war against terrorism - cio's role

32
War Against Terrorism: The Role of Today’s CIO Ayo Rotibi Managing Director Forts & Shields Ltd (US, Kenya, Nigeria)

Upload: ayodeji-rotibi

Post on 22-Jan-2017

126 views

Category:

Presentations & Public Speaking


0 download

TRANSCRIPT

Page 1: War Against Terrorism - CIO's Role

War Against Terrorism: The Role of Today’s CIO

Ayo Rotibi Managing Director

Forts & Shields Ltd (US, Kenya, Nigeria)

Page 2: War Against Terrorism - CIO's Role

“The Internet is a prime example of how terrorists can behave in a truly transnational way; in response, States need to think and function in an equally transnational manner.”

Ban ki-moon

Page 3: War Against Terrorism - CIO's Role

The Art of War

The Art of War is simple

enough. Find out where

your enemy is. Get at

him as soon as you can.

Strike him as hard as

you can and as often as

you can, and keep

moving on. (Ulysses S. Grant)

18th US President. Led the Union to victory over the Confederacy in the American Civil War

Page 4: War Against Terrorism - CIO's Role

www.terror.net – The Modern Terrorists

Internet-aided terrorism is a dynamic phenomenon and transnational

Terrorist websites target three different audiences: current and potential supporters; international public opinion; and enemy publics

Ways contemporary terrorists use the Internet:

•From conducting psychological warfare to gathering information, from training to fundraising, from propagandizing to recruiting, and from networking to planning and coordinating terrorist acts.

Page 5: War Against Terrorism - CIO's Role

www.terror.net – The Modern Terrorists

Workplace has been the primary target of terrorism

•WTC Building, Garisa University, Westgate Mall

Many workplaces upon which citizens rely to reach work are relatively unprotected

•St Pancreas Underground

"We use Facebook to schedule the protests, Twitter to co-ordinate and YouTube to tell the world.“ An

Egyptian Arab Spring Activist

Page 6: War Against Terrorism - CIO's Role

www.terror.net – The Modern Terrorists

Dateline: September 2013

•Al Qaeda opens first official Twitter account

•@shomokhalislam, issued 29 tweets, followed one account, and attracted 1,532 followers in 24 hours (including several high-profile digital jihadists)

@shomokhalislam

Page 7: War Against Terrorism - CIO's Role

www.terror.net – The Modern Terrorists

Breaking News... Amazon Halts sales of ISIS propaganda Magazine

Page 8: War Against Terrorism - CIO's Role

Darknet – The New Terror Frontier

Adopted platform for direct communication among global jihadi activists •Over 50,000 sites and 300 forums for terrorist

organizations

•Used to distribute material for recruitment, training, and coordination of terrorist

• Informed the travel warning and closure of some US embassies in August 2013

Page 9: War Against Terrorism - CIO's Role

Darknet – The New Terror Frontier

A Course in the Art of Recruiting • https://ia800300.us.archive.org/32/items/ACourseInTheArtOfRecruiting-

RevisedJuly2010/A_Course_in_the_Art_of_Recruiting_-_Revised_July2010.pdf

ISIS and the Lonely Young American • http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-american.html

Page 10: War Against Terrorism - CIO's Role

Kenya’s Global Terrorism Index (GTI)

Year Incidents Fatalities Injuries Properties GTI Rank (out of 162)

2009 1 0 0 0 4.47 27

2010 12 19 159 4 4.81 24

2011 38 37 98 7 5.15 19

2012 73 98 410 34 6.06 14

2013 74 201 442 22 6.58 12

http://www.visionofhumanity.org/#page/indexes/terrorism-index/2013/KEN/FATA

Page 11: War Against Terrorism - CIO's Role

Cyber-threat Barometer: Any Ideas?

Leading Cyber Attack Method

•Social Engineering

Leading Threat

•Insider (with Authorized Access)

Leading Vulnerability

•People

Page 12: War Against Terrorism - CIO's Role

Kenya’s Cyber Goals

Enhance the nation’s cybersecurity posture in a manner that facilitates the country’s growth, safety, and prosperity.

Build national capability by raising cybersecurity awareness and developing Kenya’s workforce to address cybersecurity needs.

Foster information sharing and collaboration among relevant stakeholders to facilitate an information sharing environment focused on achieving the Strategy’s goals and objectives.

Page 13: War Against Terrorism - CIO's Role

Insider threat

Have legitimate access to systems

Often familiar with the organization's data

Abuse privileges to harm the organization

Circumvent security controls of which they are aware

Have physical proximity to data

Harder to defend against than attacks from outsiders

Page 14: War Against Terrorism - CIO's Role

The 58% Theory-The Insider Family

The Rogue Employee

•AKA: Shadow IT, Rogue IT

•Description: They have many aliases, but one definite goal – to take valuable data and leverage it into monetary gain, revenge or even some revolutionary crusade

Page 15: War Against Terrorism - CIO's Role

The 58% Theory-The Insider Family

Fired / Disgruntled Worker

•AKA: Pinch a Penny from a 1 million Transactions

•Description: Think Office Space – where workers on their way out devise a way to rip off the company

Page 16: War Against Terrorism - CIO's Role

The 58% Theory-The Insider Family

3rd Party and Outside Insider

•AKA: The Ulterior Motivator

•Description: Your temporary contractor or third-party vendor is around so much that your office is almost his second home. He may fraternize with employees and gain the trust of your crew – but who is really watching over

Page 17: War Against Terrorism - CIO's Role

The 58% Theory-The Insider Family

Inadvertent Users

•AKA: Not the Brightest Crayon in the Box

•Description: Believe it not, inadvertent insider threats make up a good portion of data breaches– thanks to the consumerization of IT, the mobility of data and the smartphone trend, it is easier for company data to move beyond traditional firewalls

Page 18: War Against Terrorism - CIO's Role

The 58% Theory-The Insider Family

Personalization Guru

•AKA: The Guy Who Brings Home to Work

•Description: This guy is a disaster waiting to happen. They are the ones who want their workstation to be a basic clone of their personal laptop. They want to have all the applications, tools and software –to bypass admin rights

Page 19: War Against Terrorism - CIO's Role

The 58% Theory-The Insider Family

The Night Janitor

•AKA: The Unsuspecting Pirate

•Description: The support staff is in your office at strange hours with no supervision really at all. Don't let the false characterizations and stereotypes fool you – criminals and social engineers would not lose a sweat getting employed as a janitor just to have your server room to themselves.

Page 20: War Against Terrorism - CIO's Role

Exposure in the Workplace

Types of Sensitive Corporate Information Employees Access (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)

Page 21: War Against Terrorism - CIO's Role

Exposure in the Workplace

Types of Personal Tasks Employees Do in the Workplace (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)

Page 22: War Against Terrorism - CIO's Role

Exposure in the Workplace

Content Accessed on Mobile Devices As Permitted By Enterprise (http://www.ponemon.org/blog/the-security-impact-of-mobile-device-use-by-employees)

Page 23: War Against Terrorism - CIO's Role

Food For Thought

What Will You Do If You Knew You

Were Under Surveillance?

Page 24: War Against Terrorism - CIO's Role

4 Cyber-Breach Questions

What: •Happened? Was Stolen? Was Compromised?

How:

•Did They Do It? To Prevent Reoccurrence?

Who:

•Did It? Is Affected?

When:

•Did They Do It? Can Recovery Begin?

Page 25: War Against Terrorism - CIO's Role

CIOs must leverage this singular advantage and take a stand on the new encryption regime introduced by FB, Google and Apple

Nothing is Hidden Under the Hood

Every online activity leaves a Digital Footprint

Page 26: War Against Terrorism - CIO's Role

The Role of The CIO

Due Care: Conduct a reasonable person would exercise in a particular situation

•Security is Good Business

•Security is Everybody’s Business

Due Diligence: Gathers facts to make an informed decision

•Additional Internal Control procedure – Network Forensics

Threat awareness, assessment, and perception

Efficient information flow within corporations, between corporations, and between corporations and local and federal government agencies

Page 27: War Against Terrorism - CIO's Role

National Domestic Communication Assistance Center

Core functions: • Law Enforcement

Coordination

• Industry Relations

• Technology Sharing

• CALEA Implementation

Government's first ever attempt to develop a centre for electronic surveillance knowledge management, and facilitate the sharing of technical solutions and know-how among law enforcement agencies

Page 28: War Against Terrorism - CIO's Role

What if...

...we all work together for a common purpose?

...we aspire to build a Regional NDCAC to foster stronger collaboration and complement Kenya CIRT/CERT?

...we foster stronger collective relationship with LEA and Government

...we leave this conference with a resolution to make SOMETING happen?

...we...?

Page 29: War Against Terrorism - CIO's Role

Proposed Initiatives

Initiate targeted knowledge dissemination programs

Provide real time knowledge dissemination to corporate members

Develop lessons learned from corporate incidences

Modify existing Users and Internet Usage Policies to include Internal Surveillance

Establish a Regional NDCAC

Page 30: War Against Terrorism - CIO's Role

A Little Story

Breaking News

Eiffel Tower for Sale!

Moral Lesson:

Share Information

Page 31: War Against Terrorism - CIO's Role

Conclusion

CIOs have been dragged into the War Against Terrorism

The Enterprise landscape has changed forever – FACT

The Internet offers us opportunity to prevent, detect and deter acts of terrorism

CIOs have a responsibility to secure their enterprise

CIOs need to know about human psychology and behavioural attitude

Real-time Digital Forensics will become a major tool in identifying these threat agents

CIO must determine that their enterprise network does not become a recruitment ground or a conduit for fund-raising and propaganda

Page 32: War Against Terrorism - CIO's Role

For Further Information and Demo:

•Email: [email protected]

•Phone: +254-786-834-158, +254-772-299-802

•Skype: arotibi

•Forts & Shields, 63 Mandera Rd, Kileleshwa, Nairobi, Kenya

•www.fortsandshields.com

•www.isecureconsulting.com

Questions