03.06.2015 Views

Bespoke Cyber Awareness for High Net Worth Individuals

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Bespoke</strong> <strong>Cyber</strong> <strong>Awareness</strong> <strong>for</strong> <strong>High</strong> <strong>Net</strong> <strong>Worth</strong> <strong>Individuals</strong>


What?<br />

With <strong>Cyber</strong> Security incidents dominating the headlines,<br />

the world has witnessed cybercrime become one of the<br />

most lucrative illegal activities in the world. As hackers<br />

develop increasingly sophisticated methods <strong>for</strong><br />

circumventing the security systems of major<br />

international corporations, it has become clear just how<br />

vulnerable the individual computer and smartphone<br />

user is.<br />

In response to this changing threat landscape, PGI has<br />

developed a complete package which helps to create a<br />

safer environment <strong>for</strong> conducting business, and more<br />

specifically, individualised protection.<br />

We believe that the greatest defence is a thorough<br />

knowledge of the risk. Our bespoke package starts at<br />

£12,900 (excluding VAT) and provides our clients with<br />

an in-depth analysis of their exposure as well as sharing<br />

the tools, techniques, and methods <strong>for</strong> mitigating the<br />

risks effectively and sustainably through intensive<br />

training lead by experienced cyber security<br />

professionals.<br />

The <strong>Cyber</strong> <strong>Awareness</strong> Package <strong>for</strong> HNWI<br />

PGI’s <strong>Cyber</strong> <strong>Awareness</strong> package will include<br />

two phases, firstly our intelligence and cyber<br />

analysts will build a comprehensive picture<br />

based on open source intelligence, and<br />

secondly the cyber awareness course<br />

will be built around this context to to<br />

impart relevant knowledge<br />

and mitigation solutions.<br />

1


Who?<br />

There is a growing trend amongst financial institutions<br />

wherein they are beginning to offer safety training<br />

services to their clients, to promote awareness of the<br />

cyber risks they pose to their assets, both tangible and<br />

intangible, on their smart devices and social media.<br />

Rathbone Brothers, a Wealth Investment Management<br />

Company, has a wide breadth of high-profile clients,<br />

including those considered <strong>High</strong> <strong>Net</strong> <strong>Worth</strong> <strong>Individuals</strong><br />

(HNWI) and Ultra <strong>High</strong> <strong>Net</strong> <strong>Worth</strong> <strong>Individuals</strong> (UHNWI).<br />

This is a classification used by the financial services<br />

industry to denote an individual or family with high net<br />

worth; whilst these clients already benefit from<br />

personalised services in investment management, estate<br />

planning, and asset preservation, there is an increasing<br />

demand to equip them with effective personalised cyber<br />

protection.<br />

PGI, an intelligence and security company at the<br />

<strong>for</strong>efront of <strong>Cyber</strong> Security, has developed a bespoke<br />

training and corresponding Online Hostile<br />

Reconnaissance package to in<strong>for</strong>m and protect<br />

Rathbones’ HNWI and UHNWI clients against internal<br />

perpetrators and cybercrime.<br />

The package we offer is specially tailored to each<br />

individual, includes a detailed <strong>Cyber</strong> Exposure<br />

Intelligence Report, as well as individual <strong>Cyber</strong><br />

<strong>Awareness</strong> Training that spans one day, and in<strong>for</strong>ms<br />

delegates on cyber-attacks that afflict high-profile<br />

clients most.<br />

2


How? – Phase One<br />

PHASE ONE – Identify Risk and Exposure<br />

The first indication that a data breach has occurred if<br />

often the appearance of client specific data in the not-so<br />

public domains.<br />

PGI are leading providers of intelligence. We use open<br />

source intelligence (OSINT) to provide companies,<br />

governments and individuals with better in<strong>for</strong>mation<br />

and better analysis <strong>for</strong>, ultimately, better decisions.<br />

Combined, PGI’s intelligence and cyber analysts offer a<br />

range of specialised intelligence gathering and analysis<br />

solutions. Our proprietary OSINT (Open Source<br />

Intelligence) gathering systems are able to identify and<br />

retrieve data from sources far beyond what’s visible to<br />

readily available search and analysis tools.<br />

As part of phase one of the <strong>Cyber</strong> <strong>Awareness</strong> package<br />

PGI’s cyber and intelligence analysts will conduct Online<br />

Hostile Reconnaissance (OHR) and assess <strong>Cyber</strong><br />

Vulnerabilities as they apply to each HNWI or UHNWI<br />

client and produce a report which summarises their<br />

exposure, to include:<br />

• Social Media<br />

• Business Transactions<br />

• Press Reporting<br />

• Personal Security Details<br />

• Personal Location In<strong>for</strong>mation<br />

• Pattern of Life<br />

• Familiar Vulnerabilities<br />

The report will also include example scenarios.<br />

Online Hostile Reconnaissance<br />

(OHR)<br />

PGI’s OHR service is designed to position<br />

individuals back in control of their online footprint<br />

by highlighting their level of exposure to physical<br />

and virtual assets apparent in open sources.<br />

By using a combination of Intelligence and <strong>Cyber</strong><br />

Security resources, PGI will be able to establish a<br />

comprehensive picture of how the public profile<br />

of a HNWI may be at risk of exploitation. Our<br />

intelligence analysts will approach the selected<br />

profiles through the eyes of an adversary to<br />

identify potential vulnerabilities.<br />

Detecting <strong>Cyber</strong> Vulnerabilities<br />

PGI cyber intelligence analysts will conduct a cyber-intelligence investigation that will scour the length<br />

and depth of the open source internet. Once all the data has been gathered they will analyse and<br />

produce a high quality report. This online reconnaissance is similar to what cyber criminals do in their<br />

initial stage of an attack. All these details are available free of charge and all work is conducted legally.<br />

The overall profiling is set against benchmarks of standards, identical to those used by default in UK<br />

Government and Industry to establish where the gaps are in each area. This is then supported by a<br />

series of remedial recommendations to bring the HNWI up to those standards including measures to<br />

sustain their position.<br />

From a <strong>Cyber</strong> threat intelligence perspective, PGI creates a profile <strong>for</strong> the client by using a variety of<br />

tools, identifying external assets which may be in use by the Bank. PGI consultants then search both<br />

the open internet, dark web and other covert sources <strong>for</strong> in<strong>for</strong>mation relating to the company through<br />

which threat actors may be looking to exploit the company and what attack vectors they may be<br />

looking to use. This includes the Bank’s supply chain and client base.<br />

3


How? – Phase Two<br />

PHASE TWO – Understand and Mitigate<br />

Phase Two will draw upon the intelligence reporting<br />

conducted in Phase One to establish a focussed cyber<br />

threat awareness module that will enable each HNWI or<br />

UHNWI to fully appreciate the risks and how they apply<br />

to them.<br />

This immersive one day course will utilise relevant<br />

scenarios and hands on techniques to demonstrate their<br />

real-world consequences.<br />

Delegates will learn and experience the methodologies<br />

that an attacker will adopt to breach their personal<br />

security and to expand access within a compromised<br />

network.<br />

Upon completion of this course the HNWI or UNHWI will<br />

have a full appreciation of:<br />

• Real world hacking events and consequences<br />

• Exploitation techniques used by hackers<br />

• How to protect and save assets through<br />

effective mitigation<br />

• Malware and what it can do<br />

• <strong>Cyber</strong> defence operations<br />

Our trainers are experts in their respective fields of<br />

cyber security, and everyday practitioners (see bios<br />

right). They will make every ef<strong>for</strong>t to ensure that each<br />

course is specifically tailored to suit the individual’s<br />

context and existing technical knowledge.<br />

Jim Wheeler<br />

<strong>Cyber</strong> Operations<br />

Director<br />

Tim Nursall<br />

Technical Director<br />

Jim joined PGI in 2014 having accumulated eight years’ experience working at the<br />

cutting edge of cyber security at a national level, within the British Government.<br />

Jim was a senior team member developing cyber security operational techniques<br />

to protect the United Kingdom against threats to national security. In this role he<br />

made a significant impact on counter terrorism, counter espionage and organised<br />

crime programs. He has preeminent experience in <strong>Cyber</strong> Security, Insider Threat,<br />

Social Engineering, IT Forensics, Intruder Detection Systems, Access Control,<br />

Border Security and Physical Security. Jim is the only individual (to date) to qualify<br />

and work as a specialist in all of these areas of UK Government. Throughout this<br />

period Jim has advised the most important Critical national Infrastructure (CNI) on<br />

<strong>Cyber</strong> and Electronic Security Systems, measures and policies. He has also<br />

designed and carried out physical, technical and human testing <strong>for</strong> the security of<br />

CNI locations. Prior to his government work, Jim worked at LogicaCMG as a<br />

Business Consultant in their Space and Defence Sector working on classified<br />

projects.<br />

Tim is recognised as one of the leading security consultants and practitioners in his<br />

field. He has spent his whole career to date in the commercial sector and draws on<br />

years of experience working across the financial services, CNI, and retail sectors to<br />

help clients’ mitigate the threat to their data and operations. Tim possesses some<br />

of the highest qualifications within in<strong>for</strong>mation security, including holding<br />

accreditations to lead teams testing all classifications of Government networks. He<br />

has worked with a large number of the FTSE 100, including testing against banking<br />

infrastructure. Tim has a first class BSc in Ethical Hacking and <strong>Net</strong>work Security and<br />

has taught university students within this field. Tim has designed and built the<br />

training course that leads to the highest qualification recognised by UK<br />

Government in network and application testing.<br />

4


Level 2 | 3 Sheldon Square | London | W2 6HY | UK<br />

Contact us<br />

Tel: +44 (0)207 887 2699<br />

Email: customerservices@pgitl.com<br />

Visit: www.pgitl.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!