1 The Threatscape is evolving rapidly A.Prove capabilities? B.Exact revenge? C.Erode our confidence? D.Perpetrate fraud in the background via the contact.

Slides:



Advertisements
Similar presentations
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
What’s Next in Office 14 & Windows 7. Office 14 Microsoft Office System 2010 Expected Date????
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
Digital Technology Basics Digital Technology Basics includes two lessons:  Lesson 1: The Modern Digital Experience  Lesson 2: Digital Technology & Career.
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
WESAM SHULDHUN KHALID AL-ZUGHAIBI IPv4 vs. IPv6.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Communications & Data Services The Evolution of Communications Cathy Avgiris EVP/GM May 10, 2012.
Securing Information Systems
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
IT security By Tilly Gerlack.
CWAG July 11, 2011 New Connections for a Digital Life Tammi Terrell Vice President-General Manager San Diego, Las Vegas, Hawaii – AT&T.
4G-LTE: Enhancing Efficiency in Organizations. Factors Impacting Digitization Processes and Systems January Powerful Platforms and Devices Storage.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Paul King Director, Threat Intelligence CiscoSystems.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Chapter 7 Networks and the Internet Networks Sharing resources among multiple computers (workstations) Local Area Networks Wide Area Networks.
Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.
C 3 : A Formula For Success Coverage, Customization & Collaboration Pete Peterson SVP, U.S. Sales, Tech Data.
FIRST SCREEN In 1929, we were introduced to the “First Screen” Still today, Television advertising is a tremendously effective way to market.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Two trends that will change the Internet
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
ICT in Society.
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Computer Security By Duncan Hall.
The Changing Face of the Contact Centre 18 th September 2013.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Information Systems Week 7 Securing Information Systems.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
October 28, 2015 Cyber Security Awareness Update.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
IT Security Awareness Day October 19, 2016
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Year 10 ICT ECDL/ICDL IT Security.
Securing Information Systems
Cybersecurity Awareness
Training at Innothoughts Systems
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Student IT Induction (UEL)
Week 7 Securing Information Systems
Securing the Threats of Tomorrow, Today.
The Global Challenges of Cybersecurity and Digital Terrorism
Protecting Your Company’s Most Valuable Asset
How to keep the bad guys out and your data safe
Mobile Security What is mobile secuirty & Identifying smartphone security holes& Sayed Hashimi Proposal Project.
IP Addresses & Ports IP Addresses – identify a device on a network
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

1 The Threatscape is evolving rapidly A.Prove capabilities? B.Exact revenge? C.Erode our confidence? D.Perpetrate fraud in the background via the contact center? E.All of the above? A.Prove capabilities? B.Exact revenge? C.Erode our confidence? D.Perpetrate fraud in the background via the contact center? E.All of the above?

“Industrialization of Hacking” Confidential 2 Innovation drives efficiency and productivity  Hacking, once a hobby, is now highly mechanized and process driven Innovation drives efficiency and productivity  Hacking, once a hobby, is now highly mechanized and process driven Transportation opens new markets and shrinks the world  Hackers now access potentially anything…from anywhere Transportation opens new markets and shrinks the world  Hackers now access potentially anything…from anywhere Communication connects far-flung parties  Personal information is shared through web applications and social media Communication connects far-flung parties  Personal information is shared through web applications and social media

The vulnerable surface area continues to increase 3 Network Boundaries Application Access Ubiquity WiFi 4G LTE NFC Blue Tooth Connectivity

Speaking of connectivity… Approaching 10 billion Internet-connected devices (IMS Research) Forecasting 28 billion Internet-connected devices by end of 2020 Mobile Internet devices outnumber humans this year (Cisco) Transition from IPv4 (4.3 billion unique addresses) to IPv6 (340 trillion trillion trillion unique addresses) Hacking moves beyond traditional computers –Printers –Video conferencing systems –Mobile devices 4

The hacking community has changed complexion Confidential 5 Hobbyists/Techies Small-Time Criminals Gangs/Organized Crime Hacktivists State-Sponsored Entities Training courtesy of YouTube!

What’s the most serious threat? Confidential 6

Infiltration Confidential 7 APTs Malware Insider Threats (Spear) Phishing Drive-By Downloads Watering Holes SQL Injection Cross-Site Scripting Remote Code Execution

Diversion and disruption Confidential 8 BotNets Media Floods - -Phone -SMS

What do we do? Basic blocking and tackling –Default credentials –Default settings (e.g., on databases) –Basic web app vulnerabilities –Vulnerability patching –Security awareness training Let’s dig a bit deeper in the panel discussion… Confidential 9