SlideShare a Scribd company logo
1 of 15
Você está pronto para enfrentar os criminosos cibernéticos?
Fernando Romero, CISSP
Cybersecurity Specialist LATAM
fernando.romero@bt.com
2
aiming to
divert custom.
Hacktivists
seeking to
avenge a
perceived wrong.
those who
use hacking to
get their
message across.
those aiming
to exploit for
financial gain.
amateurs
vandalising
‘just because’.
Employees Competitors EntrepreneurHackers
Como podemos categorizar os criminosos cibernéticos?
3
1. Security challenges.
Digital crime is
driven by a
criminal dark market –
with organised, well
resourced and
profitable attacks.
Beyond the ‘four walls’, remote working, BYOD
and complex supply chains increase vulnerability –
leaving security teams struggling to keep up
with digital thieves.
The net cast by criminal entrepreneurs is widening.
Every second new malware is created and
distributed and new phishing campaigns are launched.
Unpatched, legacy
IT can be
a weak point in
digital defences.
Phishing tactics are
constantly evolving
and new trends emerge
towards email ‘CEO fraud’.
Attacks go beyond
distributing malware –
organised crime groups
exploit, blackmail employees
and place people on
the inside.
44
2. Rethink the digital security threat.
55
3. Ruthless and rational entrepreneurs.
66
4. Taking the fight to the attacker.
77
4. Taking the fight to the attacker.
Keep criminals away from
your information. Your first
line of defence is to keep
criminals out of your
information systems. Criminal
entrepreneurs are after your
data, and without access to
this, they can’t make any
money.
Make it harder for attackers
to exploit your data. Should
you suffer a breach, the next
step is to make it harder for
criminals to actually use your
data. Encryption is a key
element in achieving this —
and banks offer a good
example to follow.
Stop criminals spending their
ill-gotten gains. To truly cut off
criminal entrepreneurs’ ability
to capitalise on their crimes,
you have to stop them using
their profits. This means being
part of a collaborative
worldwide effort to prevent
money laundering and access
to black markets. ’.
88
5. Um pouco do Portfolio da BT Security.
BT Assure DDoS Mitigation
makes sure hackers cannot
prevent customers from
reaching your ‘storefront’.
BT Assure Threat Defence
guarantees real-time
response to any critical
alerts or targeted
malware detected within
your network.
BT Assure Threat Monitoring
provides a unique security
information and event
management (SIEM) service
that collects and analyses
security information 24x7
across your organisation.
9
The Geo-mapping shows the source and destination of
attacks in real time or based on historical data
The search function allows you to quickly find
information within messages
Failures
Anomalies
Potential
Threats
Attack
6. Assure analytics - Map View
10
7. Assure DDoS Mitigation – The problem
11
8. Assure DDoS Mitigation – A global solution
BT Assure. Security that matters 12
BT SOC
• Monitoring
• Query
• Analysis
• Alerts
Customer portal
& Intelligence Feeds
User environment
User Web browsing Email
servers
Check Point
SandBlast
Internet
9. Assure Threat Defence – Check Point Technology + BT Services
REALTIME
13
10. Why BT.
14 BT Security 14
Taking the offensive - Report
http://bit.ly/29eeS6q
bt.com/globalservices

More Related Content

What's hot

2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...Albert Hui
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 
BREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialBREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialThycotic
 
The Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsThe Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsSecurityMetrics
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification courseNishaPaunikar1
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101PECB
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsThycotic
 

What's hot (20)

2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
BREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised CredentialBREACHED! Implementing Incident Response for a Compromised Credential
BREACHED! Implementing Incident Response for a Compromised Credential
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit CardsThe Case of the Stockpiled Credit Cards
The Case of the Stockpiled Credit Cards
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
Seminar
SeminarSeminar
Seminar
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed Audits
 

Viewers also liked

Expand Existing Accounts
Expand Existing AccountsExpand Existing Accounts
Expand Existing AccountsCody Bernard
 
Fuquan-Yang-MCIP-correrction-mass-inconsistency
Fuquan-Yang-MCIP-correrction-mass-inconsistencyFuquan-Yang-MCIP-correrction-mass-inconsistency
Fuquan-Yang-MCIP-correrction-mass-inconsistencyFuquan Yang
 
Exercici 3 photoshop - Júlia Morey - B3
Exercici 3 photoshop  - Júlia Morey - B3Exercici 3 photoshop  - Júlia Morey - B3
Exercici 3 photoshop - Júlia Morey - B3julia_mose
 
Mauricio reina uribe
Mauricio reina uribeMauricio reina uribe
Mauricio reina uribemreinauribe
 
BJ_Reference_Executive_SK
BJ_Reference_Executive_SKBJ_Reference_Executive_SK
BJ_Reference_Executive_SKBoris Jukić
 
Ипотечное кредитование в России - текущая ситуация и перспективы
Ипотечное кредитование в России - текущая ситуация и перспективыИпотечное кредитование в России - текущая ситуация и перспективы
Ипотечное кредитование в России - текущая ситуация и перспективыLAZOVOY
 
Evolución histórica de la tabla periódica slidehare
Evolución histórica de la tabla periódica   slidehareEvolución histórica de la tabla periódica   slidehare
Evolución histórica de la tabla periódica slideharechristian franco Acosta
 

Viewers also liked (15)

Dirty fred presentation
Dirty fred presentationDirty fred presentation
Dirty fred presentation
 
Expand Existing Accounts
Expand Existing AccountsExpand Existing Accounts
Expand Existing Accounts
 
Actividad 4 y 5
Actividad 4 y 5Actividad 4 y 5
Actividad 4 y 5
 
Fuquan-Yang-MCIP-correrction-mass-inconsistency
Fuquan-Yang-MCIP-correrction-mass-inconsistencyFuquan-Yang-MCIP-correrction-mass-inconsistency
Fuquan-Yang-MCIP-correrction-mass-inconsistency
 
Exercici 3 photoshop - Júlia Morey - B3
Exercici 3 photoshop  - Júlia Morey - B3Exercici 3 photoshop  - Júlia Morey - B3
Exercici 3 photoshop - Júlia Morey - B3
 
Tp nea
Tp neaTp nea
Tp nea
 
La amistad
La amistadLa amistad
La amistad
 
Equity Valuations
Equity ValuationsEquity Valuations
Equity Valuations
 
Mauricio reina uribe
Mauricio reina uribeMauricio reina uribe
Mauricio reina uribe
 
BJ_Reference_Executive_SK
BJ_Reference_Executive_SKBJ_Reference_Executive_SK
BJ_Reference_Executive_SK
 
2 gatines
2 gatines2 gatines
2 gatines
 
Análisis de un abp
Análisis de un abpAnálisis de un abp
Análisis de un abp
 
Ипотечное кредитование в России - текущая ситуация и перспективы
Ипотечное кредитование в России - текущая ситуация и перспективыИпотечное кредитование в России - текущая ситуация и перспективы
Ипотечное кредитование в России - текущая ситуация и перспективы
 
Evolución histórica de la tabla periódica slidehare
Evolución histórica de la tabla periódica   slidehareEvolución histórica de la tabla periódica   slidehare
Evolución histórica de la tabla periódica slidehare
 
Lean Six Sigma_Green Belt Cert._Manjunath
Lean Six Sigma_Green Belt Cert._ManjunathLean Six Sigma_Green Belt Cert._Manjunath
Lean Six Sigma_Green Belt Cert._Manjunath
 

Similar to Taking the offensive Security Leaders V9.1

Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfnavigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfagupta3304
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesSeqrite
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Harshit Verma
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdfStay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdfonline Marketing
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail SecurityIBM Software India
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
Cyber Security importance.pdf
Cyber Security importance.pdfCyber Security importance.pdf
Cyber Security importance.pdfCiente
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling finalMARIUS EUGEN OPRAN
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 

Similar to Taking the offensive Security Leaders V9.1 (20)

Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfnavigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
Retail
Retail Retail
Retail
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdfStay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Cyber Security importance.pdf
Cyber Security importance.pdfCyber Security importance.pdf
Cyber Security importance.pdf
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 

Taking the offensive Security Leaders V9.1

  • 1. Você está pronto para enfrentar os criminosos cibernéticos? Fernando Romero, CISSP Cybersecurity Specialist LATAM fernando.romero@bt.com
  • 2. 2 aiming to divert custom. Hacktivists seeking to avenge a perceived wrong. those who use hacking to get their message across. those aiming to exploit for financial gain. amateurs vandalising ‘just because’. Employees Competitors EntrepreneurHackers Como podemos categorizar os criminosos cibernéticos?
  • 3. 3 1. Security challenges. Digital crime is driven by a criminal dark market – with organised, well resourced and profitable attacks. Beyond the ‘four walls’, remote working, BYOD and complex supply chains increase vulnerability – leaving security teams struggling to keep up with digital thieves. The net cast by criminal entrepreneurs is widening. Every second new malware is created and distributed and new phishing campaigns are launched. Unpatched, legacy IT can be a weak point in digital defences. Phishing tactics are constantly evolving and new trends emerge towards email ‘CEO fraud’. Attacks go beyond distributing malware – organised crime groups exploit, blackmail employees and place people on the inside.
  • 4. 44 2. Rethink the digital security threat.
  • 5. 55 3. Ruthless and rational entrepreneurs.
  • 6. 66 4. Taking the fight to the attacker.
  • 7. 77 4. Taking the fight to the attacker. Keep criminals away from your information. Your first line of defence is to keep criminals out of your information systems. Criminal entrepreneurs are after your data, and without access to this, they can’t make any money. Make it harder for attackers to exploit your data. Should you suffer a breach, the next step is to make it harder for criminals to actually use your data. Encryption is a key element in achieving this — and banks offer a good example to follow. Stop criminals spending their ill-gotten gains. To truly cut off criminal entrepreneurs’ ability to capitalise on their crimes, you have to stop them using their profits. This means being part of a collaborative worldwide effort to prevent money laundering and access to black markets. ’.
  • 8. 88 5. Um pouco do Portfolio da BT Security. BT Assure DDoS Mitigation makes sure hackers cannot prevent customers from reaching your ‘storefront’. BT Assure Threat Defence guarantees real-time response to any critical alerts or targeted malware detected within your network. BT Assure Threat Monitoring provides a unique security information and event management (SIEM) service that collects and analyses security information 24x7 across your organisation.
  • 9. 9 The Geo-mapping shows the source and destination of attacks in real time or based on historical data The search function allows you to quickly find information within messages Failures Anomalies Potential Threats Attack 6. Assure analytics - Map View
  • 10. 10 7. Assure DDoS Mitigation – The problem
  • 11. 11 8. Assure DDoS Mitigation – A global solution
  • 12. BT Assure. Security that matters 12 BT SOC • Monitoring • Query • Analysis • Alerts Customer portal & Intelligence Feeds User environment User Web browsing Email servers Check Point SandBlast Internet 9. Assure Threat Defence – Check Point Technology + BT Services REALTIME
  • 14. 14 BT Security 14 Taking the offensive - Report http://bit.ly/29eeS6q

Editor's Notes

  1. Cada um com as suas ferramentas e motivadores. Vou focar um pouco mais nos empreendedores. Small-time hackers have begun using DDoS attacks. There was a recent case in the news of a twelve year old Canadian boy who pleaded guilty to causing $60,000 worth of damage to government websites; security flaws were exploited, websites were flooded and access was gained to confidential databases. This stolen data was then traded with international hacker network Anonymous in return for, would you believe it, video games. This goes to show that while not every attacker has malicious intent, there are always people waiting in the wings to make the most of any kind of security breach. The recent technological advances, easier usage and the unprecedented increase in the use of mobile devices have combined to pose an ever-growing threat when it comes to DDoS attacks and your organisation.
  2. Digital crime is rising at an astonishing rate but while businesses are aware of a sharp increase in risk that awareness has not translated into effective action. The vast majority of businesses have experienced some kind of attack but only a minority feel fully prepared to face the growing threat. Ruthless criminal entrepreneurs are seizing the opportunity to exploit vulnerable systems. Their attacks are supported by a vast, well resourced and hugely profitable dark market.
  3. Digital crime currently costs the world in the region of $400 billion every year* (http://www.mcafee.com/uk/resources/reports/rp-economic-impact-digitalcrime2.pdf)
  4. We live in a world where technology is all-pervasive and as businesses roll out ever more sophisticated and ambitious digital strategies, ruthless criminal entrepreneurs are seizing the opportunity to exploit and monetise vulnerable systems. Their attacks are supported by a vast, well-resourced and hugely profitable dark market in which constantly evolving attack tools can be easily bought and hired. Encryption is a vital security tool, protecting personal and corporate data from the prying eyes of intruders, but in the hands of criminals it can also be used as an attack weapon. Ransomware is currently used by criminal entrepreneurs to extort ransom payments from companies and individuals. Typically, this is achieved by infecting a computer with malware that encrypts files. Once the data has been rendered inaccessible, the victim receives a ransom demand.
  5. The increasing sophistication and tenacity of cyber criminals mean that no organisation can be 100% assured that its systems are secure. But businesses can take steps to make successful attacks more difficult, more costly and ultimately much less profitable. Taking the fight to the attacker – Action points:§ Build partnerships with law enforcement – this will ensure that if the worst happens you have the trusted contacts you need to respond quickly. This might mean creating the headroom for your team to participate in forums designed to respond to managed cybercrime.§ Share information with your peers. Cybercrime isn’t a competitive issue – it hurts the whole community and you are all being targeted. Online and physical forums exist to allow this to happen in a trusted and confidential environment. Identify and join the most relevant of those forums. § Look at how you can limit the ability of criminals to exploit your data if they are successful in stealing it. Ask yourself if you can detect and block misuse, or respond quickly to a breach? In answering these questions, model the most likely scenarios that could lead to exploitation of data. Foster collaboration with outside organisations (banks, law enforcement agencies, suppliers) who may be the recipients of attempts to exploit the data.
  6. The increasing sophistication and tenacity of cyber criminals mean that no organisation can be 100% assured that its systems are secure. But businesses can take steps to make successful attacks more difficult, more costly and ultimately much less profitable. Taking the fight to the attacker – Action points:§ Build partnerships with law enforcement – this will ensure that if the worst happens you have the trusted contacts you need to respond quickly. This might mean creating the headroom for your team to participate in forums designed to respond to managed cybercrime.§ Share information with your peers. Cybercrime isn’t a competitive issue – it hurts the whole community and you are all being targeted. Online and physical forums exist to allow this to happen in a trusted and confidential environment. Identify and join the most relevant of those forums. § Look at how you can limit the ability of criminals to exploit your data if they are successful in stealing it. Ask yourself if you can detect and block misuse, or respond quickly to a breach? In answering these questions, model the most likely scenarios that could lead to exploitation of data. Foster collaboration with outside organisations (banks, law enforcement agencies, suppliers) who may be the recipients of attempts to exploit the data.
  7. Finalizo aqui, convidando vocês a irem ao nosso stand para conhecer as nossas soluçoes e conhecer mais o relatório aqui apresentado.