SlideShare a Scribd company logo
Delivering	the	best	in	z	services,	software,	hardware	and	training.Delivering	the	best	in	z	services,	software,	hardware	and	training.
Delivering	the	best	in	z	services,	skills,	security	and	software.
Cybercrime,	Inc.
Agenda
• Introductions
• Criminals	and	criminal	organisations
• Cyber	Crime
• Cybercrime,	Inc.
• Hacking	for	Profit
• Being	a	Hacker
• Mainframe	– The	Crown	Jewel
• What	Can	We	Do?
• Before	We	Go
• Questions	and	Answers… maybe…
Who	am	I?	A	quick	introduction…
RUI	MIGUEL	FEIO
• Senior	Technical	Lead	at	RSM	Partners
• Based	in	the	UK	but	travels	all	over	the	world
• 18	years	experience working	with	mainframes
• Started	with	IBM	as	an	MVS	Sys	Programmer
• Specialist	in	mainframe	security
• Experience	in	other	platforms
Introducing	RSM	Partners
• Sole	Focus	is	IBM	Mainframe	Services
• IBM	Business	Partner
• World	Leading,	1,000+	Man	Years	Experience
• Run	3	mainframes	in-house
• Working	with	large	financial,	retail	&	utility	companies
• One	area	of	specialism	is	mainframe	security:
– Whole	range	of	services,	Audits,	pen	tests,	migrations	and	
security	remediation	programs
• We	have	a	reputation	for	deliver:
– On	time,	On	budget,	Every	Time
Criminals	and	Criminal	
Organisations
Criminals	from	the	past
Al	Capone Pablo	Escobar
• Some	of	the	most	well	known	criminal	
organisations,	the	“Old	Boys”:
– Cosa	Nostra	(Italian	Mafia)
– Japanese	Yakuza
– Chinese	Triads
– Russian	Mafia
– Nigerian	mobs
– Latin	American	cartels
Criminal	organisations
Why	Crime?
In	the	modern	world
*	https://www.emarketer.com/Article/Worldwide-Retail-Ecommerce-Sales-Will-Reach-1915-Trillion-This-Year/1014369
New	type	of	criminals
https://www.fbi.gov/investigate/cyber/most-wanted
New	type	of	criminals
https://www.fbi.gov/investigate/cyber/most-wanted
New	type	of	criminals
Cyber	Crime
• Highly	profitable	(it’s	always	about	the	money)
• Low	risk	(anonymity	and	geographical	location)
• More	efficient	due	to	technology
• Globally	dispersed,	with	special	concentration	in:
Why	Cyber	Crime?
• Ukraine • China • Brazil
• Russia • Indonesia • USA
• Romania • Taiwan • Turkey
• Bulgaria • India • Nigeria
• They	have	adapted!
• Criminals	and	criminal	organisations	have	adapted	to	the	“new	
modern	world”.
• In	fact,	a	2014	study	from	the	Rand	Corporation	says	that:
“80%	of	hackers	work	with	or	are	part	of	an	organised	crime	group”
• The	“Old	Boys”	have	employed	old	strategies	and	traditional	
business	models	and	created	the	“Cybercrime,	Inc.”.
What	happened	to	the	“Old	Boys”?
Cybercrime,	Inc.
• Cybercrime,	Inc.	is	highly	organised
• Deeply	sophisticated:
– Business	approach
– Towards	the	‘client’
• Uses	typical	corporate	strategies:
– Creative	financing
– Global	logistics
– Supply	chain	and	workforce	management
– Business	and	market	analysis
– Focused	on	the	client’s	needs
Business	Model
• Some	of	the	new	‘business’	opportunities:
• Identity	theft
• Intellectual	property	theft
• Trade	secrets
• Industrial	espionage
• Sensitive	data	theft
• Online	extortion
• Financial	crime
• Data	manipulation
Business	Opportunities
• Some	of	the	tactics	and	methods	used	by	Cybercrime,	Inc.:
– Phishing	and	spear	phishing
– Man-in-the-middle
– Vulnerabilities
– Spam
– Botnets
– Scareware,	Malware	and	Ransomware
– DoS and	DDoS
– …
Tactics	Employed
Typical	Business	Organisation
CEO
CFO
Management
Sales	People
CIO
Management
Researchers Developers Engineers QA	Testers Tech	Support
HR	Director CMO
Management
Distributors Affiliates
Cybercrime,	Inc.	
CEO
(Boss)
CFO
(Underboss)
Management	
(Lieutenant)
Money	Mules
(Soldiers	&	
Associates)
CIO	
(Underboss)
Management
(Lieutenant)
Researchers	
(Soldiers)
Developers
(Soldiers)
Engineers
(Soldiers)
QA	Testers
(Soldiers)
Tech	Support
(Soldiers)
HR	Director
(Underboss)
CMO	
(Underboss)
Management
(Lieutenant)
Distributors
(Soldiers)
Affiliates
(Associates)
• Traditional	desktops	and	servers
• Mobile	devices
• Internet	of	Things	(IoT)	devices
• “Cloud”	systems
• Supervisory	Control	And	Data	Acquisition	(SCADA)	devices
• GPS	Systems
• Tracking	Systems
• Implanted	medical	devices	(IMDs)
• …
• Targeting	data	and	the	ability	to	control	resources
Technological	Targets
Hacking	for	Profit
• Founded	by	Sam	Jain	and	Daniel	Sundin
• Developed	scareware	rogue	security	SW
• Offices	in	4	continents	and	HQ	in	Ukraine
• Support	centres	in	US,	Argentina	and	India
• Marketed	products	under	more	than	1,000	
different	brands	and	in	9	languages
• From	2002	to	2008	IMI	generated	hundreds	
of	millions	of	dollars	in	profit.
IMI	– Innovative	Marketing	Inc.
IMI	– Innovative	Marketing	Inc.
Carbanak Group	(aka	Anunak)
• First	identified	in	early	in	2015	by	Kaspersky	Lab
• Used	an	Advanced	Persistent	Threat	(APT)	
campaign	targeting	financial	institutions
• Estimated	$1	Billion	US	dollars	have	been	stolen	
in	an	attack	against	100	banks	and	private	
customers
• Targeted	primarily	Russia,	United	States,	
Germany,	China	and	Ukraine
Cybercrime,	Inc.	is	Very	Profitable
https://www.scmagazine.com/loss-from-cybercrime-exceeded-13b-in-2016-fbi-report/article/671047/
Being	a	Hacker
• Hackers	are	not	born	hackers,	they	are	trained
• Enormous	amount	of	free	educational	material	in	the	internet	and	
in	the	underworld	(dark	web)
• PC	games:
– Uplink
– Hacker	Experience
– Torn	City
– Hacknet
– Hackers	(for	iOS	and	Android)
Looking	for	a	Hacker
Anyone	who	feels	attracted	or	enjoys:
– Technology
– Challenge
– The	thrill
– Adventure	
– Danger
– Money
– Respect
– Fame
Who	wants	to	be	a	Hacker?
Mainframe	– The	Crown	
Jewel
• The	mainframe	processes	and	stores	larges	volumes	of	data	
• It’s	considered	the	most	secure	platform	in	the	world	that	cannot	
be	hacked
• As	such,	it	does	not	require	big	investments	in	security…
• Unfortunately,	it’s	not	quite	so.	The	truth	is:
• The	mainframe	is	a	platform	that	is	highly	securable	but	not	
secured	by	default.	Investment	and	resources	are	required	to	
secure	it
The	Mainframe
Hacking	the	Mainframe
• Last	month,	did	a	mainframe	security	audit	on	a	financial	institution	
who	has	had	mainframe	security	issues	in	the	past.
• 4	Production	mainframe	systems	were	in	scope.
One	should	learn	from	one’s	mistakes
Classification SYS1 SYS2 SYS3 SYS4
High 42 33 40 36
Medium 28 21 24 27
Low 12 11 12 11
Total	out	of	
89	found
82 65 76 74
The	SWIFT	Hackings
• One	of	the	banks	targeted	by	the	SWIFT	attacks	contacted	RSM	
Partners	to	help	them	securing	the	mainframe.
• Their	mainframe	had	been	compromised… almost	a	year	ago!!!
• First	phase	was	to	do	a	mainframe	security	audit	on	2	of	their	
production	systems.
A	Wake	Up	Call
Classification Score
High 34
Medium 41
Low 18
Total: 93
On	a	Pen	Test	at	one	of	the	top	5	US	banks:
• Client	was	convinced	they	had	a	top	of	the	art	
network	security	system.	
• I	decided	to	unplug	Ethernet	cable	from	one	of	
the	terminals	and	connect	it	to	my	laptop
• This	went	without	detection
• I	was	able	to	run	a	port	scan	on	the	mainframe	
without	detection
• This	was	just	the	beginning!!...
They	Could	Have	Been	Next
On	a	Pen	Test	at	one	of	the	top	5	US	banks:
• Client	was	convinced	they	had	a	top	of	the	art	
network	security	system.	
• I	decided	to	unplug	Ethernet	cable	from	one	of	
the	terminals	and	connect	it	to	my	laptop
• This	went	without	detection
• I	was	able	to	run	a	port	scan	on	the	mainframe	
without	detection
• This	was	just	the	beginning!!...
They	Could	Have	Been	Next
Vulnerabilities
24	high	risk
25	medium	risk
2	low	risk
1. RACF	Database	is	not	adequately	protected
2. RACF	profiles	in	WARNING	mode
3. Excessive	access	to	APF	Libraries
4. Inappropriate	usage	of	z/OS	UNIX	Superuser Privilege,	UID	=	0
5. Dataset	profiles	with	UACC	of	READ	
6. MVS	and	JES2	commands	not	properly	protected
7. SERVAUTH	class	not	active	or	without	proper	profiles	in	place
8. Cryptographic	keys	and	services	not	properly	protected
9. Excessive	number	of	personal	userids with	system	wide	privileges
10. Unix	System	Services	security	being	neglected
What	we	keep	seeing
What	Can	We	Do?
• Security	must	be	taken	seriously	by	everyone!
– Governments,	companies,	and	individuals	need	to	be	security	
conscious	and	security	oriented
• Usual	security	recommendations	apply:
– Keep	security	systems	updated	and	up-to-date
– Question	the	origin	of	everything
– Be	mindful	of:
• The	information	you	share	and	make	’publicly’	available
• Free	Wifi hotspots	(free	can	be	become	very	expensive)
What	can	we	do?
• Invest	in	security!
• Consider	(as	in	doing!)	regular:
– Security	audits
– Penetration	tests
– Vulnerability	analysis
• Seek	help	for	experts	in	the	field	to	help	to	improve	security
• Keep	informed	(training,	conferences,	articles,	books,	…)
• Don’t	facilitate	(weak	passwords,	use	of	same	password,	…)
What	can	we	do?
• There	must	be	no	at	home	and	at	the	office	attitude.	Security	
awareness	must	always	be	present.
• Read	before	you	‘click’.
• Search,	ask.	
• Security	must	be	seen	as	a	whole!	The	mainframe	is	part	of	an	
ecosystem	of	other	systems	and	platforms.
• Ultimately,	if	this	is	too	much.	Just	switch	off	every	electronical	
device	and	go	back	to	pen	and	paper.
What	can	we	do?
Before	We	Go
Before	we	go	– Remember!!
• Be	mindful • Be	aware
Questions?
Rui	Miguel	Feio
RSM	Partners	
ruif@rsmpartners.com
mobile:	+44	(0)	7570	911459
www.rsmpartners.com
Contact

More Related Content

What's hot

2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)Rui Miguel Feio
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Rui Miguel Feio
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber securityWilliam Mathews
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Michele Marius
 
Data Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budgetData Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budgetFlaskdata.io
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Role of it governance cyberfrat
Role of it governance cyberfratRole of it governance cyberfrat
Role of it governance cyberfratNanda Mohan Shenoy
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
Senior Management Awareness presetnation
Senior Management Awareness presetnationSenior Management Awareness presetnation
Senior Management Awareness presetnationNanda Mohan Shenoy
 

What's hot (20)

2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Resume
ResumeResume
Resume
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
 
Data Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budgetData Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budget
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Role of it governance cyberfrat
Role of it governance cyberfratRole of it governance cyberfrat
Role of it governance cyberfrat
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Senior Management Awareness presetnation
Senior Management Awareness presetnationSenior Management Awareness presetnation
Senior Management Awareness presetnation
 

Similar to (2017) Cybercrime, Inc. (v3.2)

The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)Rui Miguel Feio
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlPrecisely
 
ERP Software
ERP SoftwareERP Software
ERP SoftwareBrrinnam
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Modiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant world
 
Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro Kassem IT
 
About our services
About our servicesAbout our services
About our servicesAmey Mokashi
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...Euro Consulting EMEA Limited
 
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers Precisely
 
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...sunsmart-chennai
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Prabir Saha
 
Sc Overview
Sc OverviewSc Overview
Sc Overviewchrisre
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...LINE Corporation
 

Similar to (2017) Cybercrime, Inc. (v3.2) (20)

The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan Riehl
 
ERP Software
ERP SoftwareERP Software
ERP Software
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Modiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in Dubai
 
Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro
 
About our services
About our servicesAbout our services
About our services
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
 
Software profile
Software profileSoftware profile
Software profile
 
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
 
QArea
QAreaQArea
QArea
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
Sc Overview
Sc OverviewSc Overview
Sc Overview
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
 

More from Rui Miguel Feio

RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)Rui Miguel Feio
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)Rui Miguel Feio
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Rui Miguel Feio
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)Rui Miguel Feio
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Rui Miguel Feio
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Rui Miguel Feio
 

More from Rui Miguel Feio (9)

RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
 
Cybercrime Inc. v2.2
Cybercrime Inc. v2.2Cybercrime Inc. v2.2
Cybercrime Inc. v2.2
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
 

Recently uploaded

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxAnkitscribd
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 

Recently uploaded (14)

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 

(2017) Cybercrime, Inc. (v3.2)