SlideShare a Scribd company logo
1 of 22
Today’s Menu
 Few words on background
And of course… a disclaimer!
 Moving from IT Security to Cybersecurity
Is it just a “wording” change?
 The Cybersecurity Kill Chain
What’s this?
 So… Threat or Myth?
Obvious answer?
 If threats there are…what are the scariest ones?
Trends / Tendencies?!?!... Not really!
 To counter-attack you have to think like…
You already know the answer! Or maybe…
Background 
And Disclaimer!
I express my own opinion as a Cybersecurity expert!
&
My legal department did not review my slides!
&
Yes, I know “a bit” about Cybersecurity!
but
I learn everyday so please… give me inputs!
From IT Security to…
Cybersecurity
What was IT Security
Cybersecurity = Paradigm shift
Cybersecurity Kill Chain
Definition
Hackers’ way!
Exploitation
“Hacking”
Post exploitation &
maintaining access
Reconnaissance Scanning
Covering
tracks
Cyber kill chain
Exploitation
“Hacking”
Post exploitation &
maintaining access
Reconnaissance Scanning
Covering
tracks
Cyber kill chain
Evaluate TreatIdentify Analyze
Monitor and
communicate
IT & Information Risks chain
The Kill Chain - 101
So… Threat or Myth?
I know, it’s an obvious one!
“About 110 million Americans
— equivalent to about 50% of
U.S. adults — have had their
personal data exposed in
some form in the past year”
Tim Pawlenty, president of the Financial Services Roundtable
and the former governor of Minnesota.
The Truth is out there!
But it’s bigger than you think…
APT  Silent but…
EVIL
Future targets or just Hackers’ dreams?
Counter-attack?!?!
Develop new approaches!
Fear as a tool
is going blunt rapidly
Think once, act many
Create practices inherently more secure
Have your people win the game
Education,
gamification,
out-of-the-box creativity
Cyber security   the cybersecurity kill chan - myth or threat
Cyber security   the cybersecurity kill chan - myth or threat

More Related Content

Viewers also liked

CONFERENCE PROGRAMME 2010
CONFERENCE PROGRAMME 2010CONFERENCE PROGRAMME 2010
CONFERENCE PROGRAMME 2010
Dr Andrew Clegg
 
SogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D PrintingSogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D Printing
SogetiLabs
 

Viewers also liked (13)

The museum de sergio.g
The museum de sergio.gThe museum de sergio.g
The museum de sergio.g
 
Finalllll
FinalllllFinalllll
Finalllll
 
Открытка к 9 мая
Открытка к 9 маяОткрытка к 9 мая
Открытка к 9 мая
 
CONFERENCE PROGRAMME 2010
CONFERENCE PROGRAMME 2010CONFERENCE PROGRAMME 2010
CONFERENCE PROGRAMME 2010
 
Resume
ResumeResume
Resume
 
SogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D PrintingSogetiLabs Webinar - 3D Printing
SogetiLabs Webinar - 3D Printing
 
Environment campaign framework
Environment campaign frameworkEnvironment campaign framework
Environment campaign framework
 
ISBarcamp
ISBarcampISBarcamp
ISBarcamp
 
SRIDEVI MALINDA
SRIDEVI MALINDASRIDEVI MALINDA
SRIDEVI MALINDA
 
Sogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT TestingSogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT Testing
 
Pecha kucha bornem
Pecha kucha bornemPecha kucha bornem
Pecha kucha bornem
 
Pecha kucha bilzen
Pecha kucha bilzenPecha kucha bilzen
Pecha kucha bilzen
 
Chris Stumpf lbmo afm nanolithography report
Chris Stumpf lbmo afm nanolithography reportChris Stumpf lbmo afm nanolithography report
Chris Stumpf lbmo afm nanolithography report
 

Similar to Cyber security the cybersecurity kill chan - myth or threat

1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
Ana Meskovska
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
MSR Buzz
 

Similar to Cyber security the cybersecurity kill chan - myth or threat (20)

How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Security for Thinkers
Security for ThinkersSecurity for Thinkers
Security for Thinkers
 
Red Teaming and the Supply Chain
Red Teaming and the Supply ChainRed Teaming and the Supply Chain
Red Teaming and the Supply Chain
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Computer Security.ppt
Computer Security.pptComputer Security.ppt
Computer Security.ppt
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 

More from SogetiLabs

The Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threatThe Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threat
SogetiLabs
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
SogetiLabs
 
Digitecture pop150316
Digitecture pop150316Digitecture pop150316
Digitecture pop150316
SogetiLabs
 

More from SogetiLabs (15)

Paul Mason - Post Capitalism
Paul Mason - Post CapitalismPaul Mason - Post Capitalism
Paul Mason - Post Capitalism
 
Mike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetMike Hearn - Beyond Tradenet
Mike Hearn - Beyond Tradenet
 
Menno van Doorn - Computer Says No
Menno van Doorn - Computer Says NoMenno van Doorn - Computer Says No
Menno van Doorn - Computer Says No
 
Marcel Krom - When Are You @Home
Marcel Krom - When Are You @HomeMarcel Krom - When Are You @Home
Marcel Krom - When Are You @Home
 
Luciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from MachinesLuciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from Machines
 
John Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is EverywhereJohn Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is Everywhere
 
James McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous MachinesJames McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous Machines
 
Gregory Ericson - Machine Intelligence
Gregory Ericson - Machine IntelligenceGregory Ericson - Machine Intelligence
Gregory Ericson - Machine Intelligence
 
Goran Sandahl - Machine Learning. Literally.
Goran Sandahl - Machine Learning. Literally.Goran Sandahl - Machine Learning. Literally.
Goran Sandahl - Machine Learning. Literally.
 
Steve Mills - Your Cognitive Future
Steve Mills - Your Cognitive FutureSteve Mills - Your Cognitive Future
Steve Mills - Your Cognitive Future
 
Data Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentationData Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentation
 
The Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threatThe Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threat
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
Digitecture pop150316
Digitecture pop150316Digitecture pop150316
Digitecture pop150316
 
SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things
 

Cyber security the cybersecurity kill chan - myth or threat

Editor's Notes

  1. Hackers inside… hackers outside… what should we do… Teaching Cybersecurity is also a fundamental issue… Did it work  Results in 2016...
  2. Geekland, Challenges, Whitehats V.S. Blackhats. Security world was quite “simple”…challenging the traditional IT world with STANDARD tools and CONVENTIONAL weapons.
  3. No more challenges  Business first! Hackers moved from the Whitehats V.S. Blackhats fights to a “next-generation” cybermob style. Money is driving but we are currently seeing a drastic change into the threat landscape: Ransomeware and Cryptolockers Zero-Day black-market Contract-based attacks State-sponsored attacks IoT Security Etc. From a pure evolution perspective, Security is just going through its own digital transformation You have to classify your incidents… You have to align with risks
  4. And so many others… waiting for so many more…
  5. Real threats = targeted attacks and state-sponsored attack. Cloud for sure! Already happened. Car hacking is already there. Nuclear plant??? Challenges are Silent attacks… APTs…
  6. Path is easy to describe but the roads to take are a mess. Attacks are complex…leave to complexity to hackers… Focus on pragmatism and simplification. Keep it simple Keep IT simple Keep IT simple and stupid Keep IT simple and secure