • 14. Proposed Cyber Security NCCS Aims & Structure Structure 1) Executive summary. 2) Introduction. 3) Strategic national vision on cyber security. 4) Relationship of the NCSS with other strategies, both national and international, and existing legal frameworks. 5) Guidance principles. 6) Relationship with other strategies, both national and international, and existing legal frameworks. 7) Cyber security objective(s), preferably one to four. 8) Outline of the tactical action lines. 9) Glossary, preferably based on an international harmonised set of definitions. 10) [Optional] Annex. Envisioned operational activities defined in a SMART way Aims 1) To align the whole of government 2)To coherently focus and coordinate public and private planning and to convey the envisioned roles, responsibilities and relationships between all stakeholders 3) To convey one’s national intent to other nations and stakeholders. Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security strategies." International journal of critical infrastructures 9, no. 1 (2013): 3-31.
  • 15. Noteworthy NCSS Vision, Objectives & Principles Nation Statement Vision Estonia Advocates international cooperation and supports the enhancement of cyber security in other countries 8 nations Economic prosperity of the digital society including AUS, GER, UK, IND , JPN , UGA Objective France Stated ambition to become a world power in cyber security and maintain information superiority within cyberspace Japan Explicitly recognizes the need for agile adaption to new and upcoming cyber security threats including IPv6, appliances & cloud computing UK Use of intelligence on adverse actors to disrupt cyber crime and to reduce the motivation and capabilities of cyberspace adversaries Guiding Principles 8 nations Civil liberties and other (inter)national democratic core values 8 nations Cooperation and public-private partnerships (PPP) All nations explicitly address protection of their own CIs including the government’s own ICT (except Uganda) All nations but mention plan to develop a cyber security awareness programme. (except South Africa) Luiijf, Eric, Kim Besseling, and Patrick De Graaf. "Nineteen national cyber security strategies." International journal of critical infrastructures 9, no. 1 (2013): 3-31.
  • 16. TT Cybercrime Bill 2014, §23 "Offence by body corporate" Where a body corporate commits an offence under this Act and the Court is satisfied that a director, manager, secretary or other similar officer of the body corporate, or any person who purports to act in such capacity– (a) connived in or consented to the commission of the offence; or (b) failed to exercise due diligence to prevent the commission of the offence, the director, manager, secretary or other similar officer or person purporting to act in that capacity also commits the offence.
  • 17. Information Security Governance Required • This now places responsibility and accountability on an individual within the organization to ensure that said organizations’ ICT infrastructure, processes and people do not pose a threat to the public network and its constituents which also includes “critical infrastructure” elements.
  • 18. I’m Safe…Bought Latest Hardware Solution
  • 19. Securing People and Processes • Information Security must become part of Risk Management strategy. • Senior/Executive management must have oversight and be responsible for the Information Security Governance. • Information Security must be properly aligned with organizational structure and organizational behaviour. • Information Security specific roles • Change user behaviours to foster culture of Information Security.
  • 20. Securing People and Processes • Information Security at design stage of project’s System Development Life Cycle • Continuous awareness of the evolution of external (and internal) threats. • When incidents do occur proper escalation procedures and remediation efforts need to be put in place. • Controls and response in accordance with International Information Security standards such as ISO 27001 (2013).
  • 21. Shiva Bissessar, BSc (Hons), MBA, MSc Managing & Technical Director Pinaka Technology Solutions @Beascycle 18686785078 spbisses@gmail.com technewstt.com/ttcybercrime www.slideshare.net/ShivaBissessar1

Editor's Notes

  1. (less IP in lesser developed, better accounting in high inc) (banks deny attacks, lesser developed nations do not collect data ).
  2. Other CTO website: National Cyber Security strategies from various countries Advanced re cybercrime: UNODC Comprehensive Study on Cybercrime (Draft—February 2013)