CTM360 Web Series - Definition of Cybersecurity

CTM360
1 Mar 202110:48

Summary

TLDRMahar B, CEO of CTM 360, discusses the urgent need to redefine security management in light of increasing cyber threats. He highlights the reality that all companies are either already hacked or unknowingly compromised, emphasizing the exponential growth in security breaches and their financial impact. B calls for a shift in approach, suggesting a reevaluation of the definitions of cybersecurity, information security, and IT security to create a more effective enterprise security strategy.

Takeaways

  • ๐Ÿ›ก๏ธ The speaker, Mahar B, CEO and founder of CTM 360, emphasizes the need for a change in the current approach to managing security due to prevalent issues.
  • ๐Ÿ”„ The FBI director's statement has evolved, suggesting that all companies are either already hacked or will be, highlighting the inevitability of cyber attacks.
  • ๐Ÿฆ Swift's advice post the Bangladeshi Bank hack was for banks to assume they have been breached, which led to the discovery of undetected breaches in many banks.
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธ Data dumps, such as the Ashley Madison and LinkedIn breaches, reveal the extent of security breaches and the potential for password reuse across accounts.
  • ๐Ÿ’ก The importance of understanding the difference between cyber security and information security is highlighted, with a call to redefine these terms for clarity.
  • ๐Ÿ“ˆ The estimated global losses due to cyber attacks are projected to increase exponentially, from $445 billion to 2 trillion by 2019.
  • ๐Ÿ’ป The IC3 reports a significant increase in recorded losses from security breaches, indicating the growing severity of the issue.
  • ๐Ÿฅ Despite substantial investments in security, 75% of top US commercial banks still have malware, and 95% have grades of C or less, suggesting a failure in current security practices.
  • ๐Ÿ” The speaker proposes a redefinition of security roles, distinguishing between IT security, information security, and cyber security, each with its unique mission.
  • ๐Ÿ›‘ The mission of IT security is service delivery, focusing on secure user experience, akin to the role of police in the physical world.
  • ๐Ÿ›ก๏ธ Information security's mission is to protect information assets, similar to the military's role in safeguarding critical assets in the physical world.
  • ๐Ÿ’ฃ Cyber security's mission is to identify and neutralize cyber attacks, equating to the role of intelligence agencies conducting covert operations against threats.

Q & A

  • Who is the speaker in the video and what is their role?

    -The speaker is Mahar B, the CEO and founder of CTM 360.

  • What is the main reason the speaker has started this series of talks?

    -The speaker believes that there is a need to change the way security is managed today due to several highlighted issues.

  • What did the FBI director and the Cisco CEO say about company hacks?

    -The FBI director said there are two types of companies: those that have been hacked and those that will be hacked. The Cisco CEO updated this by saying there are companies that have been hacked and those that don't know they have been hacked.

  • What example does the speaker use to illustrate that many organizations have been breached without knowing?

    -The speaker mentions the Swift statement after the Bangladeshi Bank hack, where banks were advised to assume they have been breached, and many found breaches upon investigation.

  • What are data dumps and why are they significant?

    -Data dumps occur when large social media or internet service providers are breached and user email IDs and passwords are published online. These can lead to further breaches as attackers use these credentials to access other accounts.

  • What impact did the Yahoo data breach have?

    -The Yahoo data breach significantly impacted the company, causing a loss of value, and highlighted the widespread issue of data breaches.

  • How has the financial impact of security breaches changed over time?

    -The financial losses from security breaches have grown exponentially, with estimated losses increasing from $445 billion last year to a projected $2 trillion by 2019.

  • What is the state of security in the US banking sector according to the speaker?

    -Despite heavy investments in security, 75% of the top US commercial banks have malware in their environments, and 95% of the top 20 US banks have a security grade of C or less.

  • What two areas does the speaker suggest need to be addressed to improve security?

    -The speaker suggests redefining security and adopting offensive defense as two critical areas that need to be addressed.

  • How does the speaker differentiate between IT security, information security, and cyber security?

    -IT security focuses on service delivery for end users, information security focuses on protecting information assets, and cyber security focuses on identifying and neutralizing cyber attacks.

Outlines

00:00

๐Ÿ›ก๏ธ The Urgency for Security Redefinition

Mahar B, CEO and founder of CTM 360, introduces a series on the need to change current security management practices. He emphasizes this by citing FBI and Cisco CEO statements that all companies are either already hacked or will be, highlighting the pervasiveness of cyber threats. Mahar discusses the Bangladeshi Bank hack and how many banks only discovered breaches after financial losses occurred. He also touches on data dumps, where breaches lead to public exposure of user credentials, potentially compromising multiple accounts. The talk concludes with the alarming statistic of a projected increase in cybercrime losses from $445 billion to 2 trillion by 2019, underscoring the exponential growth of security breaches and the inefficacy of current security investments.

05:01

๐Ÿ“‰ The Ineffectiveness of Current Security Measures

This paragraph delves into the ineffectiveness of current security measures, as evidenced by the poor security grades of top US banks and the rapid increase in losses over time. Mahar B suggests that the current approach to security is not only insufficient but also requires a fundamental rethink. He proposes that the industry needs to redefine security and adopt an offensive defense strategy. The paragraph also discusses the confusion surrounding the terms 'cyber security' and 'information security', noting the shift in terminology and the lack of a clear, unified definition. Mahar argues for a clear distinction between IT security, which focuses on service delivery and user security, information security, which protects information assets, and cybersecurity, which is concerned with neutralizing cyber attacks.

10:02

๐Ÿ” Redefining the Missions of Enterprise Security

In the final paragraph, Mahar B emphasizes the importance of differentiating between the missions of physical security, IT security, information security, and cybersecurity within an organization. He illustrates this by likening each to different aspects of national security, with physical security akin to police, information security to the military, and cybersecurity to intelligence agencies. Mahar asserts that assigning conflicting missions to one individual or department can lead to inefficiencies and proposes that understanding and separating these roles will lead to more effective enterprise security. He promises to elaborate on the roles and responsibilities in future talks, advocating for a redefined approach to security.

Mindmap

Keywords

๐Ÿ’กSecurity Management

Security management refers to the planning, organizing, directing, and controlling of resources to protect against and prevent threats to an organization's security. In the video, the speaker emphasizes the need for a change in security management practices, citing the prevalence of hacking incidents and the inadequacy of current approaches to prevent them.

๐Ÿ’กHacking

Hacking is the unauthorized use of computers to gain access to information or systems. The video script discusses the inevitability of hacking, with quotes from the FBI director and Cisco CEO, to illustrate that all companies are either already compromised or will be in the future.

๐Ÿ’กData Breach

A data breach occurs when unauthorized individuals gain access to sensitive information. The script mentions the Bangladeshi Bank hack and other incidents, highlighting the severity and frequency of such breaches, and the difficulty in detecting them.

๐Ÿ’กData Dump

A data dump is the release of stolen data, often including user IDs and passwords, onto the internet. The script uses the Ashley Madison and LinkedIn breaches as examples to show how data dumps can expose sensitive information and lead to further security compromises.

๐Ÿ’กPassword Reuse

Password reuse is the practice of using the same password across multiple accounts. The script warns of the risks associated with this behavior, as demonstrated by the hacking of Mark Zuckerberg's Pinterest and Twitter accounts after a LinkedIn data dump revealed his password.

๐Ÿ’กCybersecurity

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. The speaker discusses the evolving definition of cybersecurity and its distinction from information security, emphasizing the need to redefine and understand these terms to improve security measures.

๐Ÿ’กInformation Security

Information security involves protecting the integrity, confidentiality, and availability of information. The script contrasts information security with cybersecurity, suggesting that the two fields have different focuses and objectives.

๐Ÿ’กIT Security

IT security, also known as information technology security, is a subset of information security that specifically deals with the protection of computer systems and electronic data. The script mentions IT security as being synonymous with cybersecurity in some contexts, adding to the confusion around these terms.

๐Ÿ’กLoss from Cybercrime

The script cites statistics indicating the significant financial loss resulting from cybercrime, which is projected to increase exponentially. This underscores the urgency and importance of improving security management to mitigate these losses.

๐Ÿ’กMalware

Malware is software designed to cause damage to a computer system or server. The video mentions that a high percentage of top US commercial banks have malware present in their environments, indicating a widespread and serious security issue.

๐Ÿ’กOffensive Defense

Offensive defense in the context of cybersecurity refers to proactive measures taken to understand and neutralize potential threats. The speaker suggests that a shift towards offensive defense is necessary to adapt to the changing landscape of cyber threats.

Highlights

The speaker, Mahar B, CEO and founder of CTM 360, initiates a series of talks to address the need for a change in security management practices.

FBI director's statement that there are only two types of companies: those that have been hacked and those that will be, indicating the inevitability of cyber attacks.

Cisco CEO's update to the FBI's statement, suggesting that all companies have been hacked, some just don't know it yet.

The Bangladeshi Bank hack exemplifies the reality of undetected breaches, with attackers remaining undetected for over a year.

Data dumps, such as the Ashley Madison breach, reveal the extent of password reuse across accounts, leading to further unauthorized access.

The impact of data dumps on high-profile individuals, like Mark Zuckerberg, whose Pinterest and Twitter accounts were hacked due to reused passwords.

Yahoo's data breach as a significant example of the financial and reputational damage caused by cyber attacks.

The exponential growth of financial losses due to security breaches, projected to reach 2 trillion by 2019.

The IC3's recorded losses from 2001 to 2015, showing a drastic increase from 17 million to over a billion dollars.

Despite increased investment in security, 75% of top US commercial banks still have malware present in their systems.

The grading system for bank security in the US, where 95% of top 20 banks have a grade of C or less, indicating a significant security issue.

The speaker's call for a redefinition of security practices, suggesting that current methods are insufficient.

The differentiation between cyber security, information security, and IT security, and the need for clarity in these definitions.

The analogy of security roles in the physical world to clarify the distinct missions of IT security, information security, and cyber security.

The proposal to redefine security by assigning clear and distinct roles to IT security, information security, and cyber security to enhance effectiveness.

The speaker's intention to delve deeper into the roles and responsibilities of each security domain in subsequent talks.

Transcripts

play00:00

[Music]

play00:00

[Applause]

play00:00

[Music]

play00:15

hi my name is Mahar B I am the CEO and

play00:20

founder of ctm 360 I've have started

play00:23

this series of talk because I believe we

play00:26

need to make a change in the way we are

play00:28

managing Security today

play00:30

why am I saying that is because there

play00:32

are issues which I want to highlight and

play00:35

I want to start by describing to you the

play00:37

rational why I feel we need to make the

play00:40

change and in this talk of today I'll

play00:42

only end up with the high level

play00:45

difference which I think we need to make

play00:47

in the following talks I'll take you in

play00:50

more details of this so starting with

play00:52

the first part why am I saying we need

play00:56

to make the difference let's look at

play00:58

what an FBI director said a couple of

play01:01

years back what he said was that there

play01:04

are only two type of companies one that

play01:07

has been hacked and the ones who will be

play01:10

hacked but last year the same thing was

play01:13

changed by The Cisco CEO he said there

play01:16

are two type of companies the ones who

play01:18

have been hacked and the ones who don't

play01:20

know that they have been hacked so

play01:22

effectively what he is saying is that

play01:24

everybody has been hacked and he may be

play01:27

very right I believe so this is exactly

play01:30

what also Swift said last year once the

play01:34

Bangladeshi Bank hack came to surface

play01:36

they said to the banks assume you all

play01:39

have been breached and when the banks

play01:41

went around trying to look for it a lot

play01:43

of banks did find that the breach had

play01:47

happened and the attackers were on the

play01:50

way even in Bangladeshi Bank the

play01:52

attackers were there for more than a

play01:54

year before somebody even came to know

play01:57

and they only came to know when the

play01:58

money was transferred so this is what is

play02:00

practically going on right now in a lot

play02:03

of organizations and they don't know

play02:05

about

play02:06

it this can be visible from one more

play02:09

angle if you look at the data dumps what

play02:13

is a data dump when a large social media

play02:17

or a internet service provider is

play02:19

breached and the email IDs which people

play02:22

have used there as a user ID along with

play02:25

their password is published on the

play02:26

internet that is what we call a data

play02:29

dump now in those data dumps the one

play02:32

which was by Ashley medicon that made a

play02:34

big news because it was on a dating site

play02:37

and on from there a lot of people came

play02:39

to know that their spouse were cheating

play02:41

on them why because their email

play02:43

addresses were in part of the data dump

play02:46

now for us what is important in that is

play02:48

the password along with it assumingly

play02:51

the same password they must have used

play02:53

across many of their accounts so once I

play02:55

know the password from there I can try

play02:58

in a number of their other accounts

play02:59

including including their company email

play03:00

account and I may succeed and think of

play03:03

it that how many other data dumps are

play03:05

happening LinkedIn is another one which

play03:08

made big news it was posted last year in

play03:12

2016 the breach had happened in 2012 so

play03:15

for 4 years somebody had the passwords

play03:18

for that they must be scrapping the data

play03:21

across many networks and one person who

play03:24

was there who we all know is Mark

play03:26

Zuckerberg his email address was part of

play03:29

the that breach and because of that once

play03:32

this was published last year Somebody

play03:35

went in and hacked his Pinterest and

play03:38

Twitter account because the password was

play03:40

the

play03:41

same

play03:43

now this data

play03:45

dumps the one which happened on Yahoo

play03:47

impacted it the most because they lost a

play03:50

lot of value from it and then about

play03:53

every week we find a few data dumps

play03:56

there the next thing which I want to

play03:58

talk about is the loss we are having

play04:01

last year the estimated loss was

play04:04

$445

play04:06

billion and then now projecting that

play04:08

this loss will go up to 2 trillion by

play04:12

2019 in another just 2 to 3 years what

play04:16

is going on if we look at the actual

play04:19

money loss which is recorded by ic3 an

play04:21

organization in the US it recorded that

play04:24

in 2001 the data loss the losses from

play04:27

the security breaches from 17 million

play04:31

went up to a billion by

play04:33

2015 so the losses are growing

play04:36

exponentially where we are spending and

play04:38

investing so much more in securing and

play04:41

that is also evident from the security

play04:44

report which was done on the banking

play04:46

sector in

play04:47

USA the country which has the largest

play04:51

security vendors assumingly they're

play04:53

spending the most money on securing the

play04:55

banks and the situation is that 75% of

play04:59

the top us commercial banks have got

play05:01

malware in their

play05:02

environment 95% of the top 20 US Banks

play05:06

don't even have a grade of A or B

play05:08

they're all C or less so something is

play05:12

really

play05:13

wrong if we plot it against time we see

play05:16

that the losses have gone much higher

play05:20

with time the attacks are going at a

play05:24

faster Pace than how much we are able to

play05:26

manage it let's go ahead another 30

play05:28

years and if we keep on doing what we

play05:31

are doing today then whatever we are

play05:33

managing will be really

play05:35

negligible so what I'm trying to say is

play05:38

we don't need to do more of whatever we

play05:41

have been doing we need to do it

play05:43

differently and the two areas which I'm

play05:46

projecting we need to do differently one

play05:48

is to redefine security and other is

play05:51

offensive defense so let's look at

play05:53

redefining security let's start by

play05:55

saying what are the definitions of cyber

play05:58

security information security and it

play06:01

security if I ask you give me the

play06:05

difference what you think is there

play06:07

between cyber security and information

play06:08

security I'm sure you will struggle

play06:10

everybody struggles everybody has their

play06:12

own way of defining it the difference

play06:15

which we notice is that over the period

play06:17

people have started using the word cyber

play06:19

security instead of information security

play06:22

the same National initiative which was

play06:24

information security initiative is now

play06:27

called cyber security initiative the

play06:29

information security groups have started

play06:32

calling themselves cyber security group

play06:34

the information security awareness we

play06:37

used to have is called cyber security

play06:39

awareness and let alone the two strong

play06:43

countries when their presidents meet up

play06:45

China and us the headline says they're

play06:50

both debating the definition of cyber

play06:52

security pretty much the same thing

play06:54

happens when the Chinese president goes

play06:56

onto the UK so what's going on let's do

play06:59

a research across the industry to see

play07:02

what anybody says about cyber security

play07:04

the first thing which I did was I went

play07:05

to isaka isaka does not have their own

play07:08

definition of cyber security but a

play07:09

gentleman there tried to explain what he

play07:11

thinks is cyber security in his view

play07:15

information security is a bigger

play07:17

umbrella and whatever we know within

play07:20

that is traditional security and what we

play07:23

don't know is cyber security that is his

play07:26

definition I don't comment on it let's

play07:29

go to itg itg says that defined it as

play07:33

the protection of systems Network and

play07:35

data in

play07:36

cyberspace here we will have a debate on

play07:38

what is cyberspace things which I own

play07:41

but they're in the cloud are they in the

play07:43

cyberspace and so on let's look at a

play07:46

university the university says that

play07:48

information cyber security

play07:50

is referred to also as it security

play07:55

information technology security so they

play07:57

for them cyber security and it security

play07:59

is one and the

play08:00

same it's very confusing you look across

play08:03

all the different vendors and every

play08:04

vendor tries to explain it by what their

play08:08

business is and maybe you can say that I

play08:11

have tried to do the same but I think in

play08:14

my humble opinion my description of

play08:16

cyber security would make more sense in

play08:19

redefining security let's start first

play08:23

look at it security and each of these

play08:25

functions I would rather like to focus

play08:27

on the mission of each to understand

play08:30

what they are so it mission is really

play08:33

Service delivery which is about the end

play08:35

user where we need to give the end user

play08:38

more room to work but in a secure manner

play08:41

which is similar to police in the

play08:43

physical world then we go on to

play08:46

information security information

play08:47

security the mission is about

play08:49

information assets it's not about the

play08:53

end user which in the physical world we

play08:56

can say is more of less like the

play08:58

ministry of defense the military

play09:00

itself the military is trying to secure

play09:03

the critical assets of the country where

play09:05

people may die but they need to secure

play09:08

the critical assets the mission is

play09:10

entirely different than what is the

play09:12

mission of the police same the missions

play09:15

of it security and information security

play09:17

are very different then we come to cyber

play09:20

security the mission is about attacks

play09:22

it's only about identifying and

play09:24

neutralizing cyber attacks these three

play09:28

hence giv you the different picture

play09:30

where cyber security equates to

play09:32

intelligence agency in the physical

play09:34

world where the intelligence agencies

play09:37

even go out outside their country into

play09:41

other countries and perform covert

play09:43

operations to neutralize the attackers

play09:47

and hence comes forth the big Enterprise

play09:51

security with four pillars physical

play09:53

security with the mission of physical

play09:56

nature of assets of the Enterprise it

play09:59

security which the mission is the end

play10:02

user information security mission is the

play10:05

information assets and lastly cyber

play10:08

security where the mission is about

play10:12

attacks now if we try to give these

play10:15

different missions to the same one

play10:18

individual we will have an issue we are

play10:20

giving them conflicting missions and

play10:23

this is why I'm saying we should

play10:25

differentiate to get more effective

play10:29

Enterprise Security in an

play10:31

organization I in my next talks I'll

play10:34

take you through in more detail of each

play10:36

one of them up to what I believe should

play10:39

be the roles and

play10:41

responsibilities thank

play10:46

you

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
CybersecurityData BreachSecurity AwarenessHacking PreventionCyber ThreatsIT SecurityRisk ManagementCyber AttacksInfosec DefinitionsSecurity Trends