SlideShare a Scribd company logo
Submit Search
Upload
Login
Signup
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Report
Bangladesh Network Operators Group
Follow
bdNOG
Jun. 12, 2021
•
0 likes
•
145 views
1
of
11
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Jun. 12, 2021
•
0 likes
•
145 views
Download Now
Download to read offline
Report
Internet
The Post Covid-19 Cybersecurity World - Where Is It Headed?
Bangladesh Network Operators Group
Follow
bdNOG
Recommended
Supply Chain Attack Backdooring Your Networks
Bangladesh Network Operators Group
412 views
•
40 slides
Extending Network Visibility: Down to the Endpoint
Lancope, Inc.
645 views
•
21 slides
Topics in network security
Nasir Bhutta
10K views
•
11 slides
StealthWatch & Point-of-Sale (POS) Malware
Lancope, Inc.
6.3K views
•
26 slides
IoT - the Next Wave of DDoS Threat Landscape
APNIC
1.1K views
•
34 slides
Network security - Defense in Depth
Dilum Bandara
5.7K views
•
91 slides
More Related Content
What's hot
Network security
Sri Manakula Vinayagar Engineering College
126 views
•
55 slides
Data security in local network using distributed firewall ppt
Sabreen Irfana
13.7K views
•
45 slides
DDOS ATTACK - MIRAI BOTNET
Sukhdeep Singh Sandhu
232 views
•
22 slides
Firewall
thinkahead.net
794 views
•
22 slides
Wireless Network Security
Gyana Ranjana
1.6K views
•
11 slides
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
1.5K views
•
26 slides
What's hot
(20)
Network security
Sri Manakula Vinayagar Engineering College
•
126 views
Data security in local network using distributed firewall ppt
Sabreen Irfana
•
13.7K views
DDOS ATTACK - MIRAI BOTNET
Sukhdeep Singh Sandhu
•
232 views
Firewall
thinkahead.net
•
794 views
Wireless Network Security
Gyana Ranjana
•
1.6K views
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
•
1.5K views
Internet of Things Security Patterns
Mark Benson
•
516 views
NDIA 2021 - solar winds overview and takeaways
Bryson Bort
•
167 views
SOPHOS presentation used during the SWITCHPOINT NV/SA Quarterly Experience Da...
SWITCHPOINT NV/SA
•
430 views
Cyber espionage - Tinker, taylor, soldier, spy
b coatesworth
•
3.1K views
Firewall girija ppt
Girija Sankar Dash
•
1.8K views
Windows firewall
VC Infotech
•
1.5K views
How to stay protected against ransomware
Sophos Benelux
•
2.4K views
Network Security Tools and applications
webhostingguy
•
2.2K views
Cyber Attack Survival: Are You Ready?
Radware
•
4.1K views
DTS Solution - Yehia Mamdouh - Release your pet worm on your infrastructure....
Shah Sheikh
•
1.3K views
Another proposal
King Portipher
•
609 views
SonicWALL Advanced Features
David Perkins
•
653 views
network security, group policy and firewalls
Sapna Kumari
•
2.8K views
Firewall
Amuthavalli Nachiyar
•
41K views
Similar to The Post Covid-19 Cybersecurity World - Where Is It Headed?
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
TI Safe
34 views
•
21 slides
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Unisys Corporation
830 views
•
19 slides
Cyber Security
frcarlson
480 views
•
17 slides
Compliance made easy. Pass your audits stress-free.
AlgoSec
208 views
•
43 slides
Webinar: Insights from CYREN's Q3 trend report
Cyren, Inc
280 views
•
31 slides
IoT DDoS Attacks: the stakes have changed
Great Bay Software
600 views
•
18 slides
Similar to The Post Covid-19 Cybersecurity World - Where Is It Headed?
(20)
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
TI Safe
•
34 views
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Unisys Corporation
•
830 views
Cyber Security
frcarlson
•
480 views
Compliance made easy. Pass your audits stress-free.
AlgoSec
•
208 views
Webinar: Insights from CYREN's Q3 trend report
Cyren, Inc
•
280 views
IoT DDoS Attacks: the stakes have changed
Great Bay Software
•
600 views
How to make the move towards hybrid cloud computing
David Strom
•
956 views
SCADA Security: The Five Stages of Cyber Grief
Lancope, Inc.
•
1.1K views
Spikes Security Isla Isolation
Cybryx
•
1.3K views
Vpn alternative whitepaper
Cristian Garcia G.
•
27 views
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
•
437 views
Cybersecurity.pptx
John Donahue
•
30 views
[CLASS 2014] Palestra Técnica - Michael Firstenberg
TI Safe
•
593 views
BYOD and Your Business
cherienetclarity
•
567 views
Lumension Security - Adjusting our defenses for 2012
Andris Soroka
•
308 views
Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore
Great Bay Software
•
296 views
UTM Technology & Leaders of UTMs in Gartner Magic report 2014
Tarek Nader
•
1.5K views
Security and control in Management Information System
Satya P. Joshi
•
10.3K views
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
•
2.9K views
2014CyberSecurityProject
Kaley Hair
•
65 views
More from Bangladesh Network Operators Group
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
40 views
•
20 slides
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
106 views
•
27 slides
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
45 views
•
21 slides
An Overview about open UDP Services
Bangladesh Network Operators Group
214 views
•
15 slides
12 Years in DNS Security As a Defender
Bangladesh Network Operators Group
104 views
•
21 slides
Contents Localization Initiatives to get better User Experience
Bangladesh Network Operators Group
68 views
•
31 slides
More from Bangladesh Network Operators Group
(20)
IPv6 Deployment in South Asia 2022
Bangladesh Network Operators Group
•
40 views
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
•
106 views
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
•
45 views
An Overview about open UDP Services
Bangladesh Network Operators Group
•
214 views
12 Years in DNS Security As a Defender
Bangladesh Network Operators Group
•
104 views
Contents Localization Initiatives to get better User Experience
Bangladesh Network Operators Group
•
68 views
BdNOG-20220625-MT-v6.0.pptx
Bangladesh Network Operators Group
•
69 views
Route Leak Prevension with BGP Community
Bangladesh Network Operators Group
•
110 views
Tale of a New Bangladeshi NIX
Bangladesh Network Operators Group
•
73 views
MANRS for Network Operators
Bangladesh Network Operators Group
•
44 views
Re-define network visibility for capacity planning & forecasting with Grafana
Bangladesh Network Operators Group
•
102 views
RPKI ROA updates
Bangladesh Network Operators Group
•
27 views
Blockchain Demystified
Bangladesh Network Operators Group
•
79 views
Measuring the Internet Economy: How Networks Create Value
Bangladesh Network Operators Group
•
257 views
RPKI Deployment Status in Bangladesh
Bangladesh Network Operators Group
•
152 views
Route Origin Validation - A MANRS Approach
Bangladesh Network Operators Group
•
160 views
31, Get more from your IPv4 resources
Bangladesh Network Operators Group
•
3.3K views
Secured Internet Gateway for ISP with pfsense & FRR
Bangladesh Network Operators Group
•
542 views
EVPN Introduction
Bangladesh Network Operators Group
•
868 views
Social CDN Business : Paid or Free - bdNOG12 Panel Discussion
Bangladesh Network Operators Group
•
803 views
Recently uploaded
September 2023 CIAOPS Need to Know Webinar
Robert Crane
9 views
•
18 slides
mnNOG 2023: State of IPv6 in Mongolia
APNIC
5 views
•
21 slides
D2C Insider Elevate , Global Selling Summit Bengaluru - Developing Brand Posi...
D2C Insider
8 views
•
21 slides
roland barthes theory hw.pptx
SerraSalci
6 views
•
6 slides
pdfjupitercpanel.pdf
clay99
7 views
•
15 slides
AusNOG 2023: RPKI and whois updates
APNIC
154 views
•
39 slides
Recently uploaded
(15)
September 2023 CIAOPS Need to Know Webinar
Robert Crane
•
9 views
mnNOG 2023: State of IPv6 in Mongolia
APNIC
•
5 views
D2C Insider Elevate , Global Selling Summit Bengaluru - Developing Brand Posi...
D2C Insider
•
8 views
roland barthes theory hw.pptx
SerraSalci
•
6 views
pdfjupitercpanel.pdf
clay99
•
7 views
AusNOG 2023: RPKI and whois updates
APNIC
•
154 views
D2C Insider Elevate, Global Selling Summit Bengaluru - Building Your eCommerc...
D2C Insider
•
7 views
informatica1.pptx
AlessandroSichetti
•
23 views
OpenID 4 Verifiable Credentials + HAIP (Update)
Torsten Lodderstedt
•
45 views
EAC-VB2023.pdf
ssuserb29f84
•
18 views
Hacktober Fest 2023 Session
Adnan Sheikh
•
55 views
D2C Insider Elevate , Global Selling Summit Bengaluru - Worshop on Invitee re...
D2C Insider
•
7 views
Binisha.pptx
SuvamMaharjan1
•
9 views
AusNOG 2023: A quick look at QUIC
APNIC
•
156 views
Networking Basic Refresh.pdf
CS Knowledge
•
12 views
The Post Covid-19 Cybersecurity World - Where Is It Headed?
1.
1 © UNIPHORE 2021
uniphore.com The Post Covid-19 Cybersecurity World: Where Is It Headed? bdNOG13 June 12, 2021 Merike Kaeo, CISO (merike.kaeo@uniphore.com)
2.
2 © UNIPHORE 2021
uniphore.com DAILY BREACHES AND RANSOMWARE ATTACKS – THE VIRTUAL PANDEMIC
3.
3 © UNIPHORE 2021
uniphore.com WHY ARE THINGS SO BROKEN? Scale • Billions of new devices • Large amounts of bandwidth Criminal Sophistication • Network architecture clue • Prevalent use of tunneling • More use of encryption • Social media ‘weaponization’ Automation • Outsourced infrastructures • Persistent continuous attacks on targets
4.
4 © UNIPHORE 2021
uniphore.com THE REALITIES OF WORKING FROM HOME • Increased Stress • Less Privacy • Multiple Demands • Shared Devices • Shared Network • No Physical Security
5.
5 © UNIPHORE 2021
uniphore.com COVID-19 EXACERBATED ONLINE CRIME • Increased Threat Vectors • Home networks • VPN (lack of) • Routing/DNS • Emails • Unresolved Technical Debt • RPKI • DNSSEC • Digital Certificate Management • Ineffective Monitoring
6.
6 © UNIPHORE 2021
uniphore.com STEALING CREDENTIALS IS TOO EASY Being a victim of a phishing attack Laptop gets stolen Sharing your password with another person Re-using same password on many systems Spyware on your computer installed a keylogger Storing your private key in an easily accessed file Sending credentials in cleartext emails Unpatched security vulnerabilities are exploited HUMAN TECH
7.
7 © UNIPHORE 2021
uniphore.com WE HAVE BLIND TRUST ISSUES • Protocol Standards • Implementation Guidelines • Device Certifications • Compliance Mandates • Documented Policies But…There’s The Human Factor You can do everything right and still screw up Question the status quo
8.
8 © UNIPHORE 2021
uniphore.com INCIDENT RESPONSE NEEDS IMPROVEMENT Everyone Gets Vilified • Why not detected sooner • Why not fixed quicker • Why notifications delayed Issues To Be Resolved • Breach notification laws • Lack of transparency • Escalation chain • Cross sector sharing (DNS, ISP) • Media hype with incomplete information
9.
9 © UNIPHORE 2021
uniphore.com THE BASIC DETAILS NEED ATTENTION Incident Response / Crisis Plan • Routing and DNS Compromise Vulnerability Disclosure/Patch Plan Fundamental Security Controls • User Authentication/Authorization • Device Authentication/Authorization • Access Control (Packet/Route Filtering) • Data Integrity • Data Confidentiality • Auditing / Logging • DoS Mitigation Most Basic Security Controls Minimize Impact Of Sophisticated Attacks • Don’t rely on defaults • Implement 2FA • Use cryptographically protected protocols • Get alerted for unauthorized changes
10.
10 © UNIPHORE 2021
uniphore.com Home workstations are now ‘mobile devices’ • What level of control do you have? • What is backed up where? • What is going into a personal cloud? • Who has access to devices? • Who uses screen savers at home? Single home router for Internet access • Where is traffic going? • Can traffic be observed? • Where are DNS queries going? HOME NETWORK AS EXTENSION OF BUSINESS Think Before You Click Lock Down Your Login Connect Via Secure Network Separate Your Networks Limit Access To Work Devices Update Your Software
11.
11 © UNIPHORE 2021
uniphore.com THANK YOU !