R V; Present And Upcoming Cyber Security Threats - Ruv

Transcription

MagentaSecurityPRESENT AND UPCOMINGcyber SECURITY THREATSThomas TschersichThomas TSCHERSICH@TTSCHERSICHTHOMAS TSCHERSICH TELEKOMSECURITY

Security is the Foundation of DigitazationIPALL IS SECURETHOMAS TSCHERSICH TELEKOM SECURITY

BUT HOW DOESREALITYLOOK LIKE?THOMAS TSCHERSICH TELEKOM SECURITY

GERMANY:CYBERATTACKSARE REAL ANDINCREASINGEvery 3minutes60%ALMOST55 BN. A company is attackedOf all cyber attacks aredirected against mid-sizebusinessDamage of the Germaneconomy PER YEARBased on im-fadenkreuz-von-cyberkriminellen-31276.THOMAS TSCHERSICH TELEKOM SECURITY

LET’S HAVE A CLOSERLOOK THOMAS TSCHERSICH TELEKOM SECURITY

Attacks on critical infrastructure are real!SEP 2010MAy 2015DEc 2015NOV 2016MAY 2017Destruction ofindustrial plantsCompleteexchange of IT80.000 peoplewithout power900.000 peoplewithout internetLong-lastingIT outtagesATTACK ONIRANIANNUCLEARPROGRAMAttack ongermanPARLIAMENTattack onUKRAINIANpower gridBotnetAttack onHOME RouterSRansomwareattack onDESKTOP PCsTHOMAS TSCHERSICH TELEKOM SECURITY

common attacks on critical infrastructureAMOUNT OF ATTACKS WITHIN 5 MONTHSINCREASE BY APPROX. 40%RANSOMWAREPHISHING01020OCTOBER 2017304050607080FEBRUARY 2018** PERIOD OF COLLECTION; AMOUNT OF ATTACKS COMPARED TO EACH OTHERTHOMAS TSCHERSICH TELEKOM SECURITYSource: Monitor IT-Sicherheit Kritischer Infrastrukturen 2.0

LET’S TALK ABOUTATTACK(ER)S THOMAS TSCHERSICH TELEKOM SECURITY

Attacks are EVOlVING OVER TIMECryptotrojanS?RANSOMWAREVIRUSES edHANDHELDSDenial ofService20132020THOMAS TSCHERSICH TELEKOM SECURITY

various attackers BUT same telligenceservicesMotivationFAME AND HONOR,FUN AND GAMESFRAUD, BLACKMAIL,MONEY LAUNDERINGEXPRESSING Y INDIVIDUALSWELL-ORGANIZEDGROUPS, WORLDWIDEDISTRIBUTION, VASTFUNDING AVAILABLEWELL-ORGANIZEDGROUPS, ”FUNDINGExamplesDEFACING WEBSITES,REPORTINGVULNERABILITIES TOTHE PUBLIC, PHISHING, DDOS,SPAM, DDOS, INFORMATIONLEAKAGE, TARGETED ATTACKS,DDOS, THOMAS TSCHERSICH TELEKOM SECURITY

HOW DO THEY WORK?THOMAS TSCHERSICH TELEKOM SECURITY

attackers are faster than defendersTIME SPENT FORPRE-ATTACK60 % OF ALL CASESRESEARCHTIME TOCOMPROMISE DATA56 % OF ALL CASESAFTER BREAK-INTIME TO DISCOVER79 % OF ALL CASESBREAK-INTIME FORCONTAINMENT AND64% OF ALL CASESCLEAN UPMINUTESHOURSDAYSTHOMAS TSCHERSICH TELEKOM SECURITYWEEKSMONTHSSource: Verizon Breach Report.

ATTACKERS ARE INNOVATIVE AND CONTINUE TO EVOLVEZERO DAY EXPLOITSATTACKS ONAUTONOMOUSVEHICLESRANSOMWAREATTACKS ONFIRMWARE90% of corporate networks are protectedBut only 10% of industrial networksATTACKS ON POWER/HEATING SYSTEMSATTACKS ONCLOUD SERVICESSPEAR PHISHING &FAKED IDENTITIESTHOMAS TSCHERSICH TELEKOM SECURITYATTACKS ONPRODUCTION PLANTS(SCADA SYSTEMS)

ARE DEFENDERSPREPARED?THOMAS TSCHERSICH TELEKOM SECURITY

HAVE YOU EVER SEEN THAT?THOMAS TSCHERSICH TELEKOM SECURITY

WANNACRY: ANATOMY OF A ZERO-DAY VULNERABILITYsince 2012 March 12thAPRILMay 12thJune 27th2017CIA/NSA usevulnerabilityMicrosoftMicrosoft WikiLeaksPatch for went public Patch forsupported & EXPLOIT outdated OSAVAILABLEOSZero Day PhaseKnown problem PhaseNoPetyaAVOIDABLETROUGHPATCHIgnorance PhaseTHOMAS TSCHERSICH TELEKOM SECURITY

THE ONLY ANSWER IS TO PATCH!THOMAS TSCHERSICH TELEKOM SECURITY

SO WHAT ARETHE CHALLANGES?THOMAS TSCHERSICH TELEKOM SECURITY

TODAY’S BIggEST CHALLENgES fOR SECURITYCost pressureIncreasing attacksurfaceMissing Securityby designLack of expertiseComplex ProductsTHOMAS TSCHERSICH TELEKOM SECURITY

AND WHAT ISTHE WAY OUT?THOMAS TSCHERSICH TELEKOM SECURITY

Future Trends in Cyber SecurityCooperation between industry, research and politicsResponsibility during the whole digital supply chainExchange regarding vulnerabilitiesCertification & update requirementsPRODUCER’S LIABILITYTHOMAS TSCHERSICH TELEKOM SECURITY

MAGENTASECURITYTHANK YOU!T-SYSTEMS INTERNATIONAL GMBHTELEKOM SECURITYTHOMAS TSCHERSICH TELEKOM SECURITY

MAy 2015 attack on UKRAINIAN power grid 80.000 people without power DEc 2015 Ransomware attack on DESKTOP PC s Long-lasting IT outtages MAY 2017 Botnet-Attack on . Future Trends in Cyber Security. THOMAS TSCHERSICH TELEKOM SECURITY MAGENTA SECURITY THANK YOU! T-SYSTEMS INTERNATIONAL GMBH TELEKOM SECURITY. Title: