SlideShare a Scribd company logo
1 of 47
Download to read offline
Delivering	the	best	in	z	services,	software,	hardware	and	training.Delivering	the	best	in	z	services,	software,	hardware	and	training.
Delivering	the	best	in	z	services,	skills,	security	and	software.
Cybercrime,	Inc.
Agenda
• Introductions
• Criminals	and	criminal	organisations
• Cyber	Crime
• Cybercrime,	Inc.
• Hacking	for	Profit
• Being	a	Hacker
• Mainframe	– The	Crown	Jewel
• What	Can	We	Do?
• Before	We	Go
• Questions	and	Answers… maybe…
Who	am	I?	A	quick	introduction…
RUI	MIGUEL	FEIO
• Senior	Technical	Lead	at	RSM	Partners
• Based	in	the	UK	but	travels	all	over	the	world
• 18	years	experience working	with	mainframes
• Started	with	IBM	as	an	MVS	Sys	Programmer
• Specialist	in	mainframe	security
• Experience	in	other	platforms
Introducing	RSM	Partners
• Sole	Focus	is	IBM	Mainframe	Services
• IBM	Business	Partner
• World	Leading,	1,000+	Man	Years	Experience
• Run	3	mainframes	in-house
• Working	with	large	financial,	retail	&	utility	companies
• One	area	of	specialism	is	mainframe	security:
– Whole	range	of	services,	Audits,	pen	tests,	migrations	and	
security	remediation	programs
• We	have	a	reputation	for	deliver:
– On	time,	On	budget,	Every	Time
Criminals	and	Criminal	
Organisations
Criminals	from	the	past
Al	Capone Pablo	Escobar
• Some	of	the	most	well	known	criminal	
organisations,	the	“Old	Boys”:
– Cosa	Nostra	(Italian	Mafia)
– Japanese	Yakuza
– Chinese	Triads
– Russian	Mafia
– Nigerian	mobs
– Latin	American	cartels
Criminal	organisations
Why	Crime?
In	the	modern	world
*	https://www.emarketer.com/Article/Worldwide-Retail-Ecommerce-Sales-Will-Reach-1915-Trillion-This-Year/1014369
New	type	of	criminals
https://www.fbi.gov/investigate/cyber/most-wanted
New	type	of	criminals
https://www.fbi.gov/investigate/cyber/most-wanted
New	type	of	criminals
Cyber	Crime
• Highly	profitable	(it’s	always	about	the	money)
• Low	risk	(anonymity	and	geographical	location)
• More	efficient	due	to	technology
• Globally	dispersed,	with	special	concentration	in:
Why	Cyber	Crime?
• Ukraine • China • Brazil
• Russia • Indonesia • USA
• Romania • Taiwan • Turkey
• Bulgaria • India • Nigeria
• They	have	adapted!
• Criminals	and	criminal	organisations	have	adapted	to	the	“new	
modern	world”.
• In	fact,	a	2014	study	from	the	Rand	Corporation	says	that:
“80%	of	hackers	work	with	or	are	part	of	an	organised	crime	group”
• The	“Old	Boys”	have	employed	old	strategies	and	traditional	
business	models	and	created	the	“Cybercrime,	Inc.”.
What	happened	to	the	“Old	Boys”?
Cybercrime,	Inc.
• Cybercrime,	Inc.	is	highly	organised
• Deeply	sophisticated:
– Business	approach
– Towards	the	‘client’
• Uses	typical	corporate	strategies:
– Creative	financing
– Global	logistics
– Supply	chain	and	workforce	management
– Business	and	market	analysis
– Focused	on	the	client’s	needs
Business	Model
• Some	of	the	new	‘business’	opportunities:
• Identity	theft
• Intellectual	property	theft
• Trade	secrets
• Industrial	espionage
• Sensitive	data	theft
• Online	extortion
• Financial	crime
• Data	manipulation
Business	Opportunities
• Some	of	the	tactics	and	methods	used	by	Cybercrime,	Inc.:
– Phishing	and	spear	phishing
– Man-in-the-middle
– Vulnerabilities
– Spam
– Botnets
– Scareware,	Malware	and	Ransomware
– DoS and	DDoS
– …
Tactics	Employed
Typical	Business	Organisation
CEO
CFO
Management
Sales	People
CIO
Management
Researchers Developers Engineers QA	Testers Tech	Support
HR	Director CMO
Management
Distributors Affiliates
Cybercrime,	Inc.	
CEO
(Boss)
CFO
(Underboss)
Management	
(Lieutenant)
Money	Mules
(Soldiers	&	
Associates)
CIO	
(Underboss)
Management
(Lieutenant)
Researchers	
(Soldiers)
Developers
(Soldiers)
Engineers
(Soldiers)
QA	Testers
(Soldiers)
Tech	Support
(Soldiers)
HR	Director
(Underboss)
CMO	
(Underboss)
Management
(Lieutenant)
Distributors
(Soldiers)
Affiliates
(Associates)
• Traditional	desktops	and	servers
• Mobile	devices
• Internet	of	Things	(IoT)	devices
• “Cloud”	systems
• Supervisory	Control	And	Data	Acquisition	(SCADA)	devices
• GPS	Systems
• Tracking	Systems
• Implanted	medical	devices	(IMDs)
• …
• Targeting	data	and	the	ability	to	control	resources
Technological	Targets
Hacking	for	Profit
• Founded	by	Sam	Jain	and	Daniel	Sundin
• Developed	scareware	rogue	security	SW
• Offices	in	4	continents	and	HQ	in	Ukraine
• Support	centres	in	US,	Argentina	and	India
• Marketed	products	under	more	than	1,000	
different	brands	and	in	9	languages
• From	2002	to	2008	IMI	generated	hundreds	
of	millions	of	dollars	in	profit.
IMI	– Innovative	Marketing	Inc.
IMI	– Innovative	Marketing	Inc.
Carbanak Group	(aka	Anunak)
• First	identified	in	early	in	2015	by	Kaspersky	Lab
• Used	an	Advanced	Persistent	Threat	(APT)	
campaign	targeting	financial	institutions
• Estimated	$1	Billion	US	dollars	have	been	stolen	
in	an	attack	against	100	banks	and	private	
customers
• Targeted	primarily	Russia,	United	States,	
Germany,	China	and	Ukraine
Cybercrime,	Inc.	is	Very	Profitable
https://www.scmagazine.com/loss-from-cybercrime-exceeded-13b-in-2016-fbi-report/article/671047/
Being	a	Hacker
• Hackers	are	not	born	hackers,	they	are	trained
• Enormous	amount	of	free	educational	material	in	the	internet	and	
in	the	underworld	(dark	web)
• PC	games:
– Uplink
– Hacker	Experience
– Torn	City
– Hacknet
– Hackers	(for	iOS	and	Android)
Looking	for	a	Hacker
Anyone	who	feels	attracted	or	enjoys:
– Technology
– Challenge
– The	thrill
– Adventure	
– Danger
– Money
– Respect
– Fame
Who	wants	to	be	a	Hacker?
Mainframe	– The	Crown	
Jewel
• The	mainframe	processes	and	stores	larges	volumes	of	data	
• It’s	considered	the	most	secure	platform	in	the	world	that	cannot	
be	hacked
• As	such,	it	does	not	require	big	investments	in	security…
• Unfortunately,	it’s	not	quite	so.	The	truth	is:
• The	mainframe	is	a	platform	that	is	highly	securable	but	not	
secured	by	default.	Investment	and	resources	are	required	to	
secure	it
The	Mainframe
Hacking	the	Mainframe
• Last	month,	did	a	mainframe	security	audit	on	a	financial	institution	
who	has	had	mainframe	security	issues	in	the	past.
• 4	Production	mainframe	systems	were	in	scope.
One	should	learn	from	one’s	mistakes
Classification SYS1 SYS2 SYS3 SYS4
High 42 33 40 36
Medium 28 21 24 27
Low 12 11 12 11
Total	out	of	
89	found
82 65 76 74
The	SWIFT	Hackings
• One	of	the	banks	targeted	by	the	SWIFT	attacks	contacted	RSM	
Partners	to	help	them	securing	the	mainframe.
• Their	mainframe	had	been	compromised… almost	a	year	ago!!!
• First	phase	was	to	do	a	mainframe	security	audit	on	2	of	their	
production	systems.
A	Wake	Up	Call
Classification Score
High 34
Medium 41
Low 18
Total: 93
On	a	Pen	Test	at	one	of	the	top	5	US	banks:
• Client	was	convinced	they	had	a	top	of	the	art	
network	security	system.	
• I	decided	to	unplug	Ethernet	cable	from	one	of	
the	terminals	and	connect	it	to	my	laptop
• This	went	without	detection
• I	was	able	to	run	a	port	scan	on	the	mainframe	
without	detection
• This	was	just	the	beginning!!...
They	Could	Have	Been	Next
On	a	Pen	Test	at	one	of	the	top	5	US	banks:
• Client	was	convinced	they	had	a	top	of	the	art	
network	security	system.	
• I	decided	to	unplug	Ethernet	cable	from	one	of	
the	terminals	and	connect	it	to	my	laptop
• This	went	without	detection
• I	was	able	to	run	a	port	scan	on	the	mainframe	
without	detection
• This	was	just	the	beginning!!...
They	Could	Have	Been	Next
Vulnerabilities
24	high	risk
25	medium	risk
2	low	risk
1. RACF	Database	is	not	adequately	protected
2. RACF	profiles	in	WARNING	mode
3. Excessive	access	to	APF	Libraries
4. Inappropriate	usage	of	z/OS	UNIX	Superuser Privilege,	UID	=	0
5. Dataset	profiles	with	UACC	of	READ	
6. MVS	and	JES2	commands	not	properly	protected
7. SERVAUTH	class	not	active	or	without	proper	profiles	in	place
8. Cryptographic	keys	and	services	not	properly	protected
9. Excessive	number	of	personal	userids with	system	wide	privileges
10. Unix	System	Services	security	being	neglected
What	we	keep	seeing
What	Can	We	Do?
• Security	must	be	taken	seriously	by	everyone!
– Governments,	companies,	and	individuals	need	to	be	security	
conscious	and	security	oriented
• Usual	security	recommendations	apply:
– Keep	security	systems	updated	and	up-to-date
– Question	the	origin	of	everything
– Be	mindful	of:
• The	information	you	share	and	make	’publicly’	available
• Free	Wifi hotspots	(free	can	be	become	very	expensive)
What	can	we	do?
• Invest	in	security!
• Consider	(as	in	doing!)	regular:
– Security	audits
– Penetration	tests
– Vulnerability	analysis
• Seek	help	for	experts	in	the	field	to	help	to	improve	security
• Keep	informed	(training,	conferences,	articles,	books,	…)
• Don’t	facilitate	(weak	passwords,	use	of	same	password,	…)
What	can	we	do?
• There	must	be	no	at	home	and	at	the	office	attitude.	Security	
awareness	must	always	be	present.
• Read	before	you	‘click’.
• Search,	ask.	
• Security	must	be	seen	as	a	whole!	The	mainframe	is	part	of	an	
ecosystem	of	other	systems	and	platforms.
• Ultimately,	if	this	is	too	much.	Just	switch	off	every	electronical	
device	and	go	back	to	pen	and	paper.
What	can	we	do?
Before	We	Go
Before	we	go	– Remember!!
• Be	mindful • Be	aware
Questions?
Rui	Miguel	Feio
RSM	Partners	
ruif@rsmpartners.com
mobile:	+44	(0)	7570	911459
www.rsmpartners.com
Contact

More Related Content

What's hot

2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)Rui Miguel Feio
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Rui Miguel Feio
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber securityWilliam Mathews
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Michele Marius
 
Data Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budgetData Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budgetFlaskdata.io
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Role of it governance cyberfrat
Role of it governance cyberfratRole of it governance cyberfrat
Role of it governance cyberfratNanda Mohan Shenoy
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and FutureJohn Gilligan
 
Senior Management Awareness presetnation
Senior Management Awareness presetnationSenior Management Awareness presetnation
Senior Management Awareness presetnationNanda Mohan Shenoy
 

What's hot (20)

2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
 
Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Resume
ResumeResume
Resume
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
 
Data Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budgetData Security For SMB - Fly first class on a budget
Data Security For SMB - Fly first class on a budget
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Role of it governance cyberfrat
Role of it governance cyberfratRole of it governance cyberfrat
Role of it governance cyberfrat
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Cyber Security: Past and Future
Cyber Security: Past and FutureCyber Security: Past and Future
Cyber Security: Past and Future
 
Senior Management Awareness presetnation
Senior Management Awareness presetnationSenior Management Awareness presetnation
Senior Management Awareness presetnation
 

Similar to (2017) Cybercrime, Inc. (v3.2)

The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)Rui Miguel Feio
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlPrecisely
 
ERP Software
ERP SoftwareERP Software
ERP SoftwareBrrinnam
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Modiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant world
 
Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro Kassem IT
 
About our services
About our servicesAbout our services
About our servicesAmey Mokashi
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...Euro Consulting EMEA Limited
 
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers Precisely
 
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...sunsmart-chennai
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Prabir Saha
 
Sc Overview
Sc OverviewSc Overview
Sc Overviewchrisre
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...LINE Corporation
 

Similar to (2017) Cybercrime, Inc. (v3.2) (20)

The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan Riehl
 
ERP Software
ERP SoftwareERP Software
ERP Software
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Modiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in DubaiModiant World - Top IT Outsourcing Company in Dubai
Modiant World - Top IT Outsourcing Company in Dubai
 
Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro Kassem IT Company Profile - Intro
Kassem IT Company Profile - Intro
 
About our services
About our servicesAbout our services
About our services
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
Euro Consulting EMEA | iGaming Business Solutions | iGaming White Label Solut...
 
Software profile
Software profileSoftware profile
Software profile
 
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
Nagios Conference 2014 - Paloma Galan - Monitoring Financial Protocols With N...
 
QArea
QAreaQArea
QArea
 
How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers How US Cybersecurity Executive Order Impacts IBM i Customers
How US Cybersecurity Executive Order Impacts IBM i Customers
 
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
Sc Overview
Sc OverviewSc Overview
Sc Overview
 
Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...Life as an enterprise security geek from underground. (What enterprises want ...
Life as an enterprise security geek from underground. (What enterprises want ...
 

More from Rui Miguel Feio

RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)Rui Miguel Feio
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)Rui Miguel Feio
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Rui Miguel Feio
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)Rui Miguel Feio
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Rui Miguel Feio
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Rui Miguel Feio
 

More from Rui Miguel Feio (9)

RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
 
Cybercrime Inc. v2.2
Cybercrime Inc. v2.2Cybercrime Inc. v2.2
Cybercrime Inc. v2.2
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
 

Recently uploaded

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 

Recently uploaded (20)

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 

(2017) Cybercrime, Inc. (v3.2)