Connect & Inspire Cyber Security

DefCamp
DefCampDefCamp
1
Connect & Inspire
November 8th, 2018
Bucuresti
Cristian Patachia
Development & Innovation Manager
2
+850 participants, 2015
+1,100 participants, 2016
+1,700 participants, 2018
+1,400 participants, 2017
3
Browsing Communication / Messaging DL/UL/Gaming Mail Other Data Services Streaming
Orange Romania: Video streaming share in total traffic grew
by 14 percentage points in less than 3 years
2015 2018
58%44%
4
Orange Romania
Exponential growth in traffic
5
Orange Romania
Cell traffic evolution in 2017
6
from the time
spent by
smartphones
users is related to
apps
~70%75% ~70% ~90%
from smartphones
users are looking
for music video
and funny clips
from
smartphones
users are
Instagram users
from
smartphones
users are
Facebook users
7
The Internet of Things is going to change the world.
For everyone.
8
“Smart Territories” dashboards
IoT midleware [Live Objects]
storage security compute visualization
flexible connectivity options 2G/3G/4G,
Wi-Fi, Bluetooth, LoRaWAN, LTE-M
actuator sensor actuator sensor
public data
sets
sensor
Open platform and IoT connectivity
To support you in each step of your data journey
9
LoRa Sigfox
NB-IoT
(+range)
2G, 3G,
4G
LTE-M
(+latency)
Licensed networks Unlicensed
High battery
performance,
very low
throughput
Medium battery
performance,
medium
throughput
Complex deployment
(require hardware
installation)
Easy deployment (software
upgrade in most of the cases)
Low Power technologies use cases
10
LTE-M
National availability of LTE-M as the most
appropriate technology for the widest range of
current and future cases
3137localities
11
Hacking
at the
ECSC
day 1, 17:00 - 17:30, track#1
‘unsecured’
Wi-Fi
Using ML to
detect
complex
threats
day 1, 11:30 - 12:15, track#1
RESISTO
masterclass
for critical
infra
day 2, 11:00 - 13:30, Praga
Threat
Map
Orange
Fab for
startups
Who is
Hiring?
Orange stand
Threat Map
Real time threat analytics
from data gathered from
Orange Business Internet
Security Agents deployed
across Romania
https://bis-threatmap.orange.ro
Are you vulnerable?
Find out if your website is vulnerable to
cyber threats by using Threat Map’s
advanced security scanning engines:
 Web Security Scanner
 CMS Specific Scanner (for Drupal,
Joomla, WordPress)
 APT Watering Hole Malware
Detection Engine
 RO Hacked Database
Detailed Reports on found vulnerabilities,
malware and remediation techniques
https://bis-threatmap.orange.ro
Scan Results
100 Websites
We gathered info from
the non-intrusive
scanning of 100 of the
most visited Romanian
websites.
Previously Hacked:
One of the 100 websites we
scanned was reported as
previously hacked by
rohacked.ro database
289
Low Vulnerabilities
34
Critical / High Vulnerabilities
Found server-side, across the websites
we scanned such as CVE-2012-2376
80
Medium Vulnerabilities
APT Hunter, Watering
Hole & Cryptojacking
Detection
Advanced Secure Remote Access and
Website Isolation platform
On-line security audit framework
day 2, 11:15 – 12:00, track #2
Cyber Sec Startups – Orange Fab
Appsulate Bug Bounty
3 major goals:
– Break Appsulate Sandbox and compromise it’s security
– Ability to exfiltrate information from given websites outside of
Appsulate
– Ability to bypass authentication and access a shielded
application from an untrusted endpoint
Scoring: https://bugcrowd.com/vulnerability-rating-taxonomy
Details: Appsulate stand, alex@appsulate.com
P1 - $300 - $500
P2 - $150 - $300
P3 - $100
P4 - T-Shirt, Mugs and Pens
Prizes:
Connect & Inspire Cyber Security
today, 17:00 – 17:30, track #1http://www.cybersecuritychallenge.ro
Connect & Inspire Cyber Security
RESISTO MasterClassday 1, 11:00 – 13:30, Praga room
Horizon 2020
Project Large Enterprises
C.I. Operators
Universities
Research &
Technology
Organizations
Consortium of 19
partners
 Holistic Approach to Situation
Awareness
 Innovative Risk & Resilience &
Improvement Process Mng
 Decision Support System
 Protection against cyber-
physical threats
 Modeled on state-of-the art
technologies (Machine Learning,
IoT, Block chain, Airborne Threat
Detection, Holistic A-V analytics)
The RESISTO project has received funding from
the European Union’s Horizon 2020 Research
and Innovation Programme under Grant
Agreement No786409.
RESIlience enhancement and risk control
platform for communication infraSTructure
Operators
http://www.resistoproject.eu/
An insightful presentation on using Machine Learning, Log
Analysis and Correlation to complement our ‘traditional’
security technologies in order to detect and mitigate
complex threats
today, 11:30 – 12:15, track #1
Business Internet Security
Report H1-2018
threats, trends
by type, industry vertical
ORO managed security service
H1 of 2018, national level
IoT impact
key takeaways
what’s coming next
24
We are here to fuel
your business innovation.
Thank you.
1 of 24

Recommended

Reduce Friction and Risk with Device Authentication by
Reduce Friction and Risk with Device AuthenticationReduce Friction and Risk with Device Authentication
Reduce Friction and Risk with Device AuthenticationTransUnion
925 views31 slides
Smartphone Smart Card 061013 by
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013McAlester Army Ammunition Plant
217 views2 slides
IQT 2010 - The App Does That!? by
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?Tyler Shields
416 views46 slides
Presentation on Internet by
Presentation on InternetPresentation on Internet
Presentation on InternetMonjurBinShams
37 views8 slides
How to Take Cloud Access Control to the Next Level by
How to Take Cloud Access Control to the Next LevelHow to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next LevelOneLogin
533 views19 slides
REVE Antivirus Total Security by
REVE Antivirus Total SecurityREVE Antivirus Total Security
REVE Antivirus Total SecurityAbhijeet Guha
69 views2 slides

More Related Content

Similar to Connect & Inspire Cyber Security

DEVNET-1180 Security from the Cloud by
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the CloudCisco DevNet
1.3K views28 slides
Mobile Banking Security: Challenges, Solutions by
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsCognizant
3.6K views5 slides
The Dangers of Lapto by
The Dangers of LaptoThe Dangers of Lapto
The Dangers of LaptoInfosec Europe
317 views65 slides
Crypto Vision Bot Using RSA Algorithm by
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
3 views6 slides
Palo Alto Networks Soc Ent Okt2009 by
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
772 views26 slides
Telecom Network & SIEM logs analysis using machine learning by
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningALTANAI BISHT
154 views34 slides

Similar to Connect & Inspire Cyber Security(20)

DEVNET-1180 Security from the Cloud by Cisco DevNet
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
Cisco DevNet1.3K views
Mobile Banking Security: Challenges, Solutions by Cognizant
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
Cognizant3.6K views
Crypto Vision Bot Using RSA Algorithm by IRJET Journal
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal3 views
Palo Alto Networks Soc Ent Okt2009 by Zernike College
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College772 views
Telecom Network & SIEM logs analysis using machine learning by ALTANAI BISHT
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learning
ALTANAI BISHT154 views
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo... by IRJET Journal
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal9 views
Azure WP7 fire starter by Sam Basu
Azure WP7 fire starterAzure WP7 fire starter
Azure WP7 fire starter
Sam Basu724 views
LSI Spring Agent Open House 2014 by Ashlie Steele
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
Ashlie Steele276 views
A Brief Note On Peer Communication And The Client Server... by Miles Priar
A Brief Note On Peer Communication And The Client Server...A Brief Note On Peer Communication And The Client Server...
A Brief Note On Peer Communication And The Client Server...
Miles Priar2 views
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений by SECON
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложенийSECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
SECON593 views
Web analytics is becoming universal by Audun Rundberg
Web analytics is becoming universalWeb analytics is becoming universal
Web analytics is becoming universal
Audun Rundberg2.8K views
SplunkLive! São Paulo 2014 - Overview by markus zirn by Splunk
SplunkLive! São Paulo 2014 -  Overview by markus zirnSplunkLive! São Paulo 2014 -  Overview by markus zirn
SplunkLive! São Paulo 2014 - Overview by markus zirn
Splunk821 views
Vivek Chan | Technology Consultant by Vivek chan
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
Vivek chan207 views

More from DefCamp

Remote Yacht Hacking by
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
1.7K views89 slides
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
974 views167 slides
The Charter of Trust by
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
558 views24 slides
Internet Balkanization: Why Are We Raising Borders Online? by
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
309 views22 slides
Bridging the gap between CyberSecurity R&D and UX by
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
260 views13 slides
Secure and privacy-preserving data transmission and processing using homomorp... by
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
470 views102 slides

More from DefCamp(20)

Remote Yacht Hacking by DefCamp
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
DefCamp1.7K views
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp974 views
The Charter of Trust by DefCamp
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp558 views
Internet Balkanization: Why Are We Raising Borders Online? by DefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp309 views
Bridging the gap between CyberSecurity R&D and UX by DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp260 views
Secure and privacy-preserving data transmission and processing using homomorp... by DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp470 views
Drupalgeddon 2 – Yet Another Weapon for the Attacker by DefCamp
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp269 views
Economical Denial of Sustainability in the Cloud (EDOS) by DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp254 views
Trust, but verify – Bypassing MFA by DefCamp
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp323 views
Threat Hunting: From Platitudes to Practical Application by DefCamp
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp218 views
Building application security with 0 money down by DefCamp
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
DefCamp179 views
Implementation of information security techniques on modern android based Kio... by DefCamp
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp215 views
Lattice based Merkle for post-quantum epoch by DefCamp
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp241 views
The challenge of building a secure and safe digital environment in healthcare by DefCamp
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp323 views
Timing attacks against web applications: Are they still practical? by DefCamp
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp258 views
Tor .onions: The Good, The Rotten and The Misconfigured by DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp816 views
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t... by DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp294 views
We will charge you. How to [b]reach vendor’s network using EV charging station. by DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp443 views
The lions and the watering hole by DefCamp
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
DefCamp225 views
Catch Me If You Can - Finding APTs in your network by DefCamp
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your network
DefCamp304 views

Recently uploaded

STPI OctaNE CoE Brochure.pdf by
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
14 views1 slide
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
27 views49 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
317 views86 slides
HTTP headers that make your website go faster - devs.gent November 2023 by
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
26 views151 slides
Business Analyst Series 2023 - Week 3 Session 5 by
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
345 views20 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
23 views15 slides

Recently uploaded(20)

STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn26 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab23 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman38 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays17 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana17 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 views
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi139 views
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe by Simone Puorto
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
Simone Puorto13 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely29 views

Connect & Inspire Cyber Security

  • 1. 1 Connect & Inspire November 8th, 2018 Bucuresti Cristian Patachia Development & Innovation Manager
  • 2. 2 +850 participants, 2015 +1,100 participants, 2016 +1,700 participants, 2018 +1,400 participants, 2017
  • 3. 3 Browsing Communication / Messaging DL/UL/Gaming Mail Other Data Services Streaming Orange Romania: Video streaming share in total traffic grew by 14 percentage points in less than 3 years 2015 2018 58%44%
  • 5. 5 Orange Romania Cell traffic evolution in 2017
  • 6. 6 from the time spent by smartphones users is related to apps ~70%75% ~70% ~90% from smartphones users are looking for music video and funny clips from smartphones users are Instagram users from smartphones users are Facebook users
  • 7. 7 The Internet of Things is going to change the world. For everyone.
  • 8. 8 “Smart Territories” dashboards IoT midleware [Live Objects] storage security compute visualization flexible connectivity options 2G/3G/4G, Wi-Fi, Bluetooth, LoRaWAN, LTE-M actuator sensor actuator sensor public data sets sensor Open platform and IoT connectivity To support you in each step of your data journey
  • 9. 9 LoRa Sigfox NB-IoT (+range) 2G, 3G, 4G LTE-M (+latency) Licensed networks Unlicensed High battery performance, very low throughput Medium battery performance, medium throughput Complex deployment (require hardware installation) Easy deployment (software upgrade in most of the cases) Low Power technologies use cases
  • 10. 10 LTE-M National availability of LTE-M as the most appropriate technology for the widest range of current and future cases 3137localities
  • 11. 11 Hacking at the ECSC day 1, 17:00 - 17:30, track#1 ‘unsecured’ Wi-Fi Using ML to detect complex threats day 1, 11:30 - 12:15, track#1 RESISTO masterclass for critical infra day 2, 11:00 - 13:30, Praga Threat Map Orange Fab for startups Who is Hiring? Orange stand
  • 12. Threat Map Real time threat analytics from data gathered from Orange Business Internet Security Agents deployed across Romania https://bis-threatmap.orange.ro
  • 13. Are you vulnerable? Find out if your website is vulnerable to cyber threats by using Threat Map’s advanced security scanning engines:  Web Security Scanner  CMS Specific Scanner (for Drupal, Joomla, WordPress)  APT Watering Hole Malware Detection Engine  RO Hacked Database Detailed Reports on found vulnerabilities, malware and remediation techniques https://bis-threatmap.orange.ro
  • 14. Scan Results 100 Websites We gathered info from the non-intrusive scanning of 100 of the most visited Romanian websites. Previously Hacked: One of the 100 websites we scanned was reported as previously hacked by rohacked.ro database 289 Low Vulnerabilities 34 Critical / High Vulnerabilities Found server-side, across the websites we scanned such as CVE-2012-2376 80 Medium Vulnerabilities
  • 15. APT Hunter, Watering Hole & Cryptojacking Detection Advanced Secure Remote Access and Website Isolation platform On-line security audit framework
  • 16. day 2, 11:15 – 12:00, track #2 Cyber Sec Startups – Orange Fab
  • 17. Appsulate Bug Bounty 3 major goals: – Break Appsulate Sandbox and compromise it’s security – Ability to exfiltrate information from given websites outside of Appsulate – Ability to bypass authentication and access a shielded application from an untrusted endpoint Scoring: https://bugcrowd.com/vulnerability-rating-taxonomy Details: Appsulate stand, alex@appsulate.com P1 - $300 - $500 P2 - $150 - $300 P3 - $100 P4 - T-Shirt, Mugs and Pens Prizes:
  • 19. today, 17:00 – 17:30, track #1http://www.cybersecuritychallenge.ro
  • 21. RESISTO MasterClassday 1, 11:00 – 13:30, Praga room Horizon 2020 Project Large Enterprises C.I. Operators Universities Research & Technology Organizations Consortium of 19 partners  Holistic Approach to Situation Awareness  Innovative Risk & Resilience & Improvement Process Mng  Decision Support System  Protection against cyber- physical threats  Modeled on state-of-the art technologies (Machine Learning, IoT, Block chain, Airborne Threat Detection, Holistic A-V analytics) The RESISTO project has received funding from the European Union’s Horizon 2020 Research and Innovation Programme under Grant Agreement No786409. RESIlience enhancement and risk control platform for communication infraSTructure Operators http://www.resistoproject.eu/
  • 22. An insightful presentation on using Machine Learning, Log Analysis and Correlation to complement our ‘traditional’ security technologies in order to detect and mitigate complex threats today, 11:30 – 12:15, track #1
  • 23. Business Internet Security Report H1-2018 threats, trends by type, industry vertical ORO managed security service H1 of 2018, national level IoT impact key takeaways what’s coming next
  • 24. 24 We are here to fuel your business innovation. Thank you.

Editor's Notes

  1. The conference focus is to connect & inspire. To create a highly interconnected community that supports the individual members driven by the passion of IT security and ensures the research development success in Europe. DefCamp built in time a global community, welcoming people from every culture who seek a deeper understanding of the information security mysteries and who seek other people with similar skillset.
  2. + 5050
  3. From one year to another we see exponential growth in our data traffic. For example, at European level it is expected to account for 80% of traffic by 2021. At Orange Romania only, video streaming share in total traffic grew by 14 percentage points in less than 3 years. This behavior will be prevalent not only on the move, but at home as well. In the years to come, the traffic will continue to rely on a strong, heavily densified 4G network. Traffic 3,84 milioane de clienţi 4G, +34% Q3 2018 vs Q3 2017. 80% consum de date mobile Q3 2018 vs Q3 2017. Acoperire 95.9% din populaţia ţării la final de septembrie 2018 În luna septembrie, reţeaua Orange a fost reconfirmată drept cea mai bună reţea de voce şi date din România conform studiului comparativ realizat la nivel naţional în perioada iunie-iulie 2018, de către Systemics PAB. Totodată, Orange a primit recunoașterea de „Cea mai rapidă reţea mobilă din România” prin rezultatele Speedtest by Ookla, ca urmare a testelor realizate chiar de către utilizatorii de reţele mobile din România.
  4. While 5G is the future, 4G is now the strong backbone in a world that gets increasingly connected. Ericsson Mobility report – traffic will increase 9 times by 2022. By 2025, a third of this increased traffic will be over 5G. In our network, demand for traffic is skyrocketing – in just 3 years it has grown 10 times, which shows, on one hand, the growing usage of devices per user and the data hungry content that is accessed. In 2018 we see the same trend - with traffic almost doubling YoY Moreover, thanks to a network upgrade back in March, Romanian customers can reach speeds up to 500MBps in 161 cities over the 4G+ network. (end of Q3 2018)
  5. Folosind noua modulație pentru tehnologia 4G+, crește eficiența celulei și vom putea deservi mai multe dispozitive compatibile. Studiile arată o creștere a capacității celulei cu ~30-40%. În condițiile în care numărul de utilizatori 4G crește spectaculos de la an la an, la fel ca și traficul de date mobile, este clar de ce este necesară o astfel de evoluție. Ca sa facem un zoom in pe ce vedem noi in retea, va putem da ex unui site unde, pe parcursulul anului 2017, traficul s-a dublat. Aceasta crestere de trafic se reflecta si la nivelul retelei. Ne dorim să aducem reţeaua mai aproape de oameni. De aceea vom continua să investim prioritar în extinderea rețelei pentru a facilita accesul cât mai multor clienți la beneficiile tehnologiei 4G. We notice here the 4G users evolution since 2016. It grows by more than a million yearly. These increases have been supported by the increased availability of compatible devices and by the expansion and densification of our network.
  6. In 2010, 75% of time spent using smartphones involved using voice call and SMS features. Today, 75% of time spent using smartphones involves apps. (Orange Group data) According to Orange Romania studies: 7 out of 10 ORO smartphone users look for music video and funny clips. These are the most watched video content types. 9 out of 10 ORO smartphone users use Facebook and 7 out of 10 use Instagram. ORO smartphone users spend on average 166 minutes on Facebook and 103 on YouTube, daily Strategic steering of innovation internal Orange (03. Mastering digital life) Pictures, video and audio files are the most shared materials. Orange smartphone users usually search information about the weather, products and services, discounts and promotions. (Orange Ro data, according to study on customer base)
  7. IoT must be inclusive, smart and trusted. - It offers new opportunities to make progress - An inclusive, smart and trusted technology ORO is building an open ecosystem for the IoT - Partnerships - Starting the conversation Ecosystem’s stakeholders: - device manufacturers - service providers - Integrators - industrial corporates - standards organizations
  8. We bring together the necessary expertise to support you in each step of your data journey.
  9. Threatmap is a platform that offers real-time attack information, statistics and insights on latest threats. We anonimize and publicize data we gather from our sensors in our Business Internet Security MSSP. This data stems from the datasets we feed our ML machines with. Threatmap has one particular feature both users and us find very appealing: it uses 4 scanning engines to evaluate the security of yours (or any) websites out there. Most users will use this feature to check their own websites or the websites they usually visit. We’re constantly monitoring websites flagged as suspicious for APT delivery, watering hole attacks, phishing schemes etc. Threatmap uses 4 advanced scanning engines: -a OWASP –Top 10 web vulnerability scanner that will audit the webserver and services used to host the scanned websites; -a CMS-specific vulnerability scanner that searches for weaknesses found in platforms like Wordpress, Joomla etc.; -a APT-Watering Hole Malware scanner called Dekeneas that uses advanced Machine Learning to evaluate scripts running on target websites and runs them in fast spin-up sandboxes and evaluates their output; -a database of previously reported hacks.
  10. CVE-2012-2376 Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild in May 2012.
  11. The first edition of this report highlights the threats, trends and the key takeaways collected at statistical level from our managed security service "Business Internet Security (BIS)", in the first half of 2018, on a national level. It also provides context on the evolving nature of cyber security, offering valuable insights on what’s coming next.
  12. The first edition of this report highlights the threats, trends and the key takeaways collected at statistical level from our managed security service "Business Internet Security (BIS)", in the first half of 2018, on a national level. It also provides context on the evolving nature of cyber security, offering valuable insights on what’s coming next.
  13. The first edition of this report highlights the threats, trends and the key takeaways collected at statistical level from our managed security service "Business Internet Security (BIS)", in the first half of 2018, on a national level. It also provides context on the evolving nature of cyber security, offering valuable insights on what’s coming next.
  14. The first edition of this report highlights the threats, trends and the key takeaways collected at statistical level from our managed security service "Business Internet Security (BIS)", in the first half of 2018, on a national level. It also provides context on the evolving nature of cyber security, offering valuable insights on what’s coming next.
  15. The first edition of this report highlights the threats, trends and the key takeaways collected at statistical level from our managed security service "Business Internet Security (BIS)", in the first half of 2018, on a national level. It also provides context on the evolving nature of cyber security, offering valuable insights on what’s coming next.
  16. The first edition of this report highlights the threats, trends and the key takeaways collected at statistical level from our managed security service "Business Internet Security (BIS)", in the first half of 2018, on a national level. It also provides context on the evolving nature of cyber security, offering valuable insights on what’s coming next.
  17. The first edition of this report highlights the threats, trends and the key takeaways collected at statistical level from our managed security service "Business Internet Security (BIS)", in the first half of 2018, on a national level. It also provides context on the evolving nature of cyber security, offering valuable insights on what’s coming next.