ltkol de bruycker, infosec & cyber defence, algemene ... de bruycker.pdf · collaboration 7 it...

12
LtKol De Bruycker, Infosec & Cyber Defence, Algemene dienst Inlichtingen en Veiligheid

Upload: others

Post on 17-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

LtKol De Bruycker, Infosec & Cyber Defence, Algemene dienst Inlichtingen en Veiligheid

Page 2: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Cyber Attack?

A Cyber Attack is deliberate action

to disturb the proper functioning

of an ICT System. (Denial Of Service)

to intrude into an ICT System and

read, change, inject of delete information (espionage)

misuse its abilities

Visible

Invisible

System Down

Page 3: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Fir

ewal

l /

IDS

-IP

S /

Pro

xy /

AV

CC Server

Internet

Intrusion impact

Full Control • Mails • Files • Key logger (passwords) • Social media • Surf behavior • Microphone/web cam • …

Privacy Freedom Economy

Sovereignty Operationality

Page 4: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Cyberdefense

Protection of our “own”

Networks & systems

Against cyber attacks

What do we need?

Page 5: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

More rules or laws

Probably yes, but..

Laws only help if you can enforce them

Laws hinder the defender and don’t stop the attacker …

If I'd observed all the rules, I'd never have got anywhere

Page 6: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Cyber deterrence For deterrence to work,

the aggressor must

Believe that he will be identified

Believe that you are able to harm him

Have more to lose than to gain

the retaliator must

Have the means to react

Convince the aggressor that he is willing to react

Prevent collateral damage

ESTIONA Stuxnet Flame

The probability that we may fail in the struggle ought not to deter us from the support of a

cause we believe to be just

Page 7: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Collaboration

7

It takes two to tango

Trust

Win-Win

Exposure risk

Knowledge proliferation

If you know what I can detect, you also know what I can’t

Technology advantage (single use weapons & expiration date)

You can own weapons, but what about people?

It’s hard to talks about incidents, detection technologies…

A launch a cyber attack against B B have no cyber capabilities to respond

B retaliates with …

Page 8: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Protect CIS Knowledge & Awareness

Users & management must be aware of the risks

Secure systems

Yes we can seriously improve security with limited extra cost

Build-in security (by design)

Integrated security & vulnerability management (BYOD)

Military grade security networks!

Multi-domain & multi-level secure gateways

8

Restricted Secret

Data Leakage

Pollution

Page 9: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Detect Network monitoring

Intrusion Detection Systems

Cyber Security Operations Centres (SCOC)

Advanced detection techniques

Non signature based

Technical information exchange (intrusions)

9

Page 10: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Respond

Reach out to official services

Incident handling processes

Malware analysis

Automated & through collaboration

Digital forensics

10

Page 11: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what
Page 12: LtKol De Bruycker, Infosec & Cyber Defence, Algemene ... DE BRUYCKER.pdf · Collaboration 7 It takes two to tango Trust Win-Win Exposure risk Knowledge proliferation If you know what

Questions?