2. About
Me
I am a Security professional with 11+ years of corporate experience in the field of Cyber
Security, Information Security, Digital Forensics, GRC, IT Administration, Secure Software
Development, Training, and company operations. I worked in various industry verticals such as
Utilities, IT/ITES, E-Commerce, Government, BFSI and law-enforcement agencies.
https://www.linkedin.com/in/hrishikant
4. Key Points about Cyber
Threats and its related
Process Approach
4
5. A threat originating outside a
company, government
agency, or institution
A threat originating inside the
organization—typically by an
employee or “insider.”
A zero-day threat is a threat
that exploits an unknown
computer security vulnerability
Categories
5
APT is a network attack in
which an unauthorized person
gains access to a network and
stays there undetected for a
long period of time
6. CAUTION
Not to sleep
This approach is very high level for assessing the risk in the
organization. For better assessing the risk, we need to know
about the threat actor, threat vector, threat impact. Analysis
& Analytics of threat and threat protection
!
7. 7
General Process for better threat management
go ahead and follow the basic 5 steps
1 2 3 4 5
8. TIP
Please ask the questions, Don’t care
what other people thinking
Consistency helps viewer see connections in the story –
use same layout and design for individual sections and
give your audience a mental check-point.
!
9. CYBER SECURITY IS THE UNITED WORLD.DON’T
DIVED YOURSELF, ITS EVERY INDIVIDUAL
RESPONSIBILITY TO SECURE !
PARTICIPATE,GUYS
WIDEN YOUR THINKING , FEEL AMAZE!!!
FACT
Read More on Threat vector: https://www.isaca.org/chapters5/Virginia/Events/Documents/Past%20Pres%202011-03%20Threat%20Vectors.pdf
A threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security. In threat intelligence, actors are generally categorized as external, internal or partner.
Read More on Threat vector: https://www.isaca.org/chapters5/Virginia/Events/Documents/Past%20Pres%202011-03%20Threat%20Vectors.pdf