English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.

Slides:



Advertisements
Similar presentations
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Advertisements

1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Emerging Trends: Cyber Threats Bryan Sheppard Cyber Security Defense Center.
Cyber Resilience Simon Onyons Financial Stability – Resilience Team.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Maritime Cyber Risks – What is real, what is fiction?
Computer Crime and CyberCrime Why we need Computer Forensics.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Scams & Schemes Common Sense Media.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Security Awareness Effecting Cultural Change ISACA Northern England Chapter Meeting – 25 June 2015 Martin Smith MBE FSyI Chairman and Founder The Security.
Information Warfare Playgrounds to Battlegrounds.
Cyber Security Nevada Businesses Overview June, 2014.
Get Safe Online Expert advice for everyone In association with.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Information Warfare Playgrounds to Battlegrounds.
A threat to global security and economy Koushik Mannepalli CMPE 294.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Security Mindset Lesson Introduction Why is cyber security important?
Friday 22nd April 2016 DS Chris Greatorex SEROCU
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Fraud and the internet Sandra Peaston Assistant Director, Insight Cifas, The UK’s Fraud Prevention Service.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
October 28, 2015 Cyber Security Awareness Update.
E-Finance & Virtual Payments.  Google Now  Mobile Banking  Uber / Paytm Free Rides.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cyber Security Zafar Sadik
how to prevent them from being successful
Careers in Cyber Security
Cyber Crime What’s all the fuss about?
Cyber Security: State of the Nation
RCCU Zephyr South West Regional Cyber Crime Unit.
Cyber Security Awareness Workshop
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
The Insurance Sector & Beyond – Managing The Threat Within
Dissecting the Cyber Security Threat Landscape
Jon Peppler, Menlo Security Channels
Cybersecurity Awareness
Partnering to Minimize the Impact of Data Compromises
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Security in the Mortgage Industry
Threat landscape financial sector
Internet Security Threat Status
Curating an Effective Security Culture
Prepared By : Binay Tiwari
Securing the Threats of Tomorrow, Today.
The Global Challenges of Cybersecurity and Digital Terrorism
Keeping your data, money & reputation safe
Protecting Your Company’s Most Valuable Asset
Anatomy of a Large Scale Attack
Looking to the Future MIS 689 Cyber Warfare Capstone.
Information Security – Sep 18
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Cyber Security 04/04/2019 STEP Mauritius 2019
Presentation transcript:

English Arabic Cyber Security: Implications of recent breaches MENOG April 2015

English Arabic Cyber attacks dominating the news

English Arabic Financial services are a major target

With traditional perpetrators Petty criminals Organised crime Governments English Arabic

Their targets and MO evolve Attackers follow data into the cloud Developing countries and mid tier banks Mobile platform vulnerabilities English Arabic

67% of cyber espionage attacks in 2014 started with a phishing – 20% fall for it 85% of cyber attacks would be unsuccessful if IT staff had taken basic steps 51% of the worst UK data breaches in 2013 were caused by staff error or misuse 49% of companies do not perform employee security-awareness training even though their annual losses are four times greater than those that do (PwC US) 50% of end-users have taken data from their company 69% of former employees can still access their systems 28% of passwords are breakable in 15 seconds English Arabic Users don’t help

… pursuing traditional objectives English Arabic Making a point Making money Supporting geopolitical conflict Pursuing national intelligence objectives

Making money English Arabic Stolen credit card details Personal data theft Ransom and extortion Banking details Market manipulation Cyber fraud

Looking ahead - targets English Arabic Attacks on banking systems Point of sale attacks on credit cards Identity theft: Customer data, Patient and healthcare data SCADA targets - more obvious and lucrative thanks to IoT Plus: economic espionage cyber skirmishes in support of conflicts hacktivists interest in newsworthy events

Looking ahead - attacks English Arabic Ransomware Malware in advertising Mobile malware Exploits increasingly reserved for targeted attacks alongside spear-phishing, watering-holes and social media Social engineering and phishing weapon of choice for cyber crime More ‘old vulnerabilities’ Targeted attacks

What can be done? English Arabic Developing cyber profession – training and research Workforce transformation – IT, operational and leadership Information sharing Technologies to counter the insider threat to complement perimeter defence Threat intelligence