新たに発生するサイバーセキュリティの脅威: 今後の展望 Leonard Ong, CISA, CISM, CRISC, CGEIT, CoBIT 5 Implementer & Assessor 19 June 2016 AGENDA: 1. サイバーセキュリティの現在 2. 2018年の脅威の展望 3. その後の展開 4. 重要なポイント サイバー セキュリティの現 在 重大な経済的損失を引き起こすサイバーインシデント IP Theft in United States >$ 300 Billion IP Commission Report Ponemon Institute Singapore $ 1 Billion Losses from Cybercrime $ 575 Billion Symantec McAfee 2015 GLOBAL CYBERSEC URITY STATUS REPORT 83% 世界中で3,400以上の被害 の人がサイバー攻撃はビジネスに与える脅威のトップ3であると認識している。にもかかわらず 38% の人しか洗練された攻撃への準備ができていないと回答。 VISIT : WWW.ISACA.ORG/CYBERSECURITYREPORT 2015 GLOBAL CYBERSEC URITY STATUS REPORT 86% の人がサイバーセキュリティのスキル不足を感じている VISIT WWW.ISACA.ORG/CYBERSECURITYREPORT 世界中で3,400以上の被害 経営者の視点から見るサイバーセキュリティ >経営者の65%が、サイバーリスクが高いレベルに到達し た、もしくは、上昇したと証言しました。 58%が以前からもっと策を講じておくべきだったとする中で 、実際に行動を起こしたのは14%に過ぎません。 2018年の 脅威の展望 T L IC CH economic approaches. This could result in social unrest, withcountries. highly fluid and 6 Persistent deflation and austerity will continue to impact many For some, NO OG L set to further fuel a move from free market capitalism towards alternative using the model (see Figure 1). ISF could well be set out in PESTLE this report. 8 far-reaching consequences for organisations around the world. this will create increased mobility seekinwork, at what cost? 7 Members are encouraged to consider these economic approaches. This could to result socialbut unrest, withsocial highly fluidThe andconditions could well beconsequences set to furtherfor fuelorganisations a move fromaround free market capitalism towards alternative 8 far-reaching the world. factors and add others from their own 7 economic approaches. This could result in social unrest, with highly fluid and Significant of terrorism will continue, with varying responses from leading experience when considering the acts threats far-reachingN Oconsequences for organisations around the world.8 1 O G remain restrictions Lintroduce maywill Technology an area of rapid change and thus features in many of the threats set out in this report. countries. As a result, politically motivated changes on the movement of people and goods across making international in borders this report. During the next two years, it is feasible that the first cyber-related deaths Technology will remain an area of rapid change and thus features in many of the threats 9 business more difficult and expensive. An increasingly fraught political situation will occur, especially as new health or transport systems are hacked. A severedeaths and in this report. During the next two years, it is feasible that the first cyber-related Significant acts of terrorism will continue, with varying responses from leading Technology will remain anattack areaTreaty ofwill rapid change and thus features in9many of the threats couldoffers worsen between world powers – particularly NATO (North Atlantic widely publicised insider either due to ignorance, This section non-information security will occur, especially as new health orbecome transportinevitable, systems are hacked. A severe and worker Figure 1: The 1 10 countries. As a result, politically motivated changes may introduce restrictions in this During the next two years,party. it is feasible that the first cyber-related deaths Organisation) and Russia – with a return to the Coldreport. War, possibly hastened disenchantment or coercion abythird Organisations should thereforeworker already be widely publicised insider attackbywill become inevitable, either due to9ignorance, context against which the threats in this PESTLE model will occur, especially as new health or transport systems are hacked. A severe and on the movement of peopleinand across borders making a change of administration the goods USA which may wish to redress balance of party. asking themselves; ‘Ifthe Edward can10severely disrupt the workings governments, disenchantment or international coercion by Snowden a third Organisations should thereforeofalready be O 2 O widely publicised insider attack will become inevitable, either due to ignorance, worker A business more difficult and expensive. An increasingly fraught political situation LL I T I CC A what could a commercial counterpart do to us?’ world power. Other events, such as an unravelling of the Iranian nuclear deal asking themselves; ‘If Edward Snowden can severely disrupt the workings of governments, report may be viewed. 3Atlantic disenchantment or coercion byTreaty a third party.10 Organisations should therefore already be could worsen actions between – particularly NATO (North or aggressive byworld Northpowers Korea, could add to the instability. what could a commercial counterpart do to us?’ asking ‘If Edward Snowden can severely disrupt the workings of governments, Organisation) and Russia – with a return to the Coldthemselves; War, possibly hastened by couldto a commercial It describes a world where uncertainty a change of administration in the USA whichwhat may wish redress thecounterpart balance of do to us?’ The pipeline of legislation and regulation will continue to grow. While much of this change 2 world power. Other events, such as an unravelling of the Iranian nuclear deal R C Economic growth will continue to be unevenly spread across the major economic ONOM is pervasive and change is likely to be The maypipeline be viewed by organisations as burdensome, it will still require so, when of legislation and regulation will to grow. While compliance: much of this change E continue ONM 3 or aggressive actions by North Korea, could add to the instability. powers, resulting in unpredictable outcomesmay as many tryhefty toby keep pace withas a burdensome, be viewed organisations it will stillinrequire compliance: so, when will the first fines be imposed for non-compliance the face of these changing accompanied by significant and swift impact. The of legislation and regulation will continue to grow. While much of this change 4 pipeline 11 growing US economy and rising interest rates. Of equal concern are the potential will the first hefty fines be time, imposed non-compliance in the of these demands? At the same thefor reaction of the public andface media may changing be unpredictable. may be viewed bylead organisations asreaction burdensome, will still compliance: so, when 11 effects of sustained loware commodity prices, may inAtturn thetofailure demands? the sametotime, the ofsecurity theitpublic andrequire media maythey be unpredictable. These potential changes set out aswhich ideas Will they become apathetic information incidents, or will bring legal action will the first hefty fines be imposed for non-compliance in theor face these changing Economic growth will continue to be unevenly spread across the major economic of one or more political administrations thatWill rely heavily on high oil prices, they become apathetic to information security incidents, willofthey bring legal action against organisations that fail tothus protect their data? 11 demands? At the same time, the reaction ofdata? the public and media may be unpredictable. to challenge the reader, and 5are described against organisations that fail to protect their powers, resulting unpredictable outcomes as many try to with jeopardising futureinsupplies. The next two years may see thekeep firstpace failure of a large Will 4 they become apathetic to information security incidents, or will they bring legal action US economy and rising interest 1). rates. Ofincident. equal concern thecustomer potential organisation due to a major information security Loss ofare trust, using the growing PESTLE model (see Figure ISF against organisations that fail to protect their data? effects of sustained prices, whichinmay in price turn lead to the failure and media backlash,low andcommodity a substantial reduction share will combine to Despite the seemingly positive outcome from the 2015 United Nations Climate Change MembersPersistent are encouraged to consider these 6 SO LEGAL of onethat or more political administrations thatposition. rely on high oil prices,outcome thus place organisation an unrecoverable deflation andin austerity will continue to heavily impact many countries. For some, CIAL Despite the seemingly positive from the 2015 United NationsonClimate Change Conference (COP21), global warming will continue to wreak havoc weather systems, 5 this will create increased mobility seek work, but at what social cost? The jeopardising future supplies. The to next two years may see the first failure of conditions a large Conference (COP21), global factors and add others from their own 12 warming will continue to wreak havoc on weather systems, people and economies. Unwanted sidefrom effects may include major outages inChange power and Despite the seemingly positive outcome the 2015 United Nations Climate 12 towards could well bedue set to further a move from free incident. market capitalism alternative organisation a majorfuel information security Loss of trust, customer people and economies. Unwanted side effects may include major outages in power and shortages of other key resources such ascontinue clean water. Businesses with plans systems, and initiatives 7 Conference global warming to Businesses wreak havoc on weather experience considering the threats economic This could result in social unrest, with fluid andsuch andwhen mediaapproaches. backlash, and a substantial reduction in share pricehighly will combine to will shortages of(COP21), other key resources as clean water. with plans and initiatives 12 severe weather will suffer. The future of alternative energy in regions susceptible to people and economies. Unwanted sidewill effects may include N O O Goutages in power and consequences forunrecoverable organisations position. around the world.8 to severe place organisation in an in regions susceptible weather suffer. The futuremajor of Lalternative energy set out infar-reaching thisthat report. sources such as wind farms, tidal lagoons and solar arrays are expected toand faceinitiatives continued shortages of other key resources such as clean water. Businesses with plans sources such as wind farms, tidal lagoons and solar arrays are expected to face continued 13 opposition, possibly jeopardising their future. in regions susceptible to severe weather will suffer. The future of alternative energy 13 opposition, possibly jeopardising their future. 1 P. Wintour, “G20 to discuss threat of Isis infiltrators among EU migrants after Paris attacks”, The Guardian, 15 November 2015, sources such as wind farms, tidal lagoons and solar arrays are expected to face continued www.theguardian.com/world/2015/nov/15/g20-cameron-world-leaders-turkey-paris-attacks-syria Technology will remain an area of rapid change and thus featuresjeopardising in many of their the threats future.13 2 N. MacFarquhar and S. Erlanger, “NATO-Russia Tensions Rise After Turkey Downs Jet”, The New York Times, 24opposition, November 2015, possibly www.nytimes.com/2015/11/25/world/europe/turkey-syria-russia-military-plane.html?_r=0 in this report. DuringSignificant the next two years, it isof feasible that the first cyber-related deaths acts terrorism will continue, with varying responses from leading 3 R. Gladstone and T. Erdbrink, “Tensions in Iran After Nuclear Deal Grow in Hostility”, The New York Times, 15 November 2015, 9 www.nytimes.com/2015/11/16/world/middleeast/tensions-in-iran-after-nuclear-deal-grow-in-hostility.html will occur, especially as new health or transport systems are hacked. A severe and 1 S THE NEXT TWO TYEARS SO N I 経済動向 E ENV E P TA L PP 技術動向 法律・制 度動向 L 環境影響 TEC H T AL S IC 社会動向 E IC H 政治動向 LL TEC PESTLE MODEL CIAL AL GAL IC LE countries. As a result, politically motivated changes may introduce restrictions 4 L. Phillips, “Forex focus: Fed’s first rate rise in 10 years will have a global impact”, The Telegraph, 1 December 2015, 脅威 1.1 IoT(Internet of Things)による機密情報漏洩 影響: • 被害の発生に伴う罰金や法的費用の高まり • 法的責任の増加 • 信用リスク 推奨: • • • • IoT導入に先立つ、同意の獲得とデータ保護策の導入 ポリシー、利用規約の透明性と準拠性を確認 IoTを単なるデバイスの一分類と判断しない ポリシー、基準、指針、プロセスをアップデート Source: PerfectCloud.io 脅威 1.2 不透明な アルゴリズムが安全性の欠如につながる 影響: • 維持メンテナンスされないアルゴリズムが収益の損失や遅延につながる • 専門能力の欠如から、基幹システムの不具合が増加 • インシデント発生により信用に傷がつく 推奨: • • • • 脆弱性なアルゴリズムを利用するシステムの識別、法的責任の理解 コード管理ポリシーをアップデート アルゴリズム関連インシデントに起因するリスク対処方法の代替手段を識別 堅牢な事業継続、復旧計画を指揮 Source: The Hacker News 脅威 1.3 ならず者政府がテロリストグループをサイバー攻撃に使用 影響: • ブランドのダメージ、収益の減退や破産も • SIEM (Security Information and Event Management)システムが度重なる 攻撃にさらされることによる事業の中断 推奨: • リスク管理プロセスを採用し、新たな能力にて脅威に対処 • 既存のコントロールを評価、上昇しているレジリエンシーに集中 • 同様の脅威に直面する政府や組織との協力による脅威情報の共有を模索 Source: Security Intelligence 脅威 2.1 主要インシデントにより露見する経営陣の期待への相反 影響: • 不完全なリスクアセスメントに起因する費用のかかるインシデント • 意思決定の妨げとなる脅威とインシデントに対する能力欠如 推奨: • 経営幹部と連動し信頼性の高いサイバーリスクを定期的に提供 • CISOと情報セキュリティ部門の現在と未来の能力に基づき、セキュリティ向上について 経営陣の期待と歩調を合わせる • CISOおよび情報セキュリティ部門を専門家から信頼できるビジネスパートナーへと移管 するタレントプログラムの開始 • 他者から学習 Source: Slash Gear 脅威 2.2 研究者がセキュリティの脆弱性を隠蔽 影響: • 修正が加えられるべき危険なソフトウェアに起因する、事業の中断 • 脆弱性をもみ消した行為が公になった時に、製造者の販売が減退 • 死亡事例の発生につながる脆弱性をもみ消した製造者へのダメージ 推奨: • 責任感のある仕事をする研究者に経済的報酬を検討 • 仲介業者を採用し満足度の高い情報公開への合意を取り付ける • 調達プロセスにおける高いレベルでの透明性を追求 Source: LinkedIn 脅威 2.3 サイバー保険セーフーティネットの消失 影響: • 組織のリスク移管へのアクセス消失 • 代替策適用に伴う高いコスト • 信用性評価によるサイバー保険市場の減速 推奨: • 事前にリスク管理戦略を再評価、サイバー保険を通じて移管されるリスクを把握 • 潜在的に高費用な例外事象へのサイバー保険を精査 Source: Business Insider 脅威 3.1 破壊的な企業が政府の怒りをかう 影響: • 政府と恊働せず反発する組織への莫大な罰金 • IT分野の企業はより厳しい監視の対象に 推奨: • 地元での製品およびサービス提供の状況を理解し、政治的反発を回避 • 原理に基づく規則システムに特化した、政治的影響への明確なる戦略を考案 • 集約した影響についての可能性を検討 Source: Euractiv 脅威 3.2 規制がクラウドを分断 影響: • クラウドサービスが複数の国に分断されることでオペレーションや製造に滞りが発生 • クラウドのコンプライアンス遵守のために追加のリソースが必要 • 組織自身がデータ保護関連の基準に適合する必要性 推奨: • 規制は変容していくことを理解 • 先を見越し、後の祭りになる前に戦略を考案 Source: Security Intelligence 脅威 3.3 犯罪者の能力と国際警察とのギャップ 影響: • 組織の技術的能力不足がサイバー犯罪の抑止に失敗しブランドが毀損 • eコマースの成長と不十分な国際法執行機関との協力により、発生した損失が より一層悪化 • 海外でビジネスを行なう能力の低下 推奨: • 脅威情報の充足と障害回復力の向上 • 先を見越して行動、政府に働きかけ国際的枠組みを構築 その後の展開 安全をデザイン、プライバシーをデザイン 1. テクノロジーは十分なセキュリティ機能を有し、顧客の手に渡る前に確実に設定され なければなりません。 2. 個人データ保護の原則は、製品の機能や動作と一体化したものであることが重要 です。 3. ほんの少し努力すれば、専門的な知識がなくても顧客が製品を安全にできることが 求められます。 4. 製品の安全性を確保する上での負担は、販売側よりも顧客側において軽減される べきです。 倫理的テクノロジーの開発 1. 製薬、医療、法律業界には厳しい検査と認可制度があり ます。不意の事故や質の悪い薬の削減は、専門的人材の 削減にも繋がります。 2. 技術開発は社会、安全、プライバシーといった項目において 適切な検査を経るべきでしょう。 3. 安全なデザインとプライバシー保護のデザインは、それぞれ 別々に検査することが重要です。 重要なポイント 1. サイバー攻撃の被害と頻度は今後も増加 2. 知的財産の盗難から生じる損失は、サイバー犯罪のコストを圧倒的 に上回る 3. サイバー犯罪はビジネスや革新への“税金” 4. 堅牢なセキュリティとプライバシー保護を持たない崩壊的テクノロジー 5. 技術開発における倫理規定の必要性 DISCUSSIONS
© Copyright 2024 ExpyDoc