SlideShare a Scribd company logo
1 of 21
Download to read offline
1
The evolving threats
and
the challenges of the modern CISO
Gerasimos Moschonas
Information Security Professional
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Information Security Topics
 Big Data
 Internet of Things
 Cyber Crime & Attacks
 Social Engineering
 Mobility
 Regulatory Framework
2
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017 3
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
World keeps changing
 From centralised legacy systems (in premises) to
decentralised interconnected systems (in and out of
premises)
 Outsourcing services
 Cloud computing
 ΙοΤ
 Enterprises become more and more digital, and a
serious target for cyber criminals
 Attacks and attackers become more smart, aggresive
and professionals
 Threats are evolving and cyber security is a top priority
4
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Incidents keep growing
5
 Massive DDoS attack against major DNS service Dyn,
affected a huge portion of Internet users in the US, taking down the
access to major web services, including Twitter, Amazon, Netflix, PayPal
 SWIFT cyber heists (started from the Bank of Bangladesh)
 Yahoo had been hacked ..... again and ... again
 Hospitals, state and local governments, law enforcement
agencies, small & large businesses - these are just some of
the entities impacted recently by ransomware
 Spam email operator's faulty backup leaks 1.37bn addresses
 WikiLeaks Vault 7 : CIA hacking tools revealed
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
CISO’s role keeps evolving
From the role of the IT security administrator & the IT Security
Officer inside the IT Unit to the independent role of CISO who:
 Is a decision maker, an influencer
 Has the overall responsibility for the Information Security
Governance, reporting to the Senior Management
 Is Business-oriented and Technology-oriented, talks the
business & the technology language as well. Understands
the business environment, acts as an integrator of people,
business processes and technology
 “Translates” information security risks to business risks
 Is always aware of the evolving threats, the technology
trends and the regulatory framework
6
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Big Data
 Amount of data is increasing daily
 Data at rest and in transit, in and out of the perimeter
 But, do you know
 Where is your data located?
 How is your data used and exchanged?
 Who has access and for which reason?
 The retention period and how is it destructed?
 If Cloud services are being used?
 Use of cloud services for cost reduction raises several
matters to evaluate
 Data privacy and compliance
 Lack of governance
 Appropriate security controls
 Contractual terms (e.g. Right to Audit)
7
Employees & Partners 1/2
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Big Data
 Restrict the user environment (usb media, admin rights)
 Use DLP measures for data in transit (at the endpoints and
the perimeter)
 Enforce Identity & Access Management (staff, partners)
 Use of encryption – segregation of duties
 Apply a retention and destruction policy for both electronic
and physical data
 For cloud services
 Identity – Evaluate the assets
 Perform a risk based assessment
 Define the minimum security controls
 Be compliant with data privacy
regulations
8
Employees & Partners 2/2
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Internet of Things
 More than 24 billion IoT devices installed on Earth by 2020
 These «things» don’t «look» like traditional computers and
aren’t treated like computers
 Usually no adequate security measures taken
 Could be used as a botnet or as an entry point to a home or
corporate network
 IoT Botnet ‘Mirai’ targeted vulnerable ‘Smart’ IoT devices
turning them into ‘Bots’, used for DDoS
 Implement strong authentication
 Ensure the identity of each device
 Apply device-to-device secure communication
 Minimise the data exchanged, processed and stored
 Secure the data stored on the devices
9
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Cyber Crime & Attacks
10
1/4
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Cyber Crime & Attacks
 Attacks become more aggresive and intelligent
 Crime as a Service
 Distributed Denial of
Services (DDoS)
 Advanced Persistent
Threats (APTs)
 0-day attacks (malware unknown to traditional controls)
 The era of the Ransomware
Ransomware attacks against businesses increased threefold in 2016. Kaspersky Lab
recorded one ransomware attack every 40 seconds against companies in September.
 ATM attacks (malware, black box)
11
2/4
AKAMAI REPORT Q4 2016
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Cyber Crime & Attacks
 Bypassing the perimeter e.g. a malware is spreaded via a
usb / a laptop connected to a workstation / the network
 Do you really know if someone or “something” malicious is
already inside your network?
 How do you monitor the inside behavior to have alerts for
any abnormal activity?
 What constitutes normal and abnormal activity?
Preventing known threats is not enough : detect and prepare
for the Unknown
12
3/4
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Cyber Crime & Attacks
 Threat intelligence for monitoring both the incoming traffic
(web & email) and the corporate network, detecting any
malicious activity which points to viable threats
 Implement centralised Advanced Threat Protection
technologies for simulating the behavior of the
malicious/suspicious traffic (sandboxing)
 Implement multi-layered protection for the endpoints
(reputation analysis, advanced machine learning, behavior
emulation, memory exploit mitigation)
 Sign a Cyber Insurance contract
 Educate the incident response team to react accordingly
13
4/4
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Social Engineering
Methods of manipulating / tricking people to disclose
confidential information, breaking the security procedures
 CEO Fraud
 Spear Phishing (targeting Companies or
group of people) via email, sms, voice
 Social Media masquerade, Fake Apps/Sites:
Fraudsters can masquerade your brand - across
your digital channels - and bait your customers with scams, phishing
and offers for counterfeit products and services (Sony Twitter account
hacked)
 Educate and train the personnel (and the clients)
 Security awareness program - Metrics
 Protect your Brand – Internet monitoring
14
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Mobility
 Mobile apps
 m-wallets, m-banking, …
 Contactless and NFC payments
 Abuse of privacy : where the app has access to?
 Mixing of personal and corporate data on the device
 Remote working for troubleshooting
 Remote access to corporate resources
 Emails, Intranet Sites, Documents sharing
 Data stored in the cloud (e.g. iCloud)
 «Rooted» / «jailbroken» operating systems override the
security of the mobile device
15
1/2
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Mobility
16
 Privacy by design
 Application security assessment
 BYOD policy – Mobile Data Management
 Security policy (password, idle timeout), encryption
 Check for “rooted” devices / Remote Wipe
 Malware protection
 WiFi – Bluetooth not always on
 Secure remote access procedure
 Guest – WiFi LAN not connected to corporate network
 Control each device connected to the corporate network
2/2
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
 Information Security becomes more and more regulated
 General Data Protection Regulation (GDPR)
 The Directive on security of network and information
systems (NIS Directive)
 The EU Regulation on electronic identification and trust
services for electronic transactions in the internal market
(eIDAS Regulation)
 The 2nd Payment Services Directive (PSD2)
 Be ahead of the Regulatory Requirements – Act proactively
 Inform the Enterprise for the new obligations – Act for being
compliant in time
17
Regulatory Framework
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
 Build a understandable and robust (cyber) security strategy
 Align security strategy to business strategy, supporting the
business success
 Engage the Board. “Translate” information security risks to
business risks
 Reduce information security risks to an acceptable level.
Adopt appropriate security measures and procedures
18
The challenges of CISO
1/2
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
 Protect business brand and keep customers’ & shareholders’
confidence high
 Be ahead of the Regulatory Requirements – Act proactively
 Be prepared for an incident – Assume you’ll be compromised
 Educate the personnel – Raise awareness
19
The challenges of CISO
2/2
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Managing information security risks while
delivering value
to the digital enterprise
The role of CISO is more vital than ever
20
The role of CISO
2ο Forward Thinking Cyber Security Event
(ISC)² Hellenic Chapter
March 2017
Q & A
21

More Related Content

What's hot

Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligenceguest08b1e6
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionMuhammad Akbar Yasin
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthPECB
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?PECB
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP CertificationSam Bowne
 

What's hot (20)

Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 

Viewers also liked

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpectedisc2-hellenic
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Marsisc2-hellenic
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment isc2-hellenic
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment isc2-hellenic
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Teamisc2-hellenic
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Rahul Neel Mani
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementMafazo: Digital Solutions
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Roger Hagedorn
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 
Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014Western Region Municipality
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderAccenture Insurance
 
It for fiu The Internet as a tool for financial intelligence units
It  for fiu The Internet as a tool for financial intelligence units It  for fiu The Internet as a tool for financial intelligence units
It for fiu The Internet as a tool for financial intelligence units Joseph Yosi Margalit
 
Security Threats
Security ThreatsSecurity Threats
Security Threatsanalyst202
 

Viewers also liked (20)

Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpected
 
Operation Grand Mars
Operation Grand MarsOperation Grand Mars
Operation Grand Mars
 
Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment Building next gen malware behavioural analysis environment
Building next gen malware behavioural analysis environment
 
Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment Flowchart - Building next gen malware behavioural analysis environment
Flowchart - Building next gen malware behavioural analysis environment
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
European Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security TeamEuropean Cyber Security Challenge - Greel National Cyber Security Team
European Cyber Security Challenge - Greel National Cyber Security Team
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 
SecurityOperations
SecurityOperationsSecurityOperations
SecurityOperations
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Panoptis 2016
Panoptis 2016Panoptis 2016
Panoptis 2016
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014
 
Mandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINALMandelaris_SecureWorld_2016_FINAL
Mandelaris_SecureWorld_2016_FINAL
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
It for fiu The Internet as a tool for financial intelligence units
It  for fiu The Internet as a tool for financial intelligence units It  for fiu The Internet as a tool for financial intelligence units
It for fiu The Internet as a tool for financial intelligence units
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
GDPR 11/1/2017
GDPR 11/1/2017GDPR 11/1/2017
GDPR 11/1/2017
 

Similar to The evolving threats and the challenges of the modern CISO

2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 

Similar to The evolving threats and the challenges of the modern CISO (20)

2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Cyber security
Cyber security Cyber security
Cyber security
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
188
188188
188
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Task 3
Task 3Task 3
Task 3
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
C018131821
C018131821C018131821
C018131821
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 

More from isc2-hellenic

General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0isc2-hellenic
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentationisc2-hellenic
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapterisc2-hellenic
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosisc2-hellenic
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1isc2-hellenic
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2isc2-hellenic
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0isc2-hellenic
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attackisc2-hellenic
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentationisc2-hellenic
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & updateisc2-hellenic
 

More from isc2-hellenic (12)

General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0General assembly 2016 02 24 1.0
General assembly 2016 02 24 1.0
 
2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation2016 02-14 - tlp-white ce2016 presentation
2016 02-14 - tlp-white ce2016 presentation
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Event 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatosEvent 16 12-15 kostas papadatos
Event 16 12-15 kostas papadatos
 
Event 16 12-15 panel1
Event 16 12-15 panel1Event 16 12-15 panel1
Event 16 12-15 panel1
 
Event 16 12-15 panel2
Event 16 12-15 panel2Event 16 12-15 panel2
Event 16 12-15 panel2
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack4. Mitigating a Cyber Attack
4. Mitigating a Cyber Attack
 
3. APTs Presentation
3. APTs Presentation3. APTs Presentation
3. APTs Presentation
 
2. Chapter introduction & update
2. Chapter introduction & update2. Chapter introduction & update
2. Chapter introduction & update
 
1. Welcome Note
1. Welcome Note1. Welcome Note
1. Welcome Note
 

Recently uploaded

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Recently uploaded (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

The evolving threats and the challenges of the modern CISO

  • 1. 1 The evolving threats and the challenges of the modern CISO Gerasimos Moschonas Information Security Professional 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017
  • 2. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Information Security Topics  Big Data  Internet of Things  Cyber Crime & Attacks  Social Engineering  Mobility  Regulatory Framework 2
  • 3. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 3
  • 4. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 World keeps changing  From centralised legacy systems (in premises) to decentralised interconnected systems (in and out of premises)  Outsourcing services  Cloud computing  ΙοΤ  Enterprises become more and more digital, and a serious target for cyber criminals  Attacks and attackers become more smart, aggresive and professionals  Threats are evolving and cyber security is a top priority 4
  • 5. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Incidents keep growing 5  Massive DDoS attack against major DNS service Dyn, affected a huge portion of Internet users in the US, taking down the access to major web services, including Twitter, Amazon, Netflix, PayPal  SWIFT cyber heists (started from the Bank of Bangladesh)  Yahoo had been hacked ..... again and ... again  Hospitals, state and local governments, law enforcement agencies, small & large businesses - these are just some of the entities impacted recently by ransomware  Spam email operator's faulty backup leaks 1.37bn addresses  WikiLeaks Vault 7 : CIA hacking tools revealed
  • 6. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 CISO’s role keeps evolving From the role of the IT security administrator & the IT Security Officer inside the IT Unit to the independent role of CISO who:  Is a decision maker, an influencer  Has the overall responsibility for the Information Security Governance, reporting to the Senior Management  Is Business-oriented and Technology-oriented, talks the business & the technology language as well. Understands the business environment, acts as an integrator of people, business processes and technology  “Translates” information security risks to business risks  Is always aware of the evolving threats, the technology trends and the regulatory framework 6
  • 7. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Big Data  Amount of data is increasing daily  Data at rest and in transit, in and out of the perimeter  But, do you know  Where is your data located?  How is your data used and exchanged?  Who has access and for which reason?  The retention period and how is it destructed?  If Cloud services are being used?  Use of cloud services for cost reduction raises several matters to evaluate  Data privacy and compliance  Lack of governance  Appropriate security controls  Contractual terms (e.g. Right to Audit) 7 Employees & Partners 1/2
  • 8. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Big Data  Restrict the user environment (usb media, admin rights)  Use DLP measures for data in transit (at the endpoints and the perimeter)  Enforce Identity & Access Management (staff, partners)  Use of encryption – segregation of duties  Apply a retention and destruction policy for both electronic and physical data  For cloud services  Identity – Evaluate the assets  Perform a risk based assessment  Define the minimum security controls  Be compliant with data privacy regulations 8 Employees & Partners 2/2
  • 9. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Internet of Things  More than 24 billion IoT devices installed on Earth by 2020  These «things» don’t «look» like traditional computers and aren’t treated like computers  Usually no adequate security measures taken  Could be used as a botnet or as an entry point to a home or corporate network  IoT Botnet ‘Mirai’ targeted vulnerable ‘Smart’ IoT devices turning them into ‘Bots’, used for DDoS  Implement strong authentication  Ensure the identity of each device  Apply device-to-device secure communication  Minimise the data exchanged, processed and stored  Secure the data stored on the devices 9
  • 10. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Cyber Crime & Attacks 10 1/4
  • 11. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Cyber Crime & Attacks  Attacks become more aggresive and intelligent  Crime as a Service  Distributed Denial of Services (DDoS)  Advanced Persistent Threats (APTs)  0-day attacks (malware unknown to traditional controls)  The era of the Ransomware Ransomware attacks against businesses increased threefold in 2016. Kaspersky Lab recorded one ransomware attack every 40 seconds against companies in September.  ATM attacks (malware, black box) 11 2/4 AKAMAI REPORT Q4 2016
  • 12. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Cyber Crime & Attacks  Bypassing the perimeter e.g. a malware is spreaded via a usb / a laptop connected to a workstation / the network  Do you really know if someone or “something” malicious is already inside your network?  How do you monitor the inside behavior to have alerts for any abnormal activity?  What constitutes normal and abnormal activity? Preventing known threats is not enough : detect and prepare for the Unknown 12 3/4
  • 13. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Cyber Crime & Attacks  Threat intelligence for monitoring both the incoming traffic (web & email) and the corporate network, detecting any malicious activity which points to viable threats  Implement centralised Advanced Threat Protection technologies for simulating the behavior of the malicious/suspicious traffic (sandboxing)  Implement multi-layered protection for the endpoints (reputation analysis, advanced machine learning, behavior emulation, memory exploit mitigation)  Sign a Cyber Insurance contract  Educate the incident response team to react accordingly 13 4/4
  • 14. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Social Engineering Methods of manipulating / tricking people to disclose confidential information, breaking the security procedures  CEO Fraud  Spear Phishing (targeting Companies or group of people) via email, sms, voice  Social Media masquerade, Fake Apps/Sites: Fraudsters can masquerade your brand - across your digital channels - and bait your customers with scams, phishing and offers for counterfeit products and services (Sony Twitter account hacked)  Educate and train the personnel (and the clients)  Security awareness program - Metrics  Protect your Brand – Internet monitoring 14
  • 15. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Mobility  Mobile apps  m-wallets, m-banking, …  Contactless and NFC payments  Abuse of privacy : where the app has access to?  Mixing of personal and corporate data on the device  Remote working for troubleshooting  Remote access to corporate resources  Emails, Intranet Sites, Documents sharing  Data stored in the cloud (e.g. iCloud)  «Rooted» / «jailbroken» operating systems override the security of the mobile device 15 1/2
  • 16. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Mobility 16  Privacy by design  Application security assessment  BYOD policy – Mobile Data Management  Security policy (password, idle timeout), encryption  Check for “rooted” devices / Remote Wipe  Malware protection  WiFi – Bluetooth not always on  Secure remote access procedure  Guest – WiFi LAN not connected to corporate network  Control each device connected to the corporate network 2/2
  • 17. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017  Information Security becomes more and more regulated  General Data Protection Regulation (GDPR)  The Directive on security of network and information systems (NIS Directive)  The EU Regulation on electronic identification and trust services for electronic transactions in the internal market (eIDAS Regulation)  The 2nd Payment Services Directive (PSD2)  Be ahead of the Regulatory Requirements – Act proactively  Inform the Enterprise for the new obligations – Act for being compliant in time 17 Regulatory Framework
  • 18. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017  Build a understandable and robust (cyber) security strategy  Align security strategy to business strategy, supporting the business success  Engage the Board. “Translate” information security risks to business risks  Reduce information security risks to an acceptable level. Adopt appropriate security measures and procedures 18 The challenges of CISO 1/2
  • 19. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017  Protect business brand and keep customers’ & shareholders’ confidence high  Be ahead of the Regulatory Requirements – Act proactively  Be prepared for an incident – Assume you’ll be compromised  Educate the personnel – Raise awareness 19 The challenges of CISO 2/2
  • 20. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Managing information security risks while delivering value to the digital enterprise The role of CISO is more vital than ever 20 The role of CISO
  • 21. 2ο Forward Thinking Cyber Security Event (ISC)² Hellenic Chapter March 2017 Q & A 21