The document discusses various topics related to cybersecurity including thinking like a hacker, cyberattacks, digital persona, privacy, anonymity, and encryption. It emphasizes the importance of being prepared by having an incident response plan and backup in case of a security breach or losing access to personal information and systems. The goal is to understand vulnerabilities and risks from multiple perspectives in order to better protect information and systems from cyber threats.
4. Cybersecurity Agenda
• Cybersecurity
• Information Value & Risks
• Thinking Like a Hacker
• Cyberattacks
• Digital Persona
• Privacy
• Anonymity
• Encryption
• Have a Plan (BCP)
fmauricio.com linkedin.com/in/facundomauricio
6. Cybersecurity
• Vulnerabilities and attacks
• Information security culture
• Systems at risk
• Impact of security breaches
• Attacker motivation
• System protection
• Incident response planning
• Role of governments, organizations, etc.
• Warfare / National conflicts
fmauricio.com facundomauriciofacu.nah
7. Information Value & Risks
• Who you are
• What you do
• Your Story
• Interests, purchases, searches
• Photos, videos, contacts
• Locations, travels
• Psychological profile (Cambridge Analytica)
• Work, hobbies, sports
fmauricio.com facundomauriciofacu.nah
11. Digital Persona
• Who you are (Online)
• Digital Self
• Unification of tracking
• Facebook hidden profiles
• Unification hints (WiFi, location, habits)
• Integration algorithms
fmauricio.com facundomauriciofacu.nah
12. Cyberattacks
• Malware
• Phishing
• Denial of Service (DoS & DDoS)
• Man in the Middle
• Cryptojacking
• Ransomware
• $1,5 trillion dollars in 2018 (10-15% more than offline)
• Unique cyberincidents: 47% higher than 2017
• 54% are targeted, rather than part of mass campaigns.
fmauricio.com facundomauriciofacu.nah
Employee selling
data to competitors
Competitor
generating false
news about your
company
Hacker gathering
credit card data
from your servers
Hacktivist changing
your home page as
a protest
InsiderOutsider
Profit Cost
Cybersecurity Attack
14. Privacy
A state in which one is not observed or disturbed by other people.
The state of being free from public attention.
-Oxford Dictionary
1. Right to be let alone
2. Option to limit the access others on personal information
3. Secrecy, or the option to conceal any information from others
4. Control over others' use of information about oneself
5. Personhood and autonomy
6. Self-identity and personal growth
7. Protection of intimate relationships
fmauricio.com facundomauriciofacu.nah
15. Anonymity
• Why?
• Are you hiding something?
• Deletion vs untraceable
• Private Browsing ?
• TOR
• DuckDuckGo
• Cryptocurrencies (Bitcoin)
fmauricio.com facundomauriciofacu.nah
16. Encryption
• What it means?
• How does it works?
• Enigma
• Digital Signature
• Current Uses
• Passwords & Hashes
• Why is important
• Quantum cryptography
fmauricio.com facundomauriciofacu.nah
17. Two-Factor Authentication (2FA)
• Something you know
• Something you have
• Something you are
• Use it!
fmauricio.com facundomauriciofacu.nah
18. Have a Plan (BCP)
• Be Prepared
• What happen if?
• Losing access
• Have a backup
• Know what to do
fmauricio.com facundomauriciofacu.nah
22. Big Data
The 5 Vs of Big Data:
• Volume
• Velocity
• Variety
• Veracity
• Value
Big data represents the information assets characterized by such a high volume, velocity and variety to
require specific technology and analytical methods for its transformation into value.
fmauricio.com facundomauriciofacu.nah
23. Internet of Things (IoT)
Critics:
• Platform fragmentation
• Autonomy and control
• Data storage
• Security and Privacy
• Environmental Impact
• Obsolescence
Involves extending internet connectivity beyond standard devices, such as laptops and smartphones, to any
range of traditionally dumb physical devices and everyday objects.
fmauricio.com facundomauriciofacu.nah
Editor's Notes
Команда DataArt — разнообразные люди, которые строят партнерские отношения друг с другом и с клиентами, доверяют коллегам и могут на них рассчитывать. Мы — эксперты в технологиях и доменных знаниях. Мы готовы к изменениям, ценим свободу, возможность экспериментировать и получать новый опыт и знания. Они помогают нам раскрыть свой потенциал и применить его в экосистеме DataArt.