. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - - PowerPoint PPT Presentation

breakfast business seminars autumn 2015
SMART_READER_LITE
LIVE PREVIEW

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - - PowerPoint PPT Presentation

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


slide-1
SLIDE 1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Cyber Security: Protecting your business from attack

Breakfast Business Seminars, Autumn 2015 Wednesday 14 October 2015

slide-2
SLIDE 2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Build your business with our Autumn seminars

Wednesday 14 October: Cyber Security Wednesday 11 November: Social Media cranfieldtechnologypark.co.uk

slide-3
SLIDE 3

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Phil Cobley

Regional Cyber Protect Coordinator ERSOU (East Region Special Operations Unit) Cyber Security

slide-4
SLIDE 4

Cyber Security and Cyber Criminality:

The Facts

Sergeant Phil Cobley Regional Cyber Crime Unit

slide-5
SLIDE 5

What we shall discuss…

n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime

Investigations?

n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute

slide-6
SLIDE 6

Firstly…who is this guy?!

n 10 years experience in the Police n Was previously the Digital Forensics Manager and Cyber

Crime Investigations Manager at Bedfordshire Police

n Now the Regional Cyber Protect Coordinator n Qualified Digital Forensics Practitioner and Network

Investigator

n Currently studying BSc Software Development n Force Practitioner Lead on Cybercrime n Guest Lecturer at University of Bedfordshire on Cyber Crime n Sit on the National ISO 17025 Standards Expert Network n Published in the law Journal ‘Cyber Security Law & Practice’ n Co-authored the recently released eBook produced by the

NCCR – “A Practical Guide to Coping with Cyberstalking”

slide-7
SLIDE 7

What is Cyber Crime?

slide-8
SLIDE 8

Cyber crime IS crime…

The adopted definition of Cyber Crime is:

  • Cyber Dependent Crimes, where a digital system is the target as

well as the means of attack. These include attacks on computer systems to disrupt IT infrastructure, and stealing data over a network using malware (the purpose of the data theft is usually to commit further crime).

  • Cyber Enabled Crimes. ‘Existing’ crimes that have been

transformed in scale or form by their use of the Internet. The growth

  • f the Internet has allowed these crimes to be carried out on an

industrial scale.

  • The use of the Internet to facilitate drug dealing, people smuggling

and many other 'traditional' crime types.

slide-9
SLIDE 9

Think Digital

slide-10
SLIDE 10

Think Digital

slide-11
SLIDE 11

Which of these is a cyber threat? Common house hold ‘smart’ goods are now being hacked and used in Spam and DDOS activity

slide-12
SLIDE 12

Is it really such a big deal?

slide-13
SLIDE 13

We live our lives online

3bn people will be using the internet worldwide by 2016 and by the end of the year, networked devices will

  • utnumber people by six to one

On average each household has 3 internet enabled devices and 2/5 adults have smart phones 8% of GDP generated through the internet economy £121bn in 2010 with Household annual retail sales worth £2.6bn with 30% year on year growth

slide-14
SLIDE 14

£27billion – 2% GDP (Detica 2011)

n

£21 billion to business

n

£2.2 billion to government

n

£3.1 billion to ‘Jo Public’

n

44m cyber attacks in 2011 in UK

Estimated cost of Cyber Crime…

National Security Strategy Tier 1 threat

slide-15
SLIDE 15

n One in three adults suffered online

crime in the previous 12 months

n One in five suffered offline crime

Federation of Small Business (21/05/12) 41% of members suffered cyber crime In the last 12 months cost of £800m 20% had taken no steps to protect themselves

Crime Survey for England & Wales 2012

slide-16
SLIDE 16

Regional & Local Capabilities within Law Enforcement

slide-17
SLIDE 17

National Regional Organised Crime Units (ROCUs)

(NEROCU) (ODYSSEY) (ZEPHYR) (WMROCU) (SEROCU) (London ROCU) (TARIAN) (TITAN) (EMSOU) (ERSOU)

slide-18
SLIDE 18

NCA

Regional Organised Crime Units (ERSOU)

Local Forces

(Beds, Herts, Cambs, Norfolk, Suffolk & Essex)

National/ International Cross Border First Responders & Local Investigations

National Structure

slide-19
SLIDE 19

Local Investigation:

n SME n Insider Threat n Data deletion / Website Defaced / Malicious Transactions

Regional Investigation:

n Large Corporation n £14m worth of data extracted over several months n Multiple offenders across several regions working as a gang n Numerous attack vectors

Some Examples

slide-20
SLIDE 20

n Do you know the value of your data? n Reputational Damage/IP/Trust…what if these were effected? n Do you know where you data is stored? n Who has access to your data? n Do you have backups? n Do you really know your employees? n Do you have suitable business continuity and disaster recovery

in place?

n What would you do if you lost all your data tonight? n Do you know what your responsibilities are if you have a data

breach?

Ask yourself…

slide-21
SLIDE 21

What support is out there?

slide-22
SLIDE 22

Resources – Get Safe Online

slide-23
SLIDE 23

Resources – Cyber Streetwise

slide-24
SLIDE 24

Resources – CESG – 10 Steps

slide-25
SLIDE 25

Resources – Cyber Essentials

slide-26
SLIDE 26

Innovation Vouchers

https://interact.innovateuk.org/competition-display-page/-/asset_publisher/RqEt2AKmEBhi/content/cyber-security- innovation-vouchers-round-13#

slide-27
SLIDE 27

CiSP

Cyber Information Sharing Partnership

slide-28
SLIDE 28

CiSP

Cyber Information Sharing Partnership What is the Cyber-security Information Sharing Partnership (CiSP)?

n CiSP is a joint industry and government scheme based in

CERT-UK. CiSP is an online social networking tool and enables its members to exchange information on threats and vulnerabilities as they occur in real time.

slide-29
SLIDE 29

Basic steps to stay in control

slide-30
SLIDE 30

What we discussed…

n What is Cyber Crime? n What are the current threats? n What is the capability of local and regional Cyber Crime

Investigations?

n What support is out there to assist? n Cyber Essentials Scheme n Innovation Voucher Scheme n CiSP and How you can contribute

slide-31
SLIDE 31

Questions?

Thank you for coming!

Sergeant Phil Cobley Regional Cyber Protect Coordinator Eastern Region Cyber Crime Unit ERSOU phil.cobley@ersou.pnn.police.uk

slide-32
SLIDE 32

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Autumn Seminars 2015

cranfieldtechnologypark.co.uk info@cranfieldtechnologypark.co.uk