C24 PDF
C24 PDF
C24 PDF
Other regulations
Cloud services Advanced persistent threats
(APTs)
Nonstandard
Security as a
Service
2 | 10/14/14
THE WORLD IS CHANGING
3 | 10/14/14
WHAT IS AN ADVANCED PERSISTENT THREAT?
4 | 10/14/14
5 | 10/14/14
THE WORLD IS CHANGING
6 | 10/14/14
ADAPTIVE ATTACK VECTORS
7 | 10/14/14
THE APT LIFE CYCLE
8 | 10/14/14
APT MODUS OPERANDI
APTs have
adapted their Network boundary/perimeter devices inspect traffic
content.
SSL, custom encryption, and password protected/encrypted
container files make packet content inspection difficult or
and procedures to
the typical Communication initiated from within the network using
Network firewalls monitor and assess traffic metadata.
standard ports and protocols (HTTP, DNS, SSL, SMTP, etc.).
information
security Host firewalls monitor and assess local traffic
architecture they
Initial infection tool adds malware to host firewall white list.
metadata.
find deployed. For Intrusion detection and prevention systems with real-
example
Communications use common ports and protocols hide in
time assessment and alerting running on servers and
plain site within obvious/allowed traffic.
workstations.
9 | 10/14/14
METHODS FOR DEFENDING AGAINST THE APT
Many enterprises
implement some of the
intermediate-level
concepts. Because the
APT and other advanced,
sophisticated attackers
have such a high success
rate, it is recommended
that every enterprise
implement all of the basic
concepts.
10 | 10/14/14
11 | 10/14/14
12 | 10/14/14
13 | 10/14/14
ISACAS APT SURVEY
Because the studys purpose was to measure information security characteristics such as
knowledge of advanced persistent threats (APTs), internal controls, internal incidents, policy
adherence and management support, the study surveyed those who deal with those issues
every day: professionals with information security responsibilities.
Respondents are still using the wrong controls, such as antimalware, antivirus and
firewalls, to defend against APTs. These arent effective as most of these attacks come from
zero-day exploits and the attack vectors are very personalized spear-phishing attacks and now
web exploits in the browser. While technology improvements are not clear, behavior is improving,
with more organizations making the necessary changes in terms of incident response plans and
security awareness training.
14 | 10/14/14
92% SAY APTS POSE A CREDIBLE THREAT TO NATIONAL
SECURITY OR ECONOMIC STABILITY.
15 | 10/14/14
CROSSTAB OF THOSE WHO FIND AN APT LIKELY AND ABILITY TO
RESPOND TO AN APT ATTACK
16 | 10/14/14
CROSSTAB OF BELIEF OF LIKELIHOOD OF BECOMING TARGET AND
ADJUSTING INCIDENT RESPONSE PLAN
88%
19 | 10/14/14
BUT FEWER THAN HALF SAY THEY WILL HAVE ADEQUATE SKILLS FOR
THE JOB
20 | 10/14/14
DO YOU PLAN TO PURSUE A CYBERSECURITY RELATED CERTIFICATE
OR CERTIFICATION?
21 | 10/14/14
22 | 10/14/14
CYBERSECURITY NEXUS
www.isaca.org/cyber
23 | 10/14/14
CSX ELEMENTS
AVAILABLE NOW COMING SOON
The exam will be offered online and at select ISACA conferences and training events. The first is in
September.
There are no set/regular exam dates throughout the yearthe Cybersecurity Fundamentals
Certificate exam is available online, at your convenience. Simply schedule the date and time that
works best for you and your exam will be remotely proctored. Take the exam from the privacy of your own
home or office.
The content aligns with the US NICE framework and was developed by a team of about 20 cybersecurity
professionals from around the world. The team is involved in all areas of development through content
contribution and subject matter expert reviews.
25 | 10/14/14
BENEFITS OF EARNING THIS CERTIFICATE
Cybersecurity concepts
Incident responses
26 | 10/14/14
27 | 10/14/14
CAREER PATH
28 | 10/14/14
29 | 10/14/14
30 | 10/14/14
31 | 10/14/14
32 | 10/14/14
33 | 10/14/14
34 | 10/14/14
35 | 10/14/14
36 | 10/14/14
CYBERSECURITY TRIAD
37 | 10/14/14
Information Security vs Cybersecurity
Information security deals with information, regardless of its formatit encompasses paper
documents, digital and intellectual property in peoples minds, and verbal or visual
communications.
Therefore, to eliminate confusion, the term cybersecurity will be defined in this guide as
protecting information assets by addressing threats to information processed, stored and
transported by internetworked information systems.
38 | 10/14/14
TRANSFORMING CYBERSECURITY USING COBIT 5
Eight Key Principles:
2. Understand end users, their cultural values and their behavior patterns.
3. Clearly state the business case for cybersecurity and the risk appetite of the enterprise.
5. Manage cybersecurity using principles and enablers. (The principles and enablers found in
COBIT 5 will help your organization ensure end-to-end governance that meets stakeholder
needs, covers the enterprise to end and provides a holistic approach, among other benefits. The
processes, controls, activities and key performance indicators associated with each enabler will
provide the enterprise with a comprehensive picture of cybersecurity.)
7. Provide reasonable assurance over cybersecurity. (This includes monitoring, internal reviews,
audits and, as needed, investigative and forensic analysis.)
39 | 10/14/14
40 | 10/14/14
41 | 10/14/14
42 | 10/14/14
43 | 10/14/14
44 | 10/14/14
Becoming a successful security practitioner is hard.
Ideal candidates are well-rounded and
have a solid foundation in networking, operating systems,
web technologies and incident response, and an
understanding of the threat landscape and risk management.
45 | 10/14/14
QUESTIONS?
46 | 10/14/14