Cybercrime Inc. v2.2

Rui Miguel Feio
Rui Miguel FeioSenior Technical Lead at RSM Partners
Delivering	the	best	in	z	services,	software,	hardware	and	training.Delivering	the	best	in	z	services,	software,	hardware	and	training.
World	Class	z	Specialists
Cybercrime,	Inc.
Rui	Miguel	Feio – Technical	Lead
Agenda
• Evolution
• The	next-generation	criminal	organisation
• The	Cybercrime	Inc.	organisation
• Adapt	to	the	new
• Examples
• Technological	targets
• Hackers	– The	bread	and	butter
• Taking	security	seriously	(or	not)
• What	can	we	do?
• Conclusion
• Questions
Introduction
– Technical	lead	at	RSM	Partners
– Been	working	with	mainframes	for	the	past	17	years
– Started	as	an	MVS	Systems	Programmer	with	IBM
– Specialises	in	mainframe	security
– Experience	in	non-mainframe	platforms	as	well
– Been	given	presentations	all	over	the	world
Evolution
In	the	early	years…	not	so	long	ago…
Picture	from	the	short	movie	“KUNG	FURY”
In	the	early	years…	not	so	long	ago…
Technology
• Phones
• PC
• Bulletin	Board	Systems
• Internet
The	‘curious	bunch’
– Phreakers
– Crackers
– Hackers
Today…
In	nowadays…
Technology
• Phones
• PC
• Internet
• Smart	phones
• Tablets
• Dark	Web
• Internet	of	Things	(IoT)
• Advent	of	Robotics
‘Curious	bunch’	turned	Pro
– Phreakers
– Crackers
– Hackers
– Carders
– Nation-states
– Intelligence	Services
– Hacktivists
– Insiders
– Organised	Crime	Groups
Internet,	the	new	frontier
• Tech	evolution	+	Internet	=	New	Business	Opportunities
– Individuals	started	online	businesses
– New	major	companies	have	been	founded:
• Google,	Facebook,	Yahoo,	etc.
– Existing	business	sectors	turned	online	to	increase	their	
earnings:
• Retail,	financial,	insurance,	etc.
Society	has	also	evolved…
• The	internet	allowed	the	creation	of	new	economic	markets	and	
opportunities
• This	new	economic	market	has	no	borders
• A	market	with	hundreds	of	millions	of	users
• An	economic	market	worth…	Trillions	of	Dollars,	Euros,	Pounds…!!
• Many	countries	and	companies	are	now	dependent	on	this	new	
economic	market
Where	there	is	money,	there	is	crime!
• Criminal	gangs	and	organisations	moved	into	the	new	economic	
market:
– Started	recruiting	Hackers
– Started	devising	new	“business	ideas”
– Developed	a	“business	plan”
• Organised	crime	became	professional	in	the	new	internet	world.
Old	boys	in	a	new	age
• Traditional	criminal	organisations	have	‘started’	cybercrime	
divisions:
– Cosa	Nostra	(Italian	Mafia)
– Japanese	Yakuza
– Chinese	Triads
– Russian	Mafia
– Nigerian	mobs
– Mexican	cartels
– …
The	next-generation	of	
criminal	organisation:
CYBERCRIME	INC.
Cybercrime	Inc.
• Highly	profitable	(it’s	always	about	the	money)
• Low	risk	(anonymity	and	geographical	location)
• More	efficient	due	to	technology
• Globally	dispersed,	with	special	concentration	in:
• Ukraine • China • Brazil
• Russia • Indonesia • USA
• Romania • Taiwan • Turkey
• Bulgaria • India • Nigeria
Cybercrime	Inc.
• 80%	of	Hackers	work	with	or	are	part	of	an	organised	crime	group	*
• Highly	organised
• Deeply	sophisticated:
– Business	approach
– Towards	the	‘client’
*	2014	study by	the	Rand	Corporation
Cybercrime	Inc.
Use	typical	corporate	strategies:
– Creative	financing
– Global	logistics
– Supply	chain	management
– ‘Workforce’	management
– ‘Client’	needs
– Business	and	market	analysis
Cybercrime	Inc.	- Business	model	
• Take	advantage	of	‘anonymous’	services	to	advertise	and	sell	their	
‘normal’	products	and	services	online
• Some	of	the	new	‘business’	opportunities:
• Identity	theft
• Intellectual	property	theft
• Trade	secrets
• Industrial	espionage
• Sensitive	data	theft
• Online	extortion
• Financial	crime
• Data	manipulation
Cybercrime	Inc.	- Tactics	used
• Some	of	the	tactics	and	methods	used	by	Cybercrime	Inc:
– Phishing	and	spear	phishing
– Man-in-the-middle
– Vulnerabilities
– Trojan	horse	software
– Spam
– Botnets
– Scareware
– Ransomware
– Malware
– DoS and	DDoS
The	Cybercrime	Inc.	
organisation
A	typical	business	organisation
CEO
CFO
Management
Sales	People
CIO
Management
Researchers Developers Engineers QA	Testers Tech	Support
HR	Director CMO
Management
Distributors Affiliates
The	Cybercrime	Inc.	organisation
CEO
(Boss)
CFO
(Underboss)
Management	
(Lieutenant)
Money	Mules
(Soldiers	&	
Associates)
CIO	
(Underboss)
Management
(Lieutenant)
Researchers	
(Soldiers)
Developers
(Soldiers)
Engineers
(Soldiers)
QA	Testers
(Soldiers)
Tech	Support
(Soldiers)
HR	Director
(Underboss)
CMO	
(Underboss)
Management
(Lieutenant)
Distributors
(Soldiers)
Affiliates
(Associates)
Cybercrime	Inc.	– ‘Business’	roles	(1)
• Chief	Executive	Officer	(CEO)	– Boss
– Responsible	for	decision	making	and	overseeing	operations
• Chief	Financial	Officer	(CFO)	– Underboss
– Deals	with	every	financial	aspect	of	the	cybercrime	org.
• Chief	Information	Officer	(CIO)	- Underboss
– Responsible	for	the	IT	infrastructure	of	the	organization
• Chief	Marketing	Officer	(CMO)	- Underboss
– Designs	effective	advertising	methods	for	products	and	services
Cybercrime	Inc.	– ‘Business’	roles	(2)
• Human	Resources	(HR)	Director	- Underboss
– Recruits	the	criminal	workforce	for	the	organization
• Management	- Lieutenant
– Responsible	for	managing	the	‘criminal’	workforce
• Researchers	- Soldiers
– Look	for	new	exploits	and	‘business’	opportunities
• Developers	&	Engineers	- Soldiers
– The	techies,	aka	the	brains!
Cybercrime	Inc.	– ‘Business’	roles	(3)
• Quality	Assurance	(QA)	Testers	- Soldiers
– Test	all	crimeware to	ensure	it	bypasses	any	security	measures	
of	potential	targets
• Technical	Support	- Soldiers
– Tech	support	to	clients,	affiliates	and	members	of	the	
organization
• Affiliates	- Associates
– Drive	potential	clients	to	Cybercrime	Inc.
Cybercrime	Inc.	– ‘Business’	roles	(4)
• Distributors	– Soldiers
– Help	distribute	malware
• Money	‘Mule’	– Soldiers	&	Associates
– Helps	with	the	money	laundering
Adapt	to	the	new
Cybercrime	Inc.	– Adapts	to	the	New
• Constantly	looking	to	innovate
• Overcome	obstacles
• Meet	market	demands
• Explore	new	‘business’	opportunities
• Use	tools	to	help	measure	levels	of	success	(e.g.	Web	analytics)
Hacking	as	a	service
Some	examples
Cybercrime	Inc.	– Innovative	Inc.
• Innovative	Marketing	Inc.	(aka	IMI)
– Founded	by	Sam	Jain	and	Daniel	Sundin (HQ	in	Ukraine)
– Developed	scareware	rogue	security	programs:
• WinFixer
• WinAntiVirus
– Offices	in	4	continents	with	hundreds	of	employees
– Support	centres	in	Ohio,	Argentina	and	India
– Marketed	products	under	more	than	1,000	different	brands	and	in	9	
languages
– From	2002	to	2008	IMI	generated	hundreds	of	millions	of	dollars	in	
profit.
Cybercrime	Inc.	– Innovative	Inc.
Photograph taken in 2003
BJORN DANIEL SUNDIN
Wire Fraud; Conspiracy to Commit Computer Fraud; Computer Fraud
DESCRIPTION
Alias: David Sundin
Date(s) of Birth Used: August 7, 1978 Place of Birth: Sweden
Hair: Red Eyes: Hazel
Height: 5'10" Weight: 136 pounds
Sex: Male Race: White
Occupation: Internet Entrepreneur Nationality: Swedish
Languages: English, Swedish NCIC: W10511664
REWARD
The FBI is o6ering a reward of up to $20,000 for information leading to the arrest and conviction of Bjorn Daniel Sundin.
REMARKS
Sundin has ties to Sweden and the Ukraine.
CAUTION
Bjorn Daniel Sundin, along with his co-conspirator, Shaileshkumar P. Jain, is wanted for his alleged involvement in an international cybercrime
scheme that caused internet users in more than 60 countries to purchase more than one million bogus software products, resulting in
consumer loss of more than $100 million. It is alleged that from December 2006 to October 2008, through fake advertisements placed on
Cybercrime	Inc.	– RBN
• Russian	Business	Network	(aka	RBN)
– Registered	as	an	internet	site	in	2006
– Based	in	St.	Petersburg,	Russia
– Allegedly	founded	by	the	newphew of	a	powerful	Russian	politician
– Specialises	in:
• Personal	identity	theft	for	resale
• Provides	web	hosting	and	internet	access	to	illegitimate	activities
• DoS attacks
• Delivery	of	exploits	via	fake	anti-spyware	and	anti-malware
• Botnet
Cybercrime	Inc.	– Carbanak Group
• The	Carbanak Group
– Discovered	in	early	2015	by	Kaspersky	Lab
– Used	an	APT-style	campaign	targeting	financial	institutions
– Aim	to	steal	money	from	banks
– Estimated	$1	Billion	dollars	have	been	stolen	in	an	attack	against	100	
banks	and	private	customers
– Targeted	primarily	Russia,	United	States,	Germany,	China	and	Ukraine
Cybercrime	Inc.	– Mexican	Cartels
• Mexican	cartels:
– Targeted	foreign	companies	investing	in	or	with	presence	in	Mexico
– Used	internet	to	identify	high-valued	employees
– Checked	travel	arrangements	to	Mexico
– Replaced	person	at	airport	waiting	for	’high-valued	target’
– Kidnapped	’high-valued	target’
– Demanded	ransom
Cybercrime	Inc.	– Mexican	Cartels
Technological	
Targets
Targeting	- Mobility
• Cybercrime	Inc.	is	focusing	on	mobile	devices:
– Used	by	individuals	on	a	day-to-day	basis:
• Online	banking
• Online	shopping
• Socialising
• Emails
• Store	personal	data
• GPS
– Can	be	easy	to	compromise	and	hack	(e.g.	install	“rootkit”	to	gain	
control	to	all	features	of	the	mobile	device)
Targeting	– The	Cloud
• Cybercrime	Inc.	is	focusing	on	The	Cloud:
– Network	of	computing	resources	
available	online
– The	Cloud	can	be	used	to	store,	manage	
and	process	information
– Companies	are	outsourcing	primary	
business	functions	using	Cloud	services
– Critical	and	confidential	data	is	now	
centralised	in	the	Cloud
– Instead	of	targeting	several	individual	
servers	let’s	focus	on	the	ones	in	the	
cloud	shall	we?
Targeting	- Data
• Cybercrime	Inc.	is	focusing	on	Data:
– Personal	data
– Business	data
– Government	data
– Military	data
– Data	manipulation	and	disinformation:
• Financial	markets
• What	is	displayed	in	our	screens
Targeting	- Internet	of	things	(IoT)
• Cybercrime	Inc.	is	focusing	on	IoT
devices:
– 2013	there	were	13	billion	online	devices
– Cisco	Systems	estimates	50	billion	online	
devices	by	2020
– IoT is	estimated	to	drive	an	additional	
$6.2	trillion	to	the	global	economy	by	
2025	according	to	McKinsey	Global	
Institute
– IoT devices	are	developed	without	having	
security	in	mind
But	Cybercrime	Inc.	can	also	target…
• SCADA	devices
– Supervisory	Control	And	Data	Acquisition	(SCADA)
– Specialised and	often	old	computer	systems
– Being	connected	to	the	broader	internet
– These	systems	were	not	designed	with	security	in	mind
– 2014	study	revealed	that	70%	had	suffered	at	least	one	security	
breach
• GPS	Systems
• Tracking	Systems
• Implanted	medical	devices	(IMDs)
• And	so	many	more!!...
Hackers	– The	bread	
and	butter
Looking	for	a	Hacker
• Hackers	are	not	born	hackers,	they	are	trained
• Enormous	amount	of	free	educational	material	in	the	internet	and	
in	the	underworld	(dark	web)
• PC	games:
– Uplink
– Hacker	Experience
– Torn	City
– Hacknet
– Hackers	(for	iOS	and	Android)
Who	wants	to	be	a	Hacker?
• Anyone	who	feels	attracted	or	enjoys:
– Technology
– Challenge
– The	thrill
– Adventure	
– Danger
– Money
– Respect
– Fame
Taking	security	
seriously	(or	not)
On	a	nice	Sunday	morning…
On	its	TV	screen	facing	the	street
On	a	business	train	trip…
On	a	business	train	trip…
On	a	site,	somewhere	in	Europe…
On	a	site,	somewhere	in	Europe…
What	can	we	do?
What	can	we	do?
• Security	must	be	taken	seriously	by	everyone!
– Governments,	companies,	and	individuals	need	to	be	security	
conscious	and	security	oriented
• Usual	security	recommendations	apply:
– Keep	security	systems	updated	and	up-to-date
– Question	the	origin	of	everything
– Be	mindful	of:
• The	information	you	share	and	make	’publicly’	available
• Free	Wifi hotspots	(free	can	be	become	very	expensive)
What	can	we	do?
• Consider	(as	in	doing!)	regular:
– Security	audits
– Penetration	tests
– Vulnerability	analysis
• Seek	help	for	experts	in	the	field	to	help	to	improve	security
• Keep	informed	(training,	conferences,	articles,	books,	…)
• Don’t	facilitate	(weak	passwords,	use	of	same	password,	…)
What	can	we	do?
• There	must	be	no	at	home	and	at	the	office	attitude.	Security	
awareness	must	always	be	present.
• Read	before	you	‘click’.
• Search,	ask.	
• Ultimately,	if	this	is	too	much.	Just	switch	off	every	electronical	
device	and	go	back	to	pen	and	paper.	But	will	this	be	enough?
Conclusion
Conclusion
• As	always	the	bad	guys	are	ahead	of	the	game:
– They	have	the	money
– They	have	the	resources
– They	are	well	organised
– And	above	all,	they	have	time!
• The	most	important	thing	is	for	every	one	of	us	(the	‘good’	guys)	to	
be	security	aware	and	security	focused
Conclusion
• Ultimately	we	need	to	trust:	
– The	companies	who	sell	us	devices,	and	software
– The	service	providers
– Our	social	network
– The	government
Conclusion	– Most	Important!
• Be	mindful • Be	aware
Questions
Rui	Miguel	Feio,	RSM	Partners	
ruif@rsmpartners.com
mobile:	+44	(0)	7570	911459
linkedin: www.linkedin.com/in/rfeio
www.rsmpartners.com
Contact
1 of 61

Recommended

TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes! by
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!Wayne Norris
103 views31 slides
The Cybersecurity Mess by
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity MessSimson Garfinkel
577 views52 slides
Health Data Encryption: The Seven Principals of Privacy by
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
793 views43 slides
National framework for digital forensics bangladesh context by
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
913 views24 slides
File000154 by
File000154File000154
File000154Desmond Devendran
645 views54 slides
Multimedia digital piracy by
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracyKohinoor Puttawar
2.2K views16 slides

More Related Content

What's hot

Voice security and privacy - Today’s solutions and technologies by
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologiesPrivateWave Italia SpA
1.1K views72 slides
File000159 by
File000159File000159
File000159Desmond Devendran
623 views54 slides
CRI "Lessons From The Front Lines" March 26th Dublin by
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
922 views238 slides
Internet .....History to till now by
Internet .....History to till nowInternet .....History to till now
Internet .....History to till nowknowldge
107 views21 slides
Hackers by
HackersHackers
HackersMohamed Boudchiche
1.2K views25 slides
Piracy by
PiracyPiracy
PiracyManasa Mona
3.5K views10 slides

What's hot(20)

Voice security and privacy - Today’s solutions and technologies by PrivateWave Italia SpA
Voice security and privacy - Today’s solutions and  technologiesVoice security and privacy - Today’s solutions and  technologies
Voice security and privacy - Today’s solutions and technologies
Internet .....History to till now by knowldge
Internet .....History to till nowInternet .....History to till now
Internet .....History to till now
knowldge107 views
The National Security, IP/Trademark, Human Rights and Data Protection Risks o... by Shannon Brandao
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
The National Security, IP/Trademark, Human Rights and Data Protection Risks o...
Shannon Brandao158 views
CST 20363 Session 6 Cyberspace by oudesign
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
oudesign125 views
Legal Research in the Age of Cloud Computing by Neal Axton
Legal Research in the Age of Cloud ComputingLegal Research in the Age of Cloud Computing
Legal Research in the Age of Cloud Computing
Neal Axton453 views
Etical and professional issues of computer by Abdullah Khosa
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
Abdullah Khosa3K views
Prosecuting Cybercrime and Regulating the Web by Darius Whelan
Prosecuting Cybercrime and Regulating the WebProsecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan1.4K views
Privacy & Data Breach: 2012 Recap, 2013 Predictions by Resilient Systems
Privacy & Data Breach: 2012 Recap, 2013 PredictionsPrivacy & Data Breach: 2012 Recap, 2013 Predictions
Privacy & Data Breach: 2012 Recap, 2013 Predictions
Resilient Systems506 views
General Aware Ness On Cyber Security & Ethical by diwakar sharma
General Aware Ness On Cyber Security & EthicalGeneral Aware Ness On Cyber Security & Ethical
General Aware Ness On Cyber Security & Ethical
diwakar sharma902 views
Cyber law by pravin ghosekar by PravinGhosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
PravinGhosekar248 views
advantages and disadvantages of Internet by Ali Şahin
advantages and disadvantages of Internetadvantages and disadvantages of Internet
advantages and disadvantages of Internet
Ali Şahin1.8K views

Viewers also liked

Iconos y botones by
Iconos y botonesIconos y botones
Iconos y botonesLuisMaTu
237 views3 slides
Tawhee by
TawheeTawhee
TawheeFAHIM AKTHAR ULLAL
114 views1 slide
Decreto PMI 113 13 desapropia área da coelba by
Decreto PMI 113 13 desapropia área da coelbaDecreto PMI 113 13 desapropia área da coelba
Decreto PMI 113 13 desapropia área da coelbaGuy Valerio Barros dos Santos
1.7K views2 slides
Derechos De Los Animales by
Derechos De Los Animales Derechos De Los Animales
Derechos De Los Animales José Hernández
530 views11 slides
Santos y beatos argentinos by
Santos y beatos argentinosSantos y beatos argentinos
Santos y beatos argentinosPatricia Molina
823 views2 slides
Actividad V by
Actividad VActividad V
Actividad Vguest834056
286 views4 slides

Viewers also liked(15)

Iconos y botones by LuisMaTu
Iconos y botonesIconos y botones
Iconos y botones
LuisMaTu237 views
El oso panda by JMVILLAA
El oso pandaEl oso panda
El oso panda
JMVILLAA134 views
Agenda 2 by Kity Cano
Agenda 2Agenda 2
Agenda 2
Kity Cano119 views
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I by CA Technologies
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part IPre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part I
CA Technologies1.1K views
TIG_Decker_LoL_OnlineImpulsePurchase by Ethan Decker
TIG_Decker_LoL_OnlineImpulsePurchaseTIG_Decker_LoL_OnlineImpulsePurchase
TIG_Decker_LoL_OnlineImpulsePurchase
Ethan Decker191 views
Log Analytics Optimization by Hortonworks
Log Analytics OptimizationLog Analytics Optimization
Log Analytics Optimization
Hortonworks3.9K views
Coloring page_The Acts of the Apostles_The Gift of the Holy Spirit by MyWonderStudio
Coloring page_The Acts of the Apostles_The Gift of the Holy SpiritColoring page_The Acts of the Apostles_The Gift of the Holy Spirit
Coloring page_The Acts of the Apostles_The Gift of the Holy Spirit
MyWonderStudio1.5K views

Similar to Cybercrime Inc. v2.2

Cyber security lifting the veil of hacking webinar by
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinarAssociation for Project Management
514 views19 slides
2017 - Cibersecurity v1.0 (English version) by
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)Rui Miguel Feio
802 views47 slides
Digital Age-Preparing Yourself by
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourselfjkl0202
45 views13 slides
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t... by
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
565 views42 slides
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ... by
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...John Moylan
95 views25 slides
Cyber Security Awareness at Dadar April 25, 2010 by
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
2.4K views48 slides

Similar to Cybercrime Inc. v2.2(20)

2017 - Cibersecurity v1.0 (English version) by Rui Miguel Feio
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
Rui Miguel Feio802 views
Digital Age-Preparing Yourself by jkl0202
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
jkl020245 views
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t... by Benjamin Ang
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Benjamin Ang565 views
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ... by John Moylan
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
IBC 2016 Presentation - Breaking bad habits - Security Challenges for Public ...
John Moylan95 views
Cyber Security Awareness at Dadar April 25, 2010 by Vicky Shah
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
Vicky Shah2.4K views
Online Security and How to Make Money Online by Nader Alkeinay
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay551 views
Cyber security best practices by John Moylan
Cyber security best practicesCyber security best practices
Cyber security best practices
John Moylan178 views
Isaca june 19, 2010 by Vicky Shah
Isaca june 19, 2010Isaca june 19, 2010
Isaca june 19, 2010
Vicky Shah9.4K views
Cyber Crime Cyber Space and Effects .pptx by SahilMishra81
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra8116 views
Cyber Crime, Cyber Space and Effects .pptx by SahilMishra81
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra8155 views
Stop in the name of norton by spkiely
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
spkiely163 views
Stop in the name of norton by wacko07
Stop in the name of nortonStop in the name of norton
Stop in the name of norton
wacko07210 views
CYBER CRIME AND SECURITY by Chaya Sorir
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir665 views
How the Surveillance State Changes IT Security Forever by Richard Stiennon
How the Surveillance State Changes IT Security ForeverHow the Surveillance State Changes IT Security Forever
How the Surveillance State Changes IT Security Forever
Richard Stiennon23.9K views
Gus Hunt's Work-Bench Enterprise Security Summit Keynote by Work-Bench
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Work-Bench3.6K views
Cybercrimeandforensic 120828021931-phpapp02 by Gol D Roger
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger305 views
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2) by Rui Miguel Feio
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Rui Miguel Feio621 views

More from Rui Miguel Feio

(2017) GDPR – What Does It Mean For The Mainframe v0.2 by
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
748 views37 slides
(2017) Cybercrime, Inc. (v3.2) by
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)Rui Miguel Feio
422 views47 slides
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 by
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
2K views48 slides
2017 - Data Privacy and GDPR (v1.1) by
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)Rui Miguel Feio
460 views31 slides
Network and Endpoint Security v1.0 (2017) by
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Rui Miguel Feio
1.5K views32 slides
RACF - The Basics (v1.2) by
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)Rui Miguel Feio
7.5K views53 slides

More from Rui Miguel Feio(19)

(2017) GDPR – What Does It Mean For The Mainframe v0.2 by Rui Miguel Feio
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
Rui Miguel Feio748 views
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 by Rui Miguel Feio
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
Rui Miguel Feio2K views
2017 - Data Privacy and GDPR (v1.1) by Rui Miguel Feio
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
Rui Miguel Feio460 views
Network and Endpoint Security v1.0 (2017) by Rui Miguel Feio
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
Rui Miguel Feio1.5K views
2017 - Ciberseguranca v1.0 (versao em Portugues) by Rui Miguel Feio
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
Rui Miguel Feio507 views
Tackling the cyber security threat (2016 - v1.0) by Rui Miguel Feio
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
Rui Miguel Feio474 views
Cyber Crime - The New World Order (v1.0 - 2016) by Rui Miguel Feio
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
Rui Miguel Feio728 views
Security Audit on the Mainframe (v1.0 - 2016) by Rui Miguel Feio
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)
Rui Miguel Feio869 views
How to Improve RACF Performance (v0.2 - 2016) by Rui Miguel Feio
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
Rui Miguel Feio1.3K views
Mainframe Security - It's not just about your ESM v2.2 by Rui Miguel Feio
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2
Rui Miguel Feio798 views
Challenges of Outsourcing the Mainframe (v1.2) by Rui Miguel Feio
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
Rui Miguel Feio538 views
How to Protect Your Mainframe from Hackers (v1.0) by Rui Miguel Feio
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
Rui Miguel Feio1K views
IOT & BYOD – The New Security Risks (v1.1) by Rui Miguel Feio
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
Rui Miguel Feio815 views
The Billion Dollar Product - Online Privacy (v2.2) by Rui Miguel Feio
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
Rui Miguel Feio341 views
Cyber security and the mainframe (v1.3) by Rui Miguel Feio
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
Rui Miguel Feio939 views
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3) by Rui Miguel Feio
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Rui Miguel Feio634 views
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5) by Rui Miguel Feio
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Rui Miguel Feio1.3K views

Recently uploaded

information by
informationinformation
informationkhelgishekhar
8 views4 slides
WEB 2.O TOOLS: Empowering education.pptx by
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 views16 slides
Is Entireweb better than Google by
Is Entireweb better than GoogleIs Entireweb better than Google
Is Entireweb better than Googlesebastianthomasbejan
12 views1 slide
Building trust in our information ecosystem: who do we trust in an emergency by
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
98 views18 slides
PORTFOLIO 1 (Bret Michael Pepito).pdf by
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
8 views6 slides
Marketing and Community Building in Web3 by
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
12 views64 slides

Recently uploaded(12)

Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat98 views
PORTFOLIO 1 (Bret Michael Pepito).pdf by brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04108 views
Marketing and Community Building in Web3 by Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast12 views
We see everywhere that many people are talking about technology.docx by ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 views
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train9 views
UiPath Document Understanding_Day 3.pptx by UiPathCommunity
UiPath Document Understanding_Day 3.pptxUiPath Document Understanding_Day 3.pptx
UiPath Document Understanding_Day 3.pptx
UiPathCommunity103 views
IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC244 views
How to think like a threat actor for Kubernetes.pptx by LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 views

Cybercrime Inc. v2.2