Skip links | Internal | Contact Details | Site map | Privacy & Cookies

You are here: Home > Events > Conferences > CSC 2012


Protecting Your Business in an Insecure World: CSC2012

Cyber Security Conference 2012: 3rd September 2012

Conference logo

Summary

Cyber Security is a significant concern for companies of all sizes trying to protect their bottom line. This regional event will focus on helping you develop ways in which your business will be able to flourish and protect itself in online digital commerce.

Industry and academic experts will present the issues and solutions to cyber security problems which affect a variety of industries. This event is being hosted by InfoLab21 in partnership with the ICT KTN and is aimed at all small to medium sized businesss who would like to know more about cyber threats and how to protect your company from various attacks.

By attending this event you can meet with Security experts from Industry and Academia and learn how Cyber Security relates to your business.

Register Here

Agenda

  • 09:00 - Registration, refreshments and exhibitions
  • 10:00 - Professor Awais Rashid - Opening Speech: Security Lancaster
  • In his opening address Professor Awais Rashid will be providing a welcome to the event and talking about his work as co-director of the Security-Lancaster research centre and head of the EPSRC-GCHQ Academic Centre of Excellence in Cyber Security Research at Lancaster University.

  • 10:15 - Tony Dyhouse - Evolving Cyber Challenges: Cyber Security Director at ICT KTN
  • LOIC, HOIC, social networking risks, jammers, blockers and lasers! We hear about the importance of Cyber Security to business all the time but do the terms used and the technical nature of the issues concerned leave you struggling to see how such matters ACTUALLY relate to you and your business? In this talk we’ll hear from Tony about areas like these and look at some of the new and forthcoming tools, techniques and threats that we may have to face in our every evolving Cyber World.
  • 10:45 - David Cook - How Data Losses May Arise and the Subsequent Effect on a Business:Solicitor Advocate, Pannone LLP
  • They are now so pervasive that it is almost unthinkable for a business not to use computers. While the benefits are there for all to see, there are also inherent weaknesses which expose the users to a risk of data loss. Whether it is their own data, or those of their customers, the repercussions can be far reaching. This presentation considers the law regarding such losses, how they can occur, and ways to minimise the risks.

  • 11:15 - Break, Refreshments and exhibitions
  • 11:30 - Steve Carr - Securing Ever-Expanding Enterprise Networks: Dell SonicWALL
  • Corporations, academic institutions, and government entities alike are embracing Web 2.0 and social networking to empower their workforce and increase their business agility. However, with all these benefits come a significant number of risks, as first-generation security solutions are failing to stop the invasion of new and sophisticated threats. Also The 'Bring Your Own Device' (BYOD) movement that is becoming increasingly common within the workplace has been fuelled by the dramatic growth and adoption of mobile platforms such as Apple iOS and Google Android, which have become a critical component of business infrastructure. With this in mind, this presentation will provide expert advice for IT security professionals on solving the challenge of rebuilding security into the network's DNA.
  • 12:00 - Tony Wilson - "Comply or Die!": Indelible Data
  • Every business must understand the level of information security required in order to select controls that are proportionate to the risk. Getting the balance wrong means overspending on areas that are not required and under spending on those that are most vital. This may lead to a breach of data protection laws, contractual agreements and PCI requirements. With information security still in its infancy, smaller companies are struggling to assess their place in the threat landscape. This talk will describe the processes required to establish and maintain a focused Information Security Management System to give assurances to regulators, stakeholders, partners and customers that your company is doing all it can to ensure the security of their information.

  • 12:25 - David Guest - Enhancing Security through Identity Management: Salford Software Ltd
  • Many businesses have problems with IT Governance and Security, moving to the cloud only exacerbates the problem with access to systems located somewhere from a location that is somewhere else. Timely and accurate provisioning and, more importantly, de-provisioning can be a real challenge. Users are unproductive if they are waiting around for accounts; ex-employees or those suspended from duties can pose a real security risk if they are not managed quickly and effectively. By making the most of the available IT services many of these issues can be alleviated. Both Internal and External users can be correctly managed, provisioned, de-provisioned and controlled ensuring that only the right people have access to the data they need at the right time.

  • 12:50 - Lunch – networking/exhibitions/one2ones
  • 13:50 - Professor Awais Rashid - Cyber Security Challenges in a Digitally Connected World: Security Lancaster
  • As the Internet becomes increasingly pervasive in our daily lives, we are seeing the rise of the Digital World Phenomenon, where the former notions of cyberspace and physical world merge together. The large number of devices connected to the Internet and large-scale infrastructures such as the Cloud bring new challenges for Cyber Security in this digital world. In this talk I will highlight the kind of risks that arise for both individuals and organisations and the challenges they pose for software systems and their developers. I will then focus on the fundamental role that the fluid nature of identity plays in exacerbating these challenges and discuss some recent research that aims to tackle these problems.

  • 14:20 - Dr Mark Lacy - Cyber Security and Uncertain Futures: risk, technology and design fictions: Security Lancaster
  • One of the key challenges in the area of Cyber Security and digital politics is planning for a world that is undergoing accelerated geopolitical and technological change. As many leading thinkers on risk have argued, institutions often create cultures that limit how we think about risk and uncertainty, often narrowing the disciplinary focus of inquiry: one of the key challenges is to develop ways to open up broader inter-disciplinary conversations and speculations on security futures. The presentation will introduce some alternative processes – the development of 'design fiction’ – to generate critical discussion and insight on economic and Cyber Security challenges.

  • 14:45 - Comfort Break
  • 15:00 - Simon Smith: IBM Security Systems
  • The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity. They are intended to help customers, fellow researchers, and the public at large understand the changing nature of the threat landscape and what might be done to mitigate it.
  • 15:30 - Dr. Daniel Prince - Closing speech: Security Lancaster
  • To round of the day, Dr Dan Prince, Associate Director at Security Lancaster, will be giving his thoughts on presentations seen throughout the day and also on the discussions heard regarding how small business owners can identify their own security risks and exposures and then plot a course through the Cyber Security landscape to find support, expert advice and solutions to help them avoid issues and gain benefits from this growing area of technology.

  • 15:50 - Opportunity for networking and visiting exhibitions
  • 16:30 - Close

Register

Please provide details of you and your organisation in order to register for the event.

The following section relates to information about your company. This is important to help us build up a picture of the usage of IT systems and the nature of the problems faced.

The data you submit as part of this registration will only be used by Lancaster University and will not be sent to any third parties. For more information on how we will use your data please see our Privacy Statement.

Speaker Bios

Nick King: Master of Ceremonies

Nick King

Nick King is Business Development Manager in Lancaster University's School of Computing and Communications, located at InfoLab21. In addition to leading the Schools' Business Development Team Nick also Manages one of the Schools key Business Support Projects: ISTEP, an initiative that helps the School's academic community and industry find shared interest and collaborate. Prior to his time at InfoLab21 Nick was UK Business Manager with a UK IT Solution Provider specialising in information security solutions and enterprise software licensing.

Dr Daniel Prince

Daniel Prince

Dr Daniel Prince is an associate director and business partnerships manager for Security Lancaster. Prior to this he was the course director for the multi-disciplinary MSc in Cyber Security teching penetration testing, digital forensics and information security risk management.

Daniel completed his undergraduate studies in Computer Systems Engineering in 2000 and went onto complete his PhD in Programmable Ad Hoc Networks in 2004. During his PhD he extensively worked with Mobile IPv6, working to complete an Implementation of Cisco IOS and as part of a team worked to implement the protocol in Windows CE.

Prof Awais Rashid

Professor Awais Rashid

Professor Awais Rashid is co-director of the Security-Lancaster research centre and head of the EPSRC-GCHQ Academic Centre of Excellence in Cyber Security Research at Lancaster University.

He is internationally renowned for his research on detecting criminals masking their online identities, dealing with dynamically changing cyber security threat patterns, profiling attackers/victims based on the language in their online communications and techniques to deal with disruptive influences of malicious users. His research has featured heavily in the media (e.g., BBC 6 O’ Clock News, The Daily Telegraph, The Independent, German News Heute, ABC News Australia, Scientific American). It was also highlighted as one of the 100 Big Ideas for the Future by RCUK/UUK and one of four Cyber Security case studies in a 2011 EPSRC report for government ministers and senior civil servants.

Tony Dyhouse

Tony Dyhouse

Tony took over as Director of the Cyber Security Knowledge Transfer Network in 2009, continued as Director of the Cyber Security programme within the Digital Systems KTN and now within the ICT KTN. Tony joined DERA (now QinetiQ) in 2000 and became the Director of QinetiQs Operations & Technical Services group, providing a range of managed security services. This role was followed by a spell as Director of the Information Assurance Consultancy group before becoming Director of the Cyber Security KTN. His expertise extends across all areas of Cyber Operations and Information Security, with specialist knowledge in Network Intrusion Detection, Penetration testing, Incident Response and Digital Forensics.

Tony's early career was with British Gas, ICL and Fujitsu, spanning over 28 years in the IT industry with experience in Telemetry, the operational management of WANs and LANs and various security technologies.

Tony works with a range of public and private sector organisations on matters of Cyber Security, as well as being active in several industry forums and strategy groups. He is a regular contributor to BBC television and of published features and articles

David Cook

David Cook

David is a Solicitor Advocate in the Regulatory team at Pannone LLP and specialises in white collar offences and cyber security. He joined law from a science background, having initially obtained a degree in chemistry. This experience provides him with a different skill-set to others and means that David is very astute when considering the technical aspects of a case as well as being a personable lawyer.

David has extensive experience across a broad range of offences but in particular specialises in cases of a complex nature. He has a particular interest in crimes that are committed using computers or through the internet. David is widely regarded as an expert in this area and regularly appears in the national and local media

Pannone is a vibrant law firm with one of the leading cyber security and internet crime teams in the country. This coupled with their forensic expertise and specialist in-house IT advisors has led to national recognition as leaders in the field. The team advises both organisations and individuals in relation to tracing and dealing with a range of matters involving computer and network misuse. They can image and examine all forms of hardware to uncover evidence and are able to advise on exactly what steps should be taken throughout an investigation into computer related misconduct, whether defending or prosecuting on behalf of a company. They assist those being investigated for alleged computer related offences under the Computer Misuse Act and Fraud Act and advise on breach of copyright and cloning investigations. The team can also assist companies in relation to their exposure to Data Protection regulation issues and investigation by the Information Commissioner’s Office and Financial Services Authority.

Stephen Carr

Stephen Carr

Stephen Carr is Public Sector Sales Manager at Dell SonicWALL. He joined in January 2008 to support SonicWALL’s entry into the Enterprise market and develop their market shares in the UK and Ireland. Carr brings extensive experience in managing customer facing relationships, with a proven track record of selling enterprise solutions.

The company provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Dell SonicWALL offers a comprehensive lineup of industry-leading network security and data protection solutions, including firewall, secure remote access/ SSL VPN, anti-spam/email security, and continuous backup and recovery, plus centralized management and reporting, and 24x7 technical support.

Tony Wilson

Tony Wilson

Tony Wilson is a Certified Information Systems Security Professional (CISSP), Certified ISO 27001 Lead Auditor and the Managing director of Indelible Data – an information security consultancy based in West Cumbria that helps companies become ISO 27001 and PCI compliant.

Indelible Data is an information security consultancy based in Cumbria that helps companies become ISO 27001 and PCI compliant. Focusing on the identification and mitigation of risk, the company aims to establish a culture of security in client organisations. Services include policy development, identification and selection of countermeasures and security awareness training. Clients include small businesses that aim to become part of the nuclear supply chain, online retailers and market research companies that hold large amounts of commercially sensitive data.

David Guest

David Guest

David Guest is Head of Product Innovation and Strategy at Salford Software. David has more than 25 years of experience in the IT industry and has been working with Network Technologies since 1984. With more than a decade of experience delivering security solutions to enterprise size organisations he has specialised in Secure Identity and Access Management for the past decade. In that role he has presented on governance and modelling techniques for Identity Management at numerous conferences.

Salford Software has been established for more than 20 years and is a Microsoft Gold Partner with Identity and Security plus a NetIQ Platinum partner. Key areas of focus include identity and access management, user experience, infrastructure, security and connectivity. Salford Software provides a range of professional technical services and support solutions with a focus on providing the right access, to the right people at the right time. Using our technical excellence and proven track record we are able to help organisations improve their business processes, addressing access governance and reducing the total cost of ownership. The professionals at Salford Software have the experience and knowledge to address the complexities faced by many organisations today and have worked extensively with the enterprise size organisations including NHS Trusts, Universities, blue chip companies and not for profit/charities.

Dr Mark Lacy

Mark Lacy

Mark Lacy is an associate director of SecurityLancaster, leading the SecurityFutures stream. I hold a PHD in International Relations (University of Sussex, UK, 2001). Prior to my work on SecurityLancaster I was part of a team that set up an inter-disciplinary theme year in our Institute of Advanced Studies on New Sciences of Protection: Designing Safe Living' (2007-2008). New Sciences of Protection brought together designers, technologists and social sciences to collaborate in various ways on emerging security problems and their social, economic and political impacts. The SecurityFutures stream of the centre is a space where we can create dialogue and collaboration on the future of cybersecurity in an age of 'digital geopolitics,' bringing together people from business, academia and the protection industries to create new perspectives on security and global politics.

Simon Smith

Simon Smith

Simon graduated from King's College London with a degree in Computer Science and Digital Electronics. He has worked in the IT industry for 23 years with the last 16 specialising in network security. Simon has worked for a number of security resellers as well as major IT companies like Logica, Cable and Wireless and now IBM. He specialises in SIEM and IPS and has been involved in designing and deploying a number of complex systems in these areas. His particular interests are around the successful use of technical solutions to solve business problems and developing the concept of Security Intelligence. He has been a CISSP since 2004.

IBM's security portfolio provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world's broadest security research and development, and delivery organizations. This comprises nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 15 billion security events per day in more than 130 countries and holds more than 3,000 security patents.

Exhibitors

CSC2012 has a number of opportunities for exhibitors and we would welcome approaches from companies or organisations involved in providing ICT Security solutions (particularly to SMEs) regarding taking space.  It is free of charge to exhibit at CSC2012 and spaces will be awarded dependent on the exhibitors ability to support the aims of the event i.e. showcasing the skills, abilities and issues faced by SMEs in the Cyber Security space.    We would expect over 100 delegates to attend, with the networking and exhibition elements of this event being built into the agenda in order to encourage collaboration amongst companies and academics and the sharing of best practice. For more information and to apply for an exhibition space please contact Carolyn c.hayes2@lancaster.ac.uk.

For a full list of confirmed exhibitors, please see below.

Cyber Security Challenge UK

Cyber Security Challenge logo

The Cyber Security Challenge is a series of national online games and competitions that will test the cyber security abilities of individuals and teams from every walk of life. It is designed to excite and inspire anyone considering a career in the cyber security industry. The Challenge will identify talented individuals capable of becoming part of the UK's cyber security profession now and in the future. To find out more about the challenges see the competitions pages
or click below to set up your registration details for any competition.

cybersecuritychallenge.org.uk

ICT Knowledge Transfer Network

Cictktn logo

The Information and Communications Technology Knowledge Transfer Network (ICT KTN) is an industry-led initiative funded by the Technology Strategy Board and focused on ICT Knowledge Transfer as a stimulus to economic growth. The ICT KTN seeks to deliver improved industrial performance through innovation and collaboration, and provides an independent business voice to inform Government of the needs of the sector.

ICT-KTN Website

Indelible Data

Indelible Data

Indelible Data is an information security consultancy based in Cumbria that helps companies become ISO 27001 and PCI compliant. Focusing on the identification and mitigation of risk, the company aims to establish a culture of security in client organisations. Services include policy development, identification and selection of countermeasures and security awareness training. Clients include small businesses that aim to become part of the nuclear supply chain, online retailers and market research companies that hold large amounts of commercially sensitive data.

www.indelible-data.co.uk/

InfoLab21

Infolab 21

InfoLab21 is Lancaster University's world-class research, development and business centre in Information and Communication Technologies. Based in InfoLab21, the Knowledge Business Centre (KBC) provides co-location facilities for technology businesses and supports industrial collaborations with academics from the School of Computing and Communications. Specifically the KBC, via its ERDF Funded ISIS & ISTEP projects, can support Northwest businesses via collaborative research, expert consultancy, development projects and technical workshops.

InfoLab21 website

Isis Forensics

SafeTok

Isis Forensics is an international digital forensics firm which specialises in developing solutions to protect individuals and assist law enforcement with digital investigations. Their focus on R&D has allowed them to develop cutting edge technologies in the areas of online child protection, language analysis and online conversation modelling. Solutions include a mobile phone child protection app 'ChildDefence', which made international headlines when it was released. Isis Forensics has also worked closely with law enforcement to develop a language analysis toolkit which has recently attracted significant investment, highlighting the potential of the technologies.

Isis Forensics website

SafeTok

SafeTok

SafeTok provides a low cost, easily deployed solution protecting data on hard drives and portable storage devices, access to computers and websites, file sending and working with others. This all-factor security system enables users to combine protection by password, security device and fingerprints

SafeTok website

Savant Limited

SafeTok

Savant Limited works with a wide range of clients to ensure they continue to serve their customers when hit by interruptions like snow, flood and flu. This is achieved with our business continuity software and consultancy. Our Mataco product is cloud-based and offers standards compliant business continuity plan management, exercising and review. Additionally with its mobile access, Mataco ensures you can get at your business continuity plans and documents whenever you need them.

At Savant we work closely with our clients to deliver solutions that align to their strategic business visions using technologies ranging from data centres to mobile devices.

www.mataco.co.uk

Contact Us

CSCS2012 is a conference intended to bring together a wide range of stakeholders around the subject of ICT/Cyber Security.  The event is intended to highlight the issues faced by SMEs and showcase the industry and academic specialists that are able to help address those issues.  We are very interested in helping drive and support those interactions and the Project team (details below) would welcome any opportunities before, during or after the conference, to help progress collaborations.  In particular there are a range of opportunities to work with Lancaster University in the area of Cyber Security, from working in partnership on the MSc in Cyber Security Programme, gaining specialist advise for a particular business issue or working together in the development of joint research bids.

Carolyn Hayes: Event Coordinator

Carolyn Hayes

For any general event queries, please contact Carolyn:

Tel: +44(0) 1524 510465, Email: c.hayes2@lancaster.ac.uk

Daniel Prince: Security Lancaster Partnerships and Knowledge Exchange

Dr Daniel Prince

For further information on the specialist academic research and industry collaboration via the Security Lancaster Group please contact Dan:

Tel: +44(0) 1524 510432, Email: d.prince@lancaster.ac.uk

Nick King: Business Development Manager, InfoLab21, School of Computing and Communications

Mr Nick King

For further information on the options for business collaboration/support in the area of Cyber Security please contact Nick:

Tel: +44(0) 1524 510447, Email: n.king@lancaster.ac.uk

Tony Dyhouse: ICT KTN-Cyber Security

Mr Tony Dyhouse

If you are interested in engaging with ICT KTN in the area of Cyber Security or finding out more about how the ktn can help you please get in contact with Tony.

Tel: +44 (0)7900 057197, Email: tony.dyhouse@ictktn.org

Feedback

  • The event was a real eye-opener and struck a good balance between business implications and technical content
  • Really good conference
  • Very useful, some info that was completely new, opportunity to network with the university is excellent
  • Worthwhile to reflect and review your organisational position going forward into the future unknown
  • Excellent event. Thoroughly enjoyable and informative
  • Very good, well presented and informed by all speakers
  • Very good
  • Worthwhile, and a bit scary, a good opportunity to meet Security Lancaster people
  • Thought-provoking and stimulating, notable speakers who impressed due to their extensive knowledge were Tony Dyhouse and David Guest
  • Excellent yet again a really useful event for SMEs
  • Great insight into the future
  • Every organisation should have the knowledge this event delivers
  • I attended as a speaker and feel that I made a useful contribution, nevertheless, I was amazed by the knowledge of my peers, speakers and delegates alike
  • I enjoyed the event, but at time thought that the speakers assumed too much technical know-how
  • The event was very well orchestrated, everything was very good, I felt it just needed an aim or objective on which we could all focus. I think that the generalised term 'Cyber Security' is just too big and we should consider creating bite sized groups to tackle sector specific issues but collaborate via regular round table think tanks. Really happy to be involved in any future events, training or think tanks
  • An interesting and relevant programme well delivered in comfortable surroundings
  • As an exhibitor we were very well looked after. The 50" plasma screen was a real bonus (but wouldn't fit in the car at the end though). It was a good networking event and interesting presentations (on the whole). Venue was good and the catering
  • Very informative. Anybody with and sort of e-commerce should attend the event!
  • Excellent event, need to keep up in this area
  • Very good start with good networking and also possibility to know facts on how security concern is not only a computing issue but also a social issue

Which cyber threats concerned CS2012 delegates most?

  • Hacking of the software we create
  • APTs, state surveillance
  • Data theft
  • Web and application security
  • Online asset theft
  • Breach of security internally, through partners
  • Comply or die (reference to compliance with data protection laws)
  • Internal
  • DoS/web-hacking via SQL databases
  • Hacking
  • Digital identity
  • Data theft
  • HOIC and payment fraud
  • All of them
  • Internal threats
  • Supply chain resilience. We can be pretty well set up but are our key suppliers? Do companies know how exposed they and their suppliers are to the Cloud?
  • Spear phishing
  • Inbound email with attachments
  • DDoS

What top tip would CS2012 delegates pass onto other organisations following on from the event?

  • Due diligence about information security
  • Businesses should seek advice and support around information security
  • Pro-involvement
  • More proactive input into cyber protection
  • Users are the backbone of every organisation but they can also be the biggest source of security problems. Make them aware of the threats out there
  • Look at Security Lancaster's website - get informed about cyber security
  • Work with InfoLab21
  • Attend CS2012!
  • To look into the various ways that a website can be attacked
  • Security must be on your agenda - now!
  • Become familiar with the concepts and regularly review the threats. Speak to suppliers and universities about what threats are coming so you're not caught out
  • Security is hard, and ignoring it won't make it go away
  • Take security seriously!
  • Security patching
  • Concern for security for organisations is for all employees within the organisation, a simple miss can cause a serious hazard to the whole organisation

Cybercrime is evolving- so what can your business do about it?

By Tony Dyhouse, Cyber Security Director at the Information and Communication Technologies Knowledge Transfer Network (ICT KTN)

UK businesses lose around £21bn a year to cybercrime and cyber-attacks are becoming increasingly more sophisticated. Cybercrime is something that can affect us all and is something the government is warning businesses specifically about. Ministers and officials from the communications intelligence agency, GCHQ, will tell companies to create a more security-conscious culture at a conference at the Foreign Office shortly.

The organisation I work for, the ICT KTN, fully recognises this. As I informed delegates at this year’s Cyber Security Conference, (CS2012) Protecting Your Business in an Insecure World, run in partnership with Lancaster University’s InfoLab21 and Security Lancaster, Cyber Security Centre of Excellence, cybercrime has evolved considerably from the first virus in 1981, Elk Cloner on Apple II floppy disks by Richard Skrenta. It is now a global phenomenon where hackers proudly post their hacks on websites and grade them for level of damage and even government networks are attacked.

So who are they and why do they want to attack your business?

I consider there are five categories of cyber criminals.

  1. "Script Kiddies," people, often teenagers who live in online social world where they build their hacking skills to impress their peers, using automated tools to do things like deface websites
  2. "Band of Brothers" Hacking Groups - loosely connected online groups of script kiddies who often operate under a collective name and have a wide range of capabilities and compete against each other to gain reputation and notoriety. They combine skills and share tips, share password lists, share knowledge and use automated tools but with greater intent and success
  3. (H)Activists (may contain above), groups of hackers connected by a cause, e.g. Anonymous and Lulzsec who use hacking skills to attack organisations they dislike and can do real damage to supply chain as well as their intended target. Targets may not be able to identify a rational reason for the motive behind an attack. Attackers may be simply attempting to create damage and disruption because they disagree with something your company does or doesn’t do or just a dislike of business in general (anti-capitalist). Examples of activities include hacking to obtain (personal) data to publish (Wikileaks, Pastebin) and DDoS attacks to deny service. Such activities are often linked with calls for days of action (Occupy series, Bay Area Rapid Transport). Such groups sometimes make “attack kits” available online and are usually excellent at marketing using YouTube and other social media to gain support and notoriety
  4. A-List (Organised Crime) Individual leaders who can cause billions of pounds of damage to global companies. Some organised crime members have extremely comprehensive cyber skills; however this group is responsible for most of the “phishing” emails which attempt to gain access to your personal information to exploit financially, or to add your PC to a growing band of compromised computers. Each compromised PC is known as a “zombie” and the whole forms a “Botnet”. This botnet is also then used for financial gain
  5. A-List (Nation State) Cyber warfare “There are over 20,000 malicious emails on government networks each month, 1,000 which are deliberately targeting them.” Ian Lobban, Director of Government Communications Headquarters, in the UK Cyber Security Strategy 2011. Nation state attacks mainly consist of those which attempt to extract information from foreign computer systems. This electronic espionage is more productive, less costly and less risky than traditional “man on the ground” espionage and can give a nation economic benefit as well as providing “back door” access to systems which could be used for more war-like operations

6 common methods of attack

  1. Email attachment – will install malware code when attachment is opened
    (Known as phishing or spear phishing)
  2. Email link to download – user follows the link which purports to download some useful software. However the download is malware
    (Not what you expect to download. Often fake anti-virus checks)
  3. Email link to (or via) an infected website which will install malware on your computer. The site sometimes then forwards the user on to their intended site so they are none the wiser. This known as a “drive by” attack
  4. Browser fake (spoofed) website (Another form of phishing as you enter your personal info. Often online banking but also charity or disaster donation sites etc.)
  5. Removable media contains malware which transfers onto your machine
    Usually USB drive but many devices now function as removable media, e.g. iPods and iPads, MP3 players, and smart phones
  6. Hack (website) to secure your website, consult an expert. If you outsource – request detail of protection and have a DR plan

So what do we do to protect ourselves?

People

  • Staff are our biggest asset and weakest link. Education and awareness is key. Repeat and make it interesting by using current examples
  • Staff in supply chain may as much or greater access to your systems than your direct staff. Include such staff in education, training etc. and ensure contractual terms for security are in place
  • Act if the environment changes (redundancies, pay-freeze etc.). Dissatisfied staff are far more likely to deliberately leak data for their own or a competitor’s benefit

Process

  • Develop basic security policies (AUP, do’s and don’t’s)
  • Effective recruitment & leaving policies (background checks, checklist) must be in place
  • Backup AND restore. Only by restoring the data can you be sure all will be ok in an emergency
  • Secure disposal. It is now known that data has a value – often to your competitor. Ensure your hard drive does not end up for sale on eBay
  • Incident response (have a cunning plan)

Technology

  • Don’t bin the firewall yet (but check configuration). Do you really need to allow all those protocols through?
  • Layered defences (nothing is 100% but it’s an obstacle)
  • If you don’t need it disable it (apps, functionality)
  • Pentest. Pentest. Pentest

Further Information

About Tony Dyhouse (ICT KTN)

Tony took over as Director of the Cyber Security Knowledge Transfer Network in 2009, continued as Director of the Cyber Security programme within the Digital Systems KTN and now within the ICT KTN. Tony joined DERA (now QinetiQ) in 2000 and became the director of QinetiQs Operations & Technical Services group, providing a range of managed security services. This role was followed by a spell as director of the Information Assurance Consultancy group before becoming director of the Cyber Security KTN. His expertise extends across all areas of cyber operations and information security, with specialist knowledge in network intrusion detection, penetration testing, incident response and digital forensics.

He has partnered with Lancaster University’s InfoLab21 and Security Lancaster on several events, the latest being Cyber Security Conference, (CS2012) Protecting Your Business in an Insecure World.

Tony's early career was with British Gas, ICL and Fujitsu, spanning over 28 years in the IT industry with experience in telemetry, the operational management of WANs and LANs and various security technologies.

Tony works with a range of public and private sector organisations on matters of cyber security, as well as being active in several industry forums and strategy groups. He is a regular contributor to BBC television and of published features and articles.

ICT Knowledge Transfer Network

The Information and Communications Technology Knowledge Transfer Network (ICT KTN) is an industry-led initiative funded by the Technology Strategy Board and focused on ICT knowledge transfer as a stimulus to economic growth. The ICT KTN seeks to deliver improved industrial performance through innovation and collaboration, and provides an independent business voice to inform Government of the needs of the sector.

Contact: Tony Dyhouse, ICT KTN, https://connect.innovateuk.org/web/ictktn

Catch the full Cyber Security conference online. Videos of the presentations and interviews from CSC2012 are now online and can be viewed on the conference website and on YouTube. You can also have a look at the photographs on Flickr or on Facebook.

Download the Security Lancaster factsheet for businesses and contact Dr Daniel Prince to find out about support available.

Discalimer

Lancaster University cannot be held responsible for any activity by our network of companies and partners. We display information from companies and partners on our site and we are not responsible for the content or privacy polices of companies and partners sites, nor for the way in which information about them is treated.

Hosted By:

  • Security Lancaster

    Lancaster University's Security Centre of Excellence

    Lancaster University logo
  • InfoLab21

    Lancaster University's ICT Centre of Excellence

    infolab21
  • ICT KTN

    ICT Knowledge Transfer Network

    ictktn
  • Image Gallery

    Be Social

    • Join Linkedin Group