Cyberthreats: Are we screwed ?

837 views

Published on

A talk about all the threats we face using Internet: cyberwarfare, cyberespionage, cyberterrorism, cybercrime and hacktivism, with some useful advices to fight back.

Published in: Internet, Travel
1 Comment
2 Likes
Statistics
Notes
No Downloads
Views
Total views
837
On SlideShare
0
From Embeds
0
Number of Embeds
51
Actions
Shares
0
Downloads
35
Comments
1
Likes
2
Embeds 0
No embeds

No notes for slide

Cyberthreats: Are we screwed ?

  1. 1. Cyberthreats Are we screwed ?
  2. 2. Antonio Sanz IT Systems & Security Manager @antoniosanzalc http://www.equipoazul.es
  3. 3. #neocom2014
  4. 4. Dependance on IT IT is everywhere
  5. 5. Tactics, techniques and procedures Tactics, techniques & procedures
  6. 6. 0-days : Best way to ruin yours
  7. 7. Attribution is complicated
  8. 8. International law is … flaky
  9. 9. We are vulnerable
  10. 10. Cyberwar Cyberterrorism Cyberespionage Cybercrime Hacktivism
  11. 11. Objective: critical infrastructures
  12. 12. Main targets: SCADA systems
  13. 13. Cyberarmies
  14. 14. StuxnetStuxnet
  15. 15. Georgia & Russia
  16. 16. North Korea - South Korea (Banking) North / South Korea
  17. 17. Iranian Cyber Army - UAE ICA & United Arab Emirates
  18. 18. Cyberwar Cyberterrorism Cyberespionage Cybercrime Hacktivism
  19. 19. Objectives: Get influence through violent actions Objective: Political influence
  20. 20. -1%
  21. 21. - $136.000M
  22. 22. Myth or reality ?
  23. 23. Technical (in)competence
  24. 24. Cyberwar Cyberterrorism Cyberespionage Cybercrime Hacktivism
  25. 25. Objectives: Trade secrets & IP
  26. 26. APT – Advanced Persistent Threat
  27. 27. RSA & Lockheed Martin
  28. 28. Red October - Uroboros/Snake
  29. 29. IceFog - Mercenaries
  30. 30. Hi Prism !!
  31. 31. Hi Chinese Great Firewall !!
  32. 32. Erdogan - No Twitter on Turkey / Arab Spring no Internet Internet censorship
  33. 33. Cyberwar Cyberterrorism Cyberespionage Cybercrime Hacktivism
  34. 34. Objectives: Your money
  35. 35. Organized Crime (CaaS)
  36. 36. Banking Trojans
  37. 37. Identity TheftIdentity Theft
  38. 38. Blackmail / Extortion Ddos Extortion
  39. 39. Cyberwar Cyberterrorism Cyberespionage Cybercrime Hacktivism
  40. 40. Objectives: Political influence
  41. 41. Anonymous Anonymous
  42. 42. Wikileaks
  43. 43. What can we do?
  44. 44. Manage risk
  45. 45. Don’t be a low hanging fruit
  46. 46. Stand your ground
  47. 47. Get threat intelligence
  48. 48. Assume you’ll be compromised
  49. 49. Report the incident
  50. 50. Share data !
  51. 51. Conclussions
  52. 52. We are screwed Accept it
  53. 53. Do something about it
  54. 54. @antoniosanzalc http://www.equipoazul.es http://bit.ly/1fjGtQg Be careful out there

×