SlideShare a Scribd company logo
1 of 24
ALEXANDER A. BERTA
THREAT INTELLIGENCE LEAD
931.206.6387 | ALEX.BERTA@GRIDSMART.COM
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Who Is Alex Berta
Threat Intelligence Lead
• Started working in information security at the young age of 15 years old.
• Has been figured in publications including:
- Private Security Today by Dr. Carter Smith
- Art of Intrusion by Kevin Mitnick
- 2600 Hackers Quarterly
• Awards and Honors
- Innovator of the Year (2016)
- Software Developer of the Year (2014)
- Educator of the Year (2013)
HARDWARE/SOFTWAR
E: ROUTERS &
FIREWALLS
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Routers & Features
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Routers and Features
1. WPA2 Encryption
Do you leave your doors and windows open and unlocked at night? If you aren’t using
WPA2 encryption (or a more current standard) on your wireless router or access point,
then you might as well not even have a door because you’re letting hackers and everyone
else into your wireless network.
2. Built-in Firewall
Your router may feature a built-in firewall that you might not even know it had. This can be
a great tool for allowing or denying traffic originating from the Internet, preventing it from
reaching your computer. You can also use it to control what traffic leaves your network as
well.
3. Guest Network
Do you have visitors that need access to the Internet but you’re not to keen on giving
them your wireless password because you don’t want them having access to everything on
your network.
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Wifi and Network Connectivity
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Bluetooth Attacks
• BlueSnarfing
A BlueSnarfing attack can access information, such as email, contact
lists, calendars, and text messages.
• Bluebugging
Bluebugging attacks allow an attacker to take over a mobile phone.
Attackers can listen in on phone conversations, enable call forwarding,
send messages, and more.
• Blue Jacking
This is the practice of sending unsolicited messages to nearby Bluetooth
devices.
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Encryption
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
PC vs MAC
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
What is a Virtual Private Network?
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Anti-Virus
BUT!!!
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Ransomware and malware the importance of Employee training
PHONES AND OTHER
DEVICES
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Employee (BYOD) vs Company Owned
• COPE ”Corporate Owned, Personally Enabled”
• COBO “Company Owned, Business Only”
• CYOD ”Choose Your Own Device”
• BYOD “Bring Your Own Device”
• Employee Owned
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
How To Check & Change Privacy Settings
• Stick To Apps On The Official App Markets
• Limit What Apps Can Access
Android > Settings > Apps > Permissions iPhone > Settings > General > Restrictions
• App Security
• Secure Lock Screen
• Setup Find my Phone and Remote Wipe
• Public Networks Are Public
• Device Encryption
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Android Ransomware & Malware
INTERNET SERVICES
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Cookies and PUPs
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Password Policies and Management
Policies
• Enforce Password History Policy
Do Not Reuse Old Passwords
• Maximum Password Age Policy
Change Password Every 90 To 180 Days
• Password Must Meet Complexity Requirements Policy
At Least 8-16 Characters Long, Special Characters (!@#$%) and Numbers (1234)
Password Managers
1Password Dashlane LastPass Premium Keeper
HTTPS://GOO.GL/YMPCCT
LEGAL AND BUSINESS
ISSUES
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Cyber Risk Insurance – Should you buy it?
• What is Cyber Risk Insurance?
This insurance helps organizations mitigate risk exposure by offsetting
costs involved with recovery after a cyber-related security breach or
similar event.
• What is Cyber Risk?
”Cyber Risk” means any risk of financial loss, disruption or damage to
reputation of an organization from some sort of failure of its information
technology systems.
DEALING WITH IT
SECURITY SHORTAGE
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
Dealing with IT security skills shortage
• Move forward with technologies
• Reinvent Training Tactics
• Invest in your tech team
• Invest in your people
• Be more flexible
• Hire for values; Train for skills
• Look at your culture
• Create realistic jobs
01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100
ALEXANDER A. BERTA
THREAT INTELLIGENCE LEAD
931.206.6387 ALEX.BERTA@GRIDSMART.COM
LINKEDIN: ALEXANDER BERTA

More Related Content

More from Archersan

NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019
NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019
NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019Archersan
 
NCET Tech Wed | KNPB | Jan 2019
NCET Tech Wed | KNPB | Jan 2019NCET Tech Wed | KNPB | Jan 2019
NCET Tech Wed | KNPB | Jan 2019Archersan
 
NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018
NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018
NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018Archersan
 
NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018
NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018
NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018Archersan
 
NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...
NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...
NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...Archersan
 
NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018
NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018
NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018Archersan
 
NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20
NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20
NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20Archersan
 
NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018Archersan
 
NCET Tech Wed | Noble Studios | Jan 2018
NCET Tech Wed | Noble Studios | Jan 2018NCET Tech Wed | Noble Studios | Jan 2018
NCET Tech Wed | Noble Studios | Jan 2018Archersan
 
NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...
NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...
NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...Archersan
 
NCET Biz Cafe | Amber Barnes / Lindsay Bradley, Business with a Soul | Nov 2017
NCET Biz Cafe | Amber Barnes / Lindsay Bradley,  Business with a Soul | Nov 2017NCET Biz Cafe | Amber Barnes / Lindsay Bradley,  Business with a Soul | Nov 2017
NCET Biz Cafe | Amber Barnes / Lindsay Bradley, Business with a Soul | Nov 2017Archersan
 
NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...
NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...
NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...Archersan
 
NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017
NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017 NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017
NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017 Archersan
 
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017Archersan
 
NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017
NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017
NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017Archersan
 
NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017
NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017
NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017Archersan
 
NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017
NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017
NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017Archersan
 
NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017
NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017
NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017Archersan
 
NCET Tech Wed | Catalytic Pure Air | May 2017
NCET Tech Wed | Catalytic Pure Air | May 2017NCET Tech Wed | Catalytic Pure Air | May 2017
NCET Tech Wed | Catalytic Pure Air | May 2017Archersan
 
NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017
NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017
NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017Archersan
 

More from Archersan (20)

NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019
NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019
NCET Biz Cafe | Mike Bosma, Is My Entity Still the Right Vehicle? | Jan 2019
 
NCET Tech Wed | KNPB | Jan 2019
NCET Tech Wed | KNPB | Jan 2019NCET Tech Wed | KNPB | Jan 2019
NCET Tech Wed | KNPB | Jan 2019
 
NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018
NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018
NCET Biz Cafe | Kit Prendergast, Multigenerational Workforce | Oct 2018
 
NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018
NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018
NCET Biz Cafe | Danny Heinsohm: Sponsorship, Best Kept Secret | Aug 2018
 
NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...
NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...
NCET Biz Cafe | Lauren Slemenda, How a diverse workforce improves your bottom...
 
NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018
NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018
NCET Biz Cafe | Peter Fishburn, Tools of the Trade(show) | July 2018
 
NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20
NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20
NCET Biz Cafe | How IoT is Transforming Business and our Daily Lives | June 20
 
NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018NCET Biz Bite | Project Management Tips and Tools | January 2018
NCET Biz Bite | Project Management Tips and Tools | January 2018
 
NCET Tech Wed | Noble Studios | Jan 2018
NCET Tech Wed | Noble Studios | Jan 2018NCET Tech Wed | Noble Studios | Jan 2018
NCET Tech Wed | Noble Studios | Jan 2018
 
NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...
NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...
NCET Biz Bite | Steven Ing, How Can a Relationship Therapist Improve Your Car...
 
NCET Biz Cafe | Amber Barnes / Lindsay Bradley, Business with a Soul | Nov 2017
NCET Biz Cafe | Amber Barnes / Lindsay Bradley,  Business with a Soul | Nov 2017NCET Biz Cafe | Amber Barnes / Lindsay Bradley,  Business with a Soul | Nov 2017
NCET Biz Cafe | Amber Barnes / Lindsay Bradley, Business with a Soul | Nov 2017
 
NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...
NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...
NCET Biz Bite – Personal Branding 101: Building a Brand for Digital Influence...
 
NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017
NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017 NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017
NCET Biz Cafe | Sally Young, What is your workplace super power | Oct 2017
 
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017
 
NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017
NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017
NCET Biz Cafe | Valerie Clark, Conundrum of US Healthcare | Sept 2017
 
NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017
NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017
NCET Tech Cafe | Dora Lane, What's Hot in Employment Law | Aug 2017
 
NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017
NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017
NCET Tech Bite | Amber Barnes, Winning with Employees | July 2017
 
NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017
NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017
NCET Tech Bite | Chad Hallert, Make Website Achieve Business Goals | May 2017
 
NCET Tech Wed | Catalytic Pure Air | May 2017
NCET Tech Wed | Catalytic Pure Air | May 2017NCET Tech Wed | Catalytic Pure Air | May 2017
NCET Tech Wed | Catalytic Pure Air | May 2017
 
NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017
NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017
NCET Tech Bite | Alice Heiman, Driving sales growth | Mar 2017
 

Recently uploaded

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

NCET Internet Privacy 2.0 | Alex Berta | Sept 2018

  • 1. ALEXANDER A. BERTA THREAT INTELLIGENCE LEAD 931.206.6387 | ALEX.BERTA@GRIDSMART.COM
  • 2. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Who Is Alex Berta Threat Intelligence Lead • Started working in information security at the young age of 15 years old. • Has been figured in publications including: - Private Security Today by Dr. Carter Smith - Art of Intrusion by Kevin Mitnick - 2600 Hackers Quarterly • Awards and Honors - Innovator of the Year (2016) - Software Developer of the Year (2014) - Educator of the Year (2013)
  • 4. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Routers & Features
  • 5. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Routers and Features 1. WPA2 Encryption Do you leave your doors and windows open and unlocked at night? If you aren’t using WPA2 encryption (or a more current standard) on your wireless router or access point, then you might as well not even have a door because you’re letting hackers and everyone else into your wireless network. 2. Built-in Firewall Your router may feature a built-in firewall that you might not even know it had. This can be a great tool for allowing or denying traffic originating from the Internet, preventing it from reaching your computer. You can also use it to control what traffic leaves your network as well. 3. Guest Network Do you have visitors that need access to the Internet but you’re not to keen on giving them your wireless password because you don’t want them having access to everything on your network.
  • 6. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Wifi and Network Connectivity
  • 7. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Bluetooth Attacks • BlueSnarfing A BlueSnarfing attack can access information, such as email, contact lists, calendars, and text messages. • Bluebugging Bluebugging attacks allow an attacker to take over a mobile phone. Attackers can listen in on phone conversations, enable call forwarding, send messages, and more. • Blue Jacking This is the practice of sending unsolicited messages to nearby Bluetooth devices.
  • 8. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Encryption
  • 9. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 PC vs MAC
  • 10. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 What is a Virtual Private Network?
  • 11. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Anti-Virus BUT!!!
  • 12. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Ransomware and malware the importance of Employee training
  • 14. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Employee (BYOD) vs Company Owned • COPE ”Corporate Owned, Personally Enabled” • COBO “Company Owned, Business Only” • CYOD ”Choose Your Own Device” • BYOD “Bring Your Own Device” • Employee Owned
  • 15. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 How To Check & Change Privacy Settings • Stick To Apps On The Official App Markets • Limit What Apps Can Access Android > Settings > Apps > Permissions iPhone > Settings > General > Restrictions • App Security • Secure Lock Screen • Setup Find my Phone and Remote Wipe • Public Networks Are Public • Device Encryption
  • 16. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Android Ransomware & Malware
  • 18. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Cookies and PUPs
  • 19. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Password Policies and Management Policies • Enforce Password History Policy Do Not Reuse Old Passwords • Maximum Password Age Policy Change Password Every 90 To 180 Days • Password Must Meet Complexity Requirements Policy At Least 8-16 Characters Long, Special Characters (!@#$%) and Numbers (1234) Password Managers 1Password Dashlane LastPass Premium Keeper HTTPS://GOO.GL/YMPCCT
  • 21. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Cyber Risk Insurance – Should you buy it? • What is Cyber Risk Insurance? This insurance helps organizations mitigate risk exposure by offsetting costs involved with recovery after a cyber-related security breach or similar event. • What is Cyber Risk? ”Cyber Risk” means any risk of financial loss, disruption or damage to reputation of an organization from some sort of failure of its information technology systems.
  • 23. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 Dealing with IT security skills shortage • Move forward with technologies • Reinvent Training Tactics • Invest in your tech team • Invest in your people • Be more flexible • Hire for values; Train for skills • Look at your culture • Create realistic jobs
  • 24. 01010001 01110101 01100101 01110011 01110100 01101001 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01001001 01101110 01110011 01101001 01100100 01100101 01110010 00100000 01010100 01101000 01110010 01100101 01100001 01110100 ALEXANDER A. BERTA THREAT INTELLIGENCE LEAD 931.206.6387 ALEX.BERTA@GRIDSMART.COM LINKEDIN: ALEXANDER BERTA

Editor's Notes

  1. We see it time after time where organizations are using the wrong gear in their offices. We see a lot of home devices in the work place. They may be cheaper to use but they do not receive the updates and support business class devices receive.
  2. WPA2 Encryption is a must. Most wireless can be cracked over time, but make them work harder with WPA2. Built-in firewalls are great this is a good layer of security that will help keep unwanted guests from accessing the wireless. Guest Networks are a life saver. If you have someone come in with a mobile device or a computer you don’t know where there device has been so you don’t want that on your network.
  3. Encryption is a must. There are reports all the time of employees leaving laptops in their car and in the middle of the night someone breaks a window and steals the laptop. Later that information is found on some darknet site for sale. With Encryption it will help protect your data and clients information.
  4. Q1 of 2017 security professionals discovered around 725k samples of malware for mac and in the same quarter in 2017 over 7.4 million samples were found for windows.
  5. Anti-Virus was a good history lesson. Everyone has it and it doesn’t work as promised. Its kind of like the old man selling snake oil on the back of a truck promising you his oils will solve every problem when it really doesn’t. There are some great programs out there though that are a must. Malwarebytes for Windows, Mac, and mobile devices and Anti-Exploit for servers and workstations.
  6. Ransomware will attack a business every 14 seconds by the end of 2019 Ransomware will cost more than $8 billion in 2018 Ransomware is up 111% from previous years.
  7. Based on your companies standards its hard for me to say what would be best for your company. The COPE is probably the most recognized out of all of them.
  8. Between January and September 2017, there has been32 different threats on Google Play – double the amount from the same period a year before. The Judy malware, for example, infected upwards of 36.5 million users by September. Over 800 Android apps were infected with Xavir malware, while the WireX botnet might have infected 140,000 devices in 100 countries by its peak on Aug. 17 – perhaps the biggest DDoS botnet to date by Android standards.
  9. There are some great companies out there that will help you if you have a breach or a problem with a incident.