joe franzi - australian signals directorate - keynote address
TRANSCRIPT
![Page 1: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/1.jpg)
Cyber Security – The Threat Picture
Joe Franzi
Assistant Secretary Cyber Security
![Page 2: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/2.jpg)
Overview
• The Threat Landscape
• Tactics, Techniques and Procedures used by Advanced and Persistent Threat Actors
• Movers and Shakers in Tackling Cyber Intrusions
![Page 3: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/3.jpg)
Threat Environment
0
500
1000
1500
2000
2500
2011 2012 2013
1259 1790 2168
14%
6%80%
State Sponsored Cyber Crime Individuals & Hacktivists
Incidents Actors
![Page 4: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/4.jpg)
Cyber Security Picture 2013
![Page 5: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/5.jpg)
The Threat Environment
Foreign state-sponsored
48%
Unknown
40%
Cybercrime
9%
Hacktivism
3%
![Page 6: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/6.jpg)
Tactics, Techniques and Procedures (TTPs)
Most common themes:
• G20
• ASEAN
• Taxation
• Recruitment, HR, Finance Operations
• Current affairs
![Page 7: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/7.jpg)
Most Common Words in Spear-Phishing - 2013
Source: Symantec's 2014 Internet Security Threat Report
![Page 8: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/8.jpg)
Java Vulnerabilities
Most common attachments:
• Microsoft Word (including RTF)
• Zip
• JAR
• RAR
![Page 9: Joe Franzi - Australian Signals Directorate - Keynote Address](https://reader031.vdocuments.net/reader031/viewer/2022022413/58ed45be1a28ab4c2c8b459b/html5/thumbnails/9.jpg)
Strategies to Mitigate Targeted Cyber Intrusions
The Movers and Shakers
(Was #21)
Now #7
(Was #18)
Now #5
New in 2014:
#6 Automated
Dynamic Analysis