SlideShare a Scribd company logo
1 of 23
Cybersecurity
Thinking like a hacker
About Me
• Project Manager
• 10+ Years working in Tech
• Scrum Master + Product Owner
• Speaker
• Consultor en Seguridad Informática
• Futuro Magister en Seguridad Informática
• Nerd
Web: fmauricio.com
LinkedIn: linkedin.com/in/facundomauricio
Facundo Mauricio
fmauricio.com facundomauriciofacu.nah
The Big Hack
fmauricio.com facundomauriciofacu.nah
Cybersecurity Agenda
• Cybersecurity
• Information Value & Risks
• Thinking Like a Hacker
• Cyberattacks
• Digital Persona
• Privacy
• Anonymity
• Encryption
• Have a Plan (BCP)
fmauricio.com linkedin.com/in/facundomauricio
The Foundations
Cybersecurity
• Vulnerabilities and attacks
• Information security culture
• Systems at risk
• Impact of security breaches
• Attacker motivation
• System protection
• Incident response planning
• Role of governments, organizations, etc.
• Warfare / National conflicts
fmauricio.com facundomauriciofacu.nah
Information Value & Risks
• Who you are
• What you do
• Your Story
• Interests, purchases, searches
• Photos, videos, contacts
• Locations, travels
• Psychological profile (Cambridge Analytica)
• Work, hobbies, sports
fmauricio.com facundomauriciofacu.nah
The Hacker Approach
Thinking like a Hacker
• Reconnaissance
• Scanning
• Access and Escalation
• Exfiltration
• Sustainment
• Assault
• Obfuscation
fmauricio.com facundomauriciofacu.nah
The Risks
Digital Persona
• Who you are (Online)
• Digital Self
• Unification of tracking
• Facebook hidden profiles
• Unification hints (WiFi, location, habits)
• Integration algorithms
fmauricio.com facundomauriciofacu.nah
Cyberattacks
• Malware
• Phishing
• Denial of Service (DoS & DDoS)
• Man in the Middle
• Cryptojacking
• Ransomware
• $1,5 trillion dollars in 2018 (10-15% more than offline)
• Unique cyberincidents: 47% higher than 2017
• 54% are targeted, rather than part of mass campaigns.
fmauricio.com facundomauriciofacu.nah
Employee selling
data to competitors
Competitor
generating false
news about your
company
Hacker gathering
credit card data
from your servers
Hacktivist changing
your home page as
a protest
InsiderOutsider
Profit Cost
Cybersecurity Attack
Our Options
Privacy
A state in which one is not observed or disturbed by other people.
The state of being free from public attention.
-Oxford Dictionary
1. Right to be let alone
2. Option to limit the access others on personal information
3. Secrecy, or the option to conceal any information from others
4. Control over others' use of information about oneself
5. Personhood and autonomy
6. Self-identity and personal growth
7. Protection of intimate relationships
fmauricio.com facundomauriciofacu.nah
Anonymity
• Why?
• Are you hiding something?
• Deletion vs untraceable
• Private Browsing ?
• TOR
• DuckDuckGo
• Cryptocurrencies (Bitcoin)
fmauricio.com facundomauriciofacu.nah
Encryption
• What it means?
• How does it works?
• Enigma
• Digital Signature
• Current Uses
• Passwords & Hashes
• Why is important
• Quantum cryptography
fmauricio.com facundomauriciofacu.nah
Two-Factor Authentication (2FA)
• Something you know
• Something you have
• Something you are
• Use it!
fmauricio.com facundomauriciofacu.nah
Have a Plan (BCP)
• Be Prepared
• What happen if?
• Losing access
• Have a backup
• Know what to do
fmauricio.com facundomauriciofacu.nah
Questions?
THANKS
ArgentinaDataArt
DataArt_BA
DataArtArgentina
Extras
Big Data
The 5 Vs of Big Data:
• Volume
• Velocity
• Variety
• Veracity
• Value
Big data represents the information assets characterized by such a high volume, velocity and variety to
require specific technology and analytical methods for its transformation into value.
fmauricio.com facundomauriciofacu.nah
Internet of Things (IoT)
Critics:
• Platform fragmentation
• Autonomy and control
• Data storage
• Security and Privacy
• Environmental Impact
• Obsolescence
Involves extending internet connectivity beyond standard devices, such as laptops and smartphones, to any
range of traditionally dumb physical devices and everyday objects.
fmauricio.com facundomauriciofacu.nah

More Related Content

What's hot

Computer Security pro english course
Computer Security pro english courseComputer Security pro english course
Computer Security pro english courseAbdo Shajadi
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leonDarwin de Leon
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
Deep web
Deep webDeep web
Deep webV C
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsEric Vanderburg
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019RedHunt Labs
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017reconvillage
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 

What's hot (20)

Computer Security pro english course
Computer Security pro english courseComputer Security pro english course
Computer Security pro english course
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
The dark web
The dark webThe dark web
The dark web
 
The dark web
The dark webThe dark web
The dark web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Deep web
Deep webDeep web
Deep web
 
Deep and dark web
Deep and dark webDeep and dark web
Deep and dark web
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019OSINT for Proactive Defense - RootConf 2019
OSINT for Proactive Defense - RootConf 2019
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Empowering red and blue teams with osint c0c0n 2017
Empowering red and blue teams with osint   c0c0n 2017Empowering red and blue teams with osint   c0c0n 2017
Empowering red and blue teams with osint c0c0n 2017
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 

Similar to Cybersecurity - Thinking like a hacker

Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01overcertified
 
privacy and security
privacy and securityprivacy and security
privacy and securityronit_jadhav
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next BattlegroundSensePost
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...EC-Council
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityPrasanth P
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for JournalistsGabor Szathmari
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Facundo Mauricio
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipEC-Council
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social MachinesUlrik Lyngs
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and librariesDorothea Salo
 
Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction Vinil Patel
 

Similar to Cybersecurity - Thinking like a hacker (20)

DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01Risk Assessment of Social Media Use v3.01
Risk Assessment of Social Media Use v3.01
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
privacy and security
privacy and securityprivacy and security
privacy and security
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...Phishing: It’s Not Just for Pentesters  Using Phishing to Build a Successful ...
Phishing: It’s Not Just for Pentesters Using Phishing to Build a Successful ...
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Threat Modeling for Journalists
Threat Modeling for JournalistsThreat Modeling for Journalists
Threat Modeling for Journalists
 
Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?Privacy & Big Data - What do they know about me?
Privacy & Big Data - What do they know about me?
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social Machines
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
Cyber crime Introduction
Cyber crime Introduction Cyber crime Introduction
Cyber crime Introduction
 

Recently uploaded

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Cybersecurity - Thinking like a hacker

  • 2. About Me • Project Manager • 10+ Years working in Tech • Scrum Master + Product Owner • Speaker • Consultor en Seguridad Informática • Futuro Magister en Seguridad Informática • Nerd Web: fmauricio.com LinkedIn: linkedin.com/in/facundomauricio Facundo Mauricio fmauricio.com facundomauriciofacu.nah
  • 3. The Big Hack fmauricio.com facundomauriciofacu.nah
  • 4. Cybersecurity Agenda • Cybersecurity • Information Value & Risks • Thinking Like a Hacker • Cyberattacks • Digital Persona • Privacy • Anonymity • Encryption • Have a Plan (BCP) fmauricio.com linkedin.com/in/facundomauricio
  • 6. Cybersecurity • Vulnerabilities and attacks • Information security culture • Systems at risk • Impact of security breaches • Attacker motivation • System protection • Incident response planning • Role of governments, organizations, etc. • Warfare / National conflicts fmauricio.com facundomauriciofacu.nah
  • 7. Information Value & Risks • Who you are • What you do • Your Story • Interests, purchases, searches • Photos, videos, contacts • Locations, travels • Psychological profile (Cambridge Analytica) • Work, hobbies, sports fmauricio.com facundomauriciofacu.nah
  • 9. Thinking like a Hacker • Reconnaissance • Scanning • Access and Escalation • Exfiltration • Sustainment • Assault • Obfuscation fmauricio.com facundomauriciofacu.nah
  • 11. Digital Persona • Who you are (Online) • Digital Self • Unification of tracking • Facebook hidden profiles • Unification hints (WiFi, location, habits) • Integration algorithms fmauricio.com facundomauriciofacu.nah
  • 12. Cyberattacks • Malware • Phishing • Denial of Service (DoS & DDoS) • Man in the Middle • Cryptojacking • Ransomware • $1,5 trillion dollars in 2018 (10-15% more than offline) • Unique cyberincidents: 47% higher than 2017 • 54% are targeted, rather than part of mass campaigns. fmauricio.com facundomauriciofacu.nah Employee selling data to competitors Competitor generating false news about your company Hacker gathering credit card data from your servers Hacktivist changing your home page as a protest InsiderOutsider Profit Cost Cybersecurity Attack
  • 14. Privacy A state in which one is not observed or disturbed by other people. The state of being free from public attention. -Oxford Dictionary 1. Right to be let alone 2. Option to limit the access others on personal information 3. Secrecy, or the option to conceal any information from others 4. Control over others' use of information about oneself 5. Personhood and autonomy 6. Self-identity and personal growth 7. Protection of intimate relationships fmauricio.com facundomauriciofacu.nah
  • 15. Anonymity • Why? • Are you hiding something? • Deletion vs untraceable • Private Browsing ? • TOR • DuckDuckGo • Cryptocurrencies (Bitcoin) fmauricio.com facundomauriciofacu.nah
  • 16. Encryption • What it means? • How does it works? • Enigma • Digital Signature • Current Uses • Passwords & Hashes • Why is important • Quantum cryptography fmauricio.com facundomauriciofacu.nah
  • 17. Two-Factor Authentication (2FA) • Something you know • Something you have • Something you are • Use it! fmauricio.com facundomauriciofacu.nah
  • 18. Have a Plan (BCP) • Be Prepared • What happen if? • Losing access • Have a backup • Know what to do fmauricio.com facundomauriciofacu.nah
  • 22. Big Data The 5 Vs of Big Data: • Volume • Velocity • Variety • Veracity • Value Big data represents the information assets characterized by such a high volume, velocity and variety to require specific technology and analytical methods for its transformation into value. fmauricio.com facundomauriciofacu.nah
  • 23. Internet of Things (IoT) Critics: • Platform fragmentation • Autonomy and control • Data storage • Security and Privacy • Environmental Impact • Obsolescence Involves extending internet connectivity beyond standard devices, such as laptops and smartphones, to any range of traditionally dumb physical devices and everyday objects. fmauricio.com facundomauriciofacu.nah

Editor's Notes

  1. Команда DataArt — разнообразные люди, которые строят партнерские отношения друг с другом и с клиентами, доверяют коллегам и могут на них рассчитывать. Мы — эксперты в технологиях и доменных знаниях. Мы готовы к изменениям, ценим свободу, возможность экспериментировать и получать новый опыт и знания. Они помогают нам раскрыть свой потенциал и применить его в экосистеме DataArt.