Tackling the cyber security threat (2016 - v1.0)

Rui Miguel Feio
Rui Miguel FeioSenior Technical Lead at RSM Partners
Rui Miguel FeioSharing knowledge with the world
TACKLING THE CYBER
SECURITY THREAT
Business	Accelerator	Event	(2016)
Rui Miguel FeioSharing knowledge with the world
RUI MIGUEL FEIO
• Working	with	computers	since	9	years	old,	back	in	1984
• Worked	for	Citibank, IBM,	Xerox
• Worked	with	many	Blue	Chip	companies	around	the	world
• Specialises in	Cyber	Security
• Experience	in	different	systems(Mainframe,	Linux,	Windows,	Unix,…)
• Works	with	RSM	Partners	as	a	Senior	Technical	Lead
• Gives	lectures	and	presentations	all	over	the	world
Key facts:
CYBER SECURITY CONSULTANT
Rui Miguel FeioSharing knowledge with the world
The ”online world” is
worth trillions of British
Pounds and it’s being
targeted by the criminal
world.
But How Safe is It?
Almost every
business requires an
online presence
today
Online Presence
20
%
30
%
25
%
40
%
30
%
Contact people / institutions
Customers
Online Education
Social Media
Collaboration
E-commerce
Institutions
Increase Revenue
Security
Business Goals
World Wide Markets
New Ideas
Internet Search
YOUR BUSINESS ONLINE
Rui Miguel FeioSharing knowledge with the world
ONLINE SECURITY THREATS
Risks
Virus
X-Site	
Scripting
Spoofing
Denial-of-Service attack is a cyber-attack
where the perpetrator seeks to make a
machine or network resource unavailable to
its intended users.
Malicious Software is a computer program
designed to infiltrate and damage computers
without the users consent. It’s the general term
covering all the different types of threats to your
computer such as viruses, spyware, worms,
trojans, rootkits and so on.
Virus is a program or piece of code that is loaded onto your
computer without your knowledge and runs against your wishes.
Phishing is the attempt to obtain sensitive information
such as usernames, passwords, and confidential data,
often for malicious reasons, by masquerading as a
trustworthy entity in an electronic communication.
Ransomware is a type of malicious software designed
to block access to a computer system until a sum of
money is paid.
Cross-site Scripting (XSS) refers to client-
side code injection attack wherein an
attacker can execute malicious scripts into a
legitimate website or web application.
Spoofing is the act of falsifying the origin of an
internet communication in order to mislead the
recipient. It's widely used to create bogus emails
or web pages in order to steal money, passwords
or banking credentials.
Rui Miguel FeioSharing knowledge with the world
The	data	breach	cost	per	record	
is	in	average	of	$154	(USD)	
world	wide.	In	the	UK,	the	
average	cost	per	record	is	of	
$159	(USD)	/	£128	(GBP).
$154
COST PER RECORD
The	most	targeted	sector	by	
attackers	was	the	Healthcare,	
followed	by	Education,	Financial,	
Services,	Life	Science,	Retail,	
Communications,	Industrial,	
Energy	and	Technology.
HEALTH
TARGETED SECTOR
The	global	average	number	of	
breached	records	was	23,834.	In	
the	UK,	the	average	number	was	
of		22,759	breached	records.
23,834
RECORDS BREACHED
Globally,	malicious	or	criminal	
attacks	accounted	for	48%	of	the	
root	cause	of	the	data	breach,	
followed	by	27%	for	system	glitch	
and	25%	for	human	error.	In	the	
UK	these	numbers	were	51%,	24%,	
and	25%	respectively.	
48%
ROOT CAUSE
2016 RESEARCH
* Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC June 2016
Rui Miguel FeioSharing knowledge with the world
01
HACKERS
The	term	hacker	is	used	in	popular	
media	to	describe	someone	who	
attempts	to	break	into	computer	
systems.	Typically,	this	kind	of	
hacker	would	be	a	proficient	
programmer	or	engineer	with	
sufficient	technical	knowledge	to	
understand	the	weak	points	in	a	
security	system.
02
CRIMINAL ORGS
Criminal	activities	carried	out	by	
criminal	organisations by	means	of	
computers	or	the	Internet.
03
HACKTIVISTS
Hacktivist	is	a	person	who	gains	
unauthorised access	to	computer	
files	or	networks	in	order	to	further	
social	or	political	ends.
04
NATION STATES
The	Nation	State	actor	has	a	
'Licence to	Hack'.	They	work	for	a	
government	to	disrupt	or	
compromise	target	governments,	
organisations or	individuals	to	gain	
access	to	valuable	data	or	
intelligence,	and	can	create	
incidents	that	have	international	
significance.
05
CYBER TERRORISTS
A	cyber-terrorist	is	a	criminal	who	
uses	computer	technology	and	the	
Internet,	especially	to	cause	fear	
and	disruption.	Some	cyber-
terrorists	spread	computer	viruses,	
and	others	threaten	people,	
organisations and	nations	
electronically.
‘ACTORS’ OF THE ONLINE THREATS
Rui Miguel FeioSharing knowledge with the world
INTERNET OF THINGS
IoT
Manufacturers of the IoT
devies are under
pressure to release new
gadgets with new
functionalities to an ever
more demanding
customer. However,
security is not greatly
taken in consideration
which creates security
risks to individuals,
organisations and
governments.
Security Risk
There are currently
6.4 billion IoT
devices connected to
the internet. It’s
estimated that by
2020, there will be
20 to 50 billion IoT
devices connected to
the internet.
Internet of Things
Rui Miguel FeioSharing knowledge with the world
MOBILITY
• Mobile devices are moving targets
• Most mobile devices are easy to hack
and compromise
• Mobile devices may contain private
and business data
• Hackers ‘love’ mobile devices
• If compromised, they can become entry
points to your home or business IT
network
The Downside
• Being able to access data and do
business wherever you are is a major
advantage and a requirement in the
modern world.
Mobility is Good
• Old devices
• Operating system not up-to-date
• Apps can leak and collect personal
data
• Connected to ‘dubious’ free WiFi spots
• Devices not protected with access
credentials
Risks and Threats
Rui Miguel FeioSharing knowledge with the world
THE DARK WEB
Dark	Web
Accessible only through special browsers like
TOR, that are designed for anonymity.
Website addresses are not in clear text (e.g.
http://3g2upl4pq6kufc4m.onion)
You can get access to drugs, weapons, illegal
information, hacking tools, hackers, criminals,
credit cards details, private confidential data,
login credentials, etc.
Internet
The visible internet that we see when
we browse. E.g. Google, Facebook,
BBC, company websites, etc.
Rui Miguel FeioSharing knowledge with the world
BE PROACTIVEBE AWAREBE MINDFUL
THREE Bs TO BE SECUREDThese	are	the	3	Bs to	help	you	be	secured	in	the	cyber	world.	Be	mindful	of	what	you	do;	always	question	if	you	
should	click	on	a	link,	on	an	option,	if	you	should	open	a	document,	the	source	of	the	document	or	email.	Be	aware	
of	the	security	risks;	keep	informed,	ask	questions.	Don’t	put	yourself	and	your	business	at	risk.	Be	proactive.	Don’t	
wait	until	your	systems	are	compromised.	Keep	them	up-to-date	with	the	latest	versions	of	the	operating	system,	
and	software.	Apply	the	security	fixes.	Have	a	firewall	and	an	anti-virus	and	keep	them	updated.	Ask	for	professional,	
experienced	help.	In	the	long	run	this	can	save	you	a	lot	of	money!!
WHAT TO DO
Rui Miguel FeioSharing knowledge with the world
CONTACTS
UK ruif@rmfconsulting.com
+44	(0)7570	911459
www.RuiFeio.com
t
f g
l
ADDRESS EMAIL SOCIAL MEDIA
twitter.com/rfeio
facebook.com/RuiMiguelFeio
linkedin.com/in/rfeio
google.com/+RuiMiguelFeio
1 of 11

Recommended

Cyber Crime - The New World Order (v1.0 - 2016) by
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
728 views43 slides
2017 - Cibersecurity v1.0 (English version) by
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)Rui Miguel Feio
802 views47 slides
Telecom security issues (Raoul Chiesa, day 1 ) by
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
2.8K views80 slides
John Yessis - Telecom and Security by
John Yessis - Telecom and Security John Yessis - Telecom and Security
John Yessis - Telecom and Security John Yessis
299 views7 slides
CyberTerrorism - A case study for Emergency Management by
CyberTerrorism - A case study for Emergency ManagementCyberTerrorism - A case study for Emergency Management
CyberTerrorism - A case study for Emergency ManagementRicardo Reis
4K views37 slides
ISOC and GSMA: Shared Futures, Global Opportunities by
ISOC and GSMA: Shared Futures, Global OpportunitiesISOC and GSMA: Shared Futures, Global Opportunities
ISOC and GSMA: Shared Futures, Global OpportunitiesInternet Society
348 views14 slides

More Related Content

What's hot

Cyber Hygiene by
Cyber HygieneCyber Hygiene
Cyber HygieneGAURAV. H .TANDON
8K views63 slides
State of IT security 2012 by
State of IT security 2012State of IT security 2012
State of IT security 2012Arun Bhatia
222 views8 slides
Cyberterrorism. Past, Present, Future by
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
215 views22 slides
002-MAVIS - International agreements to combat electronic crimes by
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimesMichalis Mavis, MSc, MSc
156 views15 slides
Cyber security Awareness: In perspective of Bangladesh by
Cyber security Awareness: In perspective of Bangladesh Cyber security Awareness: In perspective of Bangladesh
Cyber security Awareness: In perspective of Bangladesh Bangladesh Network Operators Group
4.2K views25 slides

What's hot(20)

State of IT security 2012 by Arun Bhatia
State of IT security 2012State of IT security 2012
State of IT security 2012
Arun Bhatia222 views
Cyberterrorism. Past, Present, Future by Priyanka Aash
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
Priyanka Aash215 views
The Real Deal #bigdata #bigprivacy #oyod Own Your Own Data by Bruno Segers
The Real Deal #bigdata #bigprivacy #oyod Own Your Own DataThe Real Deal #bigdata #bigprivacy #oyod Own Your Own Data
The Real Deal #bigdata #bigprivacy #oyod Own Your Own Data
Bruno Segers581 views
Cyberterrorism - Conflict in Cyberspace by Dr David Probert
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert1.1K views
Cyber defence sebagai garda terdepan ketahanan nasional by Edi Suryadi
Cyber defence sebagai garda terdepan ketahanan nasionalCyber defence sebagai garda terdepan ketahanan nasional
Cyber defence sebagai garda terdepan ketahanan nasional
Edi Suryadi3.1K views
Infosecurity 2012 Banja Luka by zigix
Infosecurity 2012 Banja Luka Infosecurity 2012 Banja Luka
Infosecurity 2012 Banja Luka
zigix356 views
Group 4 ancillaries_draft_3 by Jayde-Marie
Group 4 ancillaries_draft_3Group 4 ancillaries_draft_3
Group 4 ancillaries_draft_3
Jayde-Marie148 views
Steps and Tips to Protect Yourself and your Private Information while Online.... by Abzetdin Adamov
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov1.4K views
Webinar - Cyber Hygiene: Stay Clean at Work and at Home by WPICPE
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE1.1K views
Profile Of The Worlds Top Hackers Webinar Slides 063009 by Lumension
Profile Of The Worlds Top Hackers Webinar Slides 063009Profile Of The Worlds Top Hackers Webinar Slides 063009
Profile Of The Worlds Top Hackers Webinar Slides 063009
Lumension2.8K views
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian... by AIIM International
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
AIIM International10.3K views
How can social technologies be used to drive processes and innovation? by John Mancini
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
John Mancini1.3K views

Viewers also liked

2016 Symantec Internet Security Threat Report by
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat ReportRapidSSLOnline.com
1.2K views81 slides
Big Data Analytics for Cyber Security: A Quick Overview by
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewFemi Ashaye
2.7K views8 slides
RACF - The Basics (v1.2) by
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)Rui Miguel Feio
7.5K views53 slides
When Ransomware Attacks: Emergency Measures to Save Your Business by
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your BusinessKaspersky Lab
360 views14 slides
The Phishing Ecosystem by
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
2.1K views47 slides
Threat Detection as presented at the 2016 DGI Cyber security Conference by
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceSolarWinds
782 views16 slides

Viewers also liked(16)

2016 Symantec Internet Security Threat Report by RapidSSLOnline.com
2016 Symantec Internet Security Threat Report2016 Symantec Internet Security Threat Report
2016 Symantec Internet Security Threat Report
RapidSSLOnline.com1.2K views
Big Data Analytics for Cyber Security: A Quick Overview by Femi Ashaye
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
Femi Ashaye2.7K views
When Ransomware Attacks: Emergency Measures to Save Your Business by Kaspersky Lab
When Ransomware Attacks: Emergency Measures to Save Your BusinessWhen Ransomware Attacks: Emergency Measures to Save Your Business
When Ransomware Attacks: Emergency Measures to Save Your Business
Kaspersky Lab360 views
Threat Detection as presented at the 2016 DGI Cyber security Conference by SolarWinds
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
SolarWinds782 views
Ransomware: 2016's Greatest Malware Threat by Eric Vanderburg
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg316 views
Firm Analysis power point by steven banek
Firm Analysis power pointFirm Analysis power point
Firm Analysis power point
steven banek1.7K views
BHP Billiton - The New Era of Shale by Michael Dillard
BHP Billiton - The New Era of ShaleBHP Billiton - The New Era of Shale
BHP Billiton - The New Era of Shale
Michael Dillard5K views
The New Threat on Campus: Ransomware Locks Down Education by Code42
The New Threat on Campus: Ransomware Locks Down EducationThe New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down Education
Code421.1K views
Protecting Against Ransomware by Symantec
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
Symantec485 views
6 Must Have Technologies For Every Accounting Professional by Deepanshu Gahlaut
6 Must Have Technologies For Every Accounting Professional6 Must Have Technologies For Every Accounting Professional
6 Must Have Technologies For Every Accounting Professional
Deepanshu Gahlaut1.7K views
One roof solution - HR & Accounts by Irfan Momin
One roof solution - HR & AccountsOne roof solution - HR & Accounts
One roof solution - HR & Accounts
Irfan Momin126 views
CSW2017 jun li_car anomaly detection by CanSecWest
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detection
CanSecWest2K views
Phishing Forensics - SnowFROC - Denver Chapter of OWASP by Frank Victory
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Frank Victory239 views

Similar to Tackling the cyber security threat (2016 - v1.0)

Cyber security by
Cyber securityCyber security
Cyber securityRishav Sadhu
5.8K views16 slides
Cybercrime by
CybercrimeCybercrime
CybercrimeMobeenaJavid
76 views7 slides
Security On The Internet Essay by
Security On The Internet EssaySecurity On The Internet Essay
Security On The Internet EssayCheap Custom Written Papers Glenville
8 views24 slides
THESIS-2(2) by
THESIS-2(2)THESIS-2(2)
THESIS-2(2)Elsayed Muhammad
257 views65 slides
Cyberspace by
CyberspaceCyberspace
CyberspaceUtchi
20.3K views17 slides
Cyber crime by
Cyber crimeCyber crime
Cyber crimeMd. Atiqur Rahman
3K views46 slides

Similar to Tackling the cyber security threat (2016 - v1.0)(20)

Cyberspace by Utchi
CyberspaceCyberspace
Cyberspace
Utchi20.3K views
Team 3_Final Project.docx by MarcusBrown87
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
MarcusBrown87147 views
111cyber crimes by rinushalu
111cyber crimes111cyber crimes
111cyber crimes
rinushalu69 views
Five Network Security Threats And How To Protect Your Business Wp101112 by Erik Ginalick
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick345 views
5 network-security-threats by ReadWrite
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite1.2K views
"Cyber crime", or computer-oriented crime..!! by amit_shanu
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
amit_shanu194 views
Top 5 Cybersecurity Threats in Retail Industry by Seqrite
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite795 views
cyber_crime (1).pptx by KoukiGaz
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz6 views

More from Rui Miguel Feio

(2019) Hack All the Way Through From Fridge to Mainframe (v0.2) by
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
621 views45 slides
(2017) GDPR – What Does It Mean For The Mainframe v0.2 by
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
748 views37 slides
(2017) Cybercrime, Inc. (v3.2) by
(2017) Cybercrime, Inc. (v3.2)(2017) Cybercrime, Inc. (v3.2)
(2017) Cybercrime, Inc. (v3.2)Rui Miguel Feio
422 views47 slides
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 by
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
2K views48 slides
2017 - Data Privacy and GDPR (v1.1) by
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)Rui Miguel Feio
460 views31 slides
Network and Endpoint Security v1.0 (2017) by
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Rui Miguel Feio
1.5K views32 slides

More from Rui Miguel Feio(18)

(2019) Hack All the Way Through From Fridge to Mainframe (v0.2) by Rui Miguel Feio
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
Rui Miguel Feio621 views
(2017) GDPR – What Does It Mean For The Mainframe v0.2 by Rui Miguel Feio
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
Rui Miguel Feio748 views
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 by Rui Miguel Feio
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
Rui Miguel Feio2K views
2017 - Data Privacy and GDPR (v1.1) by Rui Miguel Feio
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
Rui Miguel Feio460 views
Network and Endpoint Security v1.0 (2017) by Rui Miguel Feio
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
Rui Miguel Feio1.5K views
2017 - Ciberseguranca v1.0 (versao em Portugues) by Rui Miguel Feio
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
Rui Miguel Feio507 views
Security Audit on the Mainframe (v1.0 - 2016) by Rui Miguel Feio
Security Audit on the Mainframe (v1.0 - 2016)Security Audit on the Mainframe (v1.0 - 2016)
Security Audit on the Mainframe (v1.0 - 2016)
Rui Miguel Feio869 views
How to Improve RACF Performance (v0.2 - 2016) by Rui Miguel Feio
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
Rui Miguel Feio1.3K views
Mainframe Security - It's not just about your ESM v2.2 by Rui Miguel Feio
Mainframe Security - It's not just about your ESM v2.2Mainframe Security - It's not just about your ESM v2.2
Mainframe Security - It's not just about your ESM v2.2
Rui Miguel Feio798 views
Challenges of Outsourcing the Mainframe (v1.2) by Rui Miguel Feio
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
Rui Miguel Feio538 views
How to Protect Your Mainframe from Hackers (v1.0) by Rui Miguel Feio
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
Rui Miguel Feio1K views
IOT & BYOD – The New Security Risks (v1.1) by Rui Miguel Feio
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
Rui Miguel Feio815 views
The Billion Dollar Product - Online Privacy (v2.2) by Rui Miguel Feio
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
Rui Miguel Feio341 views
Cyber security and the mainframe (v1.3) by Rui Miguel Feio
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
Rui Miguel Feio939 views
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3) by Rui Miguel Feio
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Rui Miguel Feio634 views
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5) by Rui Miguel Feio
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Rui Miguel Feio1.3K views

Recently uploaded

Zero to Automated in Under a Year by
Zero to Automated in Under a YearZero to Automated in Under a Year
Zero to Automated in Under a YearNetwork Automation Forum
15 views23 slides
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdfDr. Jimmy Schwarzkopf
19 views29 slides
Transcript: The Details of Description Techniques tips and tangents on altern... by
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...BookNet Canada
136 views15 slides
handbook for web 3 adoption.pdf by
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
22 views16 slides
STPI OctaNE CoE Brochure.pdf by
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdfmadhurjyapb
14 views1 slide
HTTP headers that make your website go faster - devs.gent November 2023 by
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
22 views151 slides

Recently uploaded(20)

STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada136 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Serverless computing with Google Cloud (2023-24) by wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri16 views
The details of description: Techniques, tips, and tangents on alternative tex... by BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada127 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst478 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院

Tackling the cyber security threat (2016 - v1.0)

  • 1. Rui Miguel FeioSharing knowledge with the world TACKLING THE CYBER SECURITY THREAT Business Accelerator Event (2016)
  • 2. Rui Miguel FeioSharing knowledge with the world RUI MIGUEL FEIO • Working with computers since 9 years old, back in 1984 • Worked for Citibank, IBM, Xerox • Worked with many Blue Chip companies around the world • Specialises in Cyber Security • Experience in different systems(Mainframe, Linux, Windows, Unix,…) • Works with RSM Partners as a Senior Technical Lead • Gives lectures and presentations all over the world Key facts: CYBER SECURITY CONSULTANT
  • 3. Rui Miguel FeioSharing knowledge with the world The ”online world” is worth trillions of British Pounds and it’s being targeted by the criminal world. But How Safe is It? Almost every business requires an online presence today Online Presence 20 % 30 % 25 % 40 % 30 % Contact people / institutions Customers Online Education Social Media Collaboration E-commerce Institutions Increase Revenue Security Business Goals World Wide Markets New Ideas Internet Search YOUR BUSINESS ONLINE
  • 4. Rui Miguel FeioSharing knowledge with the world ONLINE SECURITY THREATS Risks Virus X-Site Scripting Spoofing Denial-of-Service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users. Malicious Software is a computer program designed to infiltrate and damage computers without the users consent. It’s the general term covering all the different types of threats to your computer such as viruses, spyware, worms, trojans, rootkits and so on. Virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Phishing is the attempt to obtain sensitive information such as usernames, passwords, and confidential data, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. Cross-site Scripting (XSS) refers to client- side code injection attack wherein an attacker can execute malicious scripts into a legitimate website or web application. Spoofing is the act of falsifying the origin of an internet communication in order to mislead the recipient. It's widely used to create bogus emails or web pages in order to steal money, passwords or banking credentials.
  • 5. Rui Miguel FeioSharing knowledge with the world The data breach cost per record is in average of $154 (USD) world wide. In the UK, the average cost per record is of $159 (USD) / £128 (GBP). $154 COST PER RECORD The most targeted sector by attackers was the Healthcare, followed by Education, Financial, Services, Life Science, Retail, Communications, Industrial, Energy and Technology. HEALTH TARGETED SECTOR The global average number of breached records was 23,834. In the UK, the average number was of 22,759 breached records. 23,834 RECORDS BREACHED Globally, malicious or criminal attacks accounted for 48% of the root cause of the data breach, followed by 27% for system glitch and 25% for human error. In the UK these numbers were 51%, 24%, and 25% respectively. 48% ROOT CAUSE 2016 RESEARCH * Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC June 2016
  • 6. Rui Miguel FeioSharing knowledge with the world 01 HACKERS The term hacker is used in popular media to describe someone who attempts to break into computer systems. Typically, this kind of hacker would be a proficient programmer or engineer with sufficient technical knowledge to understand the weak points in a security system. 02 CRIMINAL ORGS Criminal activities carried out by criminal organisations by means of computers or the Internet. 03 HACKTIVISTS Hacktivist is a person who gains unauthorised access to computer files or networks in order to further social or political ends. 04 NATION STATES The Nation State actor has a 'Licence to Hack'. They work for a government to disrupt or compromise target governments, organisations or individuals to gain access to valuable data or intelligence, and can create incidents that have international significance. 05 CYBER TERRORISTS A cyber-terrorist is a criminal who uses computer technology and the Internet, especially to cause fear and disruption. Some cyber- terrorists spread computer viruses, and others threaten people, organisations and nations electronically. ‘ACTORS’ OF THE ONLINE THREATS
  • 7. Rui Miguel FeioSharing knowledge with the world INTERNET OF THINGS IoT Manufacturers of the IoT devies are under pressure to release new gadgets with new functionalities to an ever more demanding customer. However, security is not greatly taken in consideration which creates security risks to individuals, organisations and governments. Security Risk There are currently 6.4 billion IoT devices connected to the internet. It’s estimated that by 2020, there will be 20 to 50 billion IoT devices connected to the internet. Internet of Things
  • 8. Rui Miguel FeioSharing knowledge with the world MOBILITY • Mobile devices are moving targets • Most mobile devices are easy to hack and compromise • Mobile devices may contain private and business data • Hackers ‘love’ mobile devices • If compromised, they can become entry points to your home or business IT network The Downside • Being able to access data and do business wherever you are is a major advantage and a requirement in the modern world. Mobility is Good • Old devices • Operating system not up-to-date • Apps can leak and collect personal data • Connected to ‘dubious’ free WiFi spots • Devices not protected with access credentials Risks and Threats
  • 9. Rui Miguel FeioSharing knowledge with the world THE DARK WEB Dark Web Accessible only through special browsers like TOR, that are designed for anonymity. Website addresses are not in clear text (e.g. http://3g2upl4pq6kufc4m.onion) You can get access to drugs, weapons, illegal information, hacking tools, hackers, criminals, credit cards details, private confidential data, login credentials, etc. Internet The visible internet that we see when we browse. E.g. Google, Facebook, BBC, company websites, etc.
  • 10. Rui Miguel FeioSharing knowledge with the world BE PROACTIVEBE AWAREBE MINDFUL THREE Bs TO BE SECUREDThese are the 3 Bs to help you be secured in the cyber world. Be mindful of what you do; always question if you should click on a link, on an option, if you should open a document, the source of the document or email. Be aware of the security risks; keep informed, ask questions. Don’t put yourself and your business at risk. Be proactive. Don’t wait until your systems are compromised. Keep them up-to-date with the latest versions of the operating system, and software. Apply the security fixes. Have a firewall and an anti-virus and keep them updated. Ask for professional, experienced help. In the long run this can save you a lot of money!! WHAT TO DO
  • 11. Rui Miguel FeioSharing knowledge with the world CONTACTS UK ruif@rmfconsulting.com +44 (0)7570 911459 www.RuiFeio.com t f g l ADDRESS EMAIL SOCIAL MEDIA twitter.com/rfeio facebook.com/RuiMiguelFeio linkedin.com/in/rfeio google.com/+RuiMiguelFeio