America’s prosperity and security depend on how we respond to the opportunities and challenges in cyberspace. Critical infrastructure, national defense, and the daily lives of Americans rely on computer-driven and interconnected information technologies. As all facets of American life have become more dependent on a secure cyberspace, new vulnerabilities have been revealed and new threats continue to emerge. Building on the National Security Strategy and the Administration’s progress over its first 18 months, the National Cyber Strategy outlines how the United States will ensure the American people continue to reap the benefits of a secure cyberspace that reflects our principles, protects our security, and promotes our prosperity.
Read the full report: https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
Cyber-enabled attacks are exacting an enormous toll on American businesses, government agencies, and families. Computer intrusions, cybercrime schemes, and the covert misuse of digital infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped hostile foreign governments launch influence operations designed to undermine fundamental American institutions.
The Department of Justice’s primary mission is to keep the American people safe. We play a critical role in the federal government’s shared effort to combat malicious, cyber-enabled threats.
In February 2018, the Attorney General established a Cyber-Digital Task Force within the Department and directed the Task Force to answer two basic, foundational questions: How is the Department responding to cyber threats? And how can federal law enforcement more effectively accomplish its mission in this important and rapidly evolving area?
Read the full report: https://www.justice.gov/ag/page/file/1076696/download
THINKING DIFFERENTLY: PROTECTING YOUR EMPLOYEES, CUSTOMERS AND THE SUPPLY CHAIN THROUGH DMARC ENFORCEMENT
The threat landscape is fundamentally changed. Attackers are now increasingly targeting people, not infrastructure. The move to the cloud is intensifying that trend.
Threats today are not only targeting people, they are activated by people. Attackers are relying on users to click and do the work for them. Over 99% of threats rely on users to run malicious code. For example, the user must download the malicious attachment, open the file, and click to enable macros. About 2/3 of malicious links are credential phish. Its success purely depends on tricking the user to click on the link, go to the page, and enter their credentials.
As users shift to the cloud, attackers and threats naturally follow. Shifting to cloud also includes attacks through mobile applications and social media. Gartner’s “Implementing Office 365” survey says, “Email is the most important Office 365 service”. Successful migration isn’t easy. Most organizations will need to support a hybrid environment in the process. That will have material impact on your security strategy.
The rapid rise in malware-free BEC and email fraud has cost organizations globally billions of dollars, and company boards are noticing. The most recent FBI statistics cite over $12.5B in losses and 78,617 incidents worldwide.
View the full presentation: /infragardbuffalo.org/images/Buffalo-Infragard_Luncheon_Proofpoint.pdf
Buffalo Cyber Task Force (BCTF)
The Buffalo Cyber Task Force (BCTF) is comprised of Federal, State, and Local law enforcement agencies in Western New York. The BCTF investigates Cyber Crimes occurring in Western New York to include:
- Computer Intrusions
- Exploitation of Children
- Infringement of Intellectual Property Rights
For more info: https://www.fbi.gov/investigate/cyber
General Information on Internet Safety Speeches
These presentations are for all interested adults, especially those with school aged children, to learn about Cyber Predators and protecting children on-line. All presentations are open to members of the public.
General Questions: Contact FBI Community Outreach Specialist Vanita Evans at
Report | Info | Tips:
Report identity theft: www.ftc.gov
Internet fraud complaints: www.ic3.gov