SlideShare a Scribd company logo
1 of 20
Security a continuous concern for the CIOs
Yugo Neumorni, EMBA, CISA
President, CIO Council
IT Director, Vimetco Management

This presentation, including any supporting materials, is owned by CIO Council Romania and is for the sole use of the intended CIO Council Romania audience or
other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied,
distributed or publicly displayed without the express written permission of CIO Council Romania.
© 2013 CIO Council Romania. All rights reserved.
CIO Council
Security = People + Process + Technology
Best practices for security
-Assessment / Risk analyze.
-Protecting network
-Protecting devices
-Monitoring
How many of you performed a business impact
analyze?
CIO Council
Business impact analyze
Selling cyber security is hard. KPIs and Budgets

The executive should be aware of cyber security.
Policies and Procedures
Security is a culture!
Cyber Security Threats
Why cyber security will remain a key
concern
•

Widespread use of new platform

•

Exploits kits. Increasingly available and easy to use

•

Attacks are becoming more sophisticated and have specific targets

Cyber Security History, Threats, & Solutions – 2013 – Scott Wood http://www.youtube.com/watch?v=n25L89E-lfY
Cyber Security Threats – new platform
Why cyber security will remain a key
concern
•
•
•
•
•

Mobile devices
Improved functionality of smart phones and tablets
Increased use of BYOD policies in the workplace
Mobile device make for an interesting point of attack
Apps a source of malware

Android Malware Infiltrates Google Play
Store, Infects 100K Devices
Cyber Security Threats – new platform
The cloud
A single entry point that can be accessed from almost anywhere
This can be abused in different ways.
• Theft and destruction of data
• DoS attacks
• Hijacking of cloud service traffic and redirecting it to other sources
of malicious content

Cyber Security History, Threats, & Solutions – 2013 – Scott Wood http://www.youtube.com/watch?v=n25L89E-lfY
Cyber Security Threats – new platform
CIO Council
Phishing sites that obtain your login and
password information in order to hijack
your account and scam your friends. (FB,
TW)
Click-jacking - Concealing hyperlinks
beneath legitimate clickable content
which, when clicked, causes a user to
unknowingly perform actions, such as
downloading malware, or sending your
ID to a site.
Poison Application

Personal data exposed and passwords
loss
Scam
CIO Council
Cyber Security – Targeted attacks
• Higher payoff makes cyber attacks more of an
enterprise
– Hacktivist : groups of cyber criminals and/or
protestor that target government and corporate
websites to bring awareness to their cause
– Cyberwar: US 2003, Letonia 2007, Georgia 2008,
Stuxnet Iran 2010
CIO Council
The best practices
• Implement strong Security Policy
• Make Sure Network Security and Firewalls Are In
Place
• Regularly Update Your Network Security Tools
• Employee’s Mobile Phone Apps
• Establish a Incident Response Crisis Plan
• Educate Your Employees
CIO COUNCIL
CIO Council
•
•
•
•
•
•
•
•
•

Established in 2005 by five members
80 active members from large organisations
Membership by invitation only
Monthly meetings
“CIO Council National Conference – March 13,
“Cloud Adoption” 2013 study
CIO Government Office initiative
Co-founder of “Alianta Digitala pentru Romania”
Non-profit organization
CIO Council
CIO Council National Conference
•

More than 250 participants from 120 companies
– 61% CIOs, IT managers, CEOs
– 39% CFO, COO, HR managers, IT industry consultants,
vendors, public sector representatives

•
•
•
•

•

Sponsor free speeches
3 panels
10 hours of elegant experience
Perhaps the most important event in IT Industry in
Romania
www.cioconference.ro
CIO Council National Conference – March 13

CIO Council

www.cioconference.ro
CIO Council National Conference – March 13
“CIO Council National Conference – March 13

CIO Council

www.cioconference.ro
CIO Council National Conference - testimonials
“Va felicit pentru organizarea conferintei, subiectele abordate au fost interesante si de actualitate, audienta
semnificativa si activa adica intr-un cuvant un frumos succes!” Bogdan Rotunjanu, IT Director, Orange

“Multumesc, in numele echipei Coca-Cola HBC Romania, pentru conferinta excelent organizata si moderata .
Subiectele au fost extraordinare si am plecat cu multe lucruri frumoase si interesante invatate aici” Liviu
Osman, CIO Council member
“I was really impressed for the organization and the high level of the event, Im really committed to come back in
the next conference.” Manel Ballesteros, Director at SII Romania
“Va felicit pentru un eveniment reuşit, plăcut şi extrem de valoros” Bassam Gemayel
"Va felicit pentru evenimentul de ieri. Sincer ! No bla-bla event ! A fost un eveniment de tinuta, un eveniment
‘rotund’, atat in ceea ce va priveste, prezentatori si gazde cat si al celor prezenti in sala. Se vedea si simtea clar
ca lumea nu se plictiseste. In drum spre casa ma gandeam de ce mama naibii nu am incercat sa va recrutez la
Microsoft pe Yugo, Aurelian, Costi Mares etc.“ Ovidiu Artopolescu
“Nu pot sa nu remarc calitatea si tinuta conferintei de ieri, atat prin alegerea subiectelor cat si calitatea
dezbaterilor. Doresc sa felicit atat pe cei care au facut ca acest eveniment sa fie posibil cat si pe toti cei care
au participat intr-un numar atat de mare la eveniment. Bravo!” Bogdan Bandila, CIO Council member
“O conferinta excelenta din toate punctele de vedere! Felicitari organizatorilor si colegilor care au sustinut
subiectele interesante ale agendei! Sunt onorat de participarea la prima Conferinta Nationala, alaturi de
membrii CIO Council Romania!” Dragos Prisacaru, CIO Council member
Cloud Adoption 2013
CIO Council

• Sources:
•
•
•

Cyber Security History, Threats, & Solutions – 2013 – Scott Wood
http://www.youtube.com/watch?v=n25L89E-lfY
New York Times
http://blogs.cio.com/mobile-security/17227/android-malware-infiltrates-google-play-store-infects-100kdevices#sthash.1UCQOTn6.dpuf

More Related Content

Viewers also liked

Microsoft - Programatica2010
Microsoft - Programatica2010Microsoft - Programatica2010
Microsoft - Programatica2010Agora Group
 
CecBank - 07oct2010
CecBank - 07oct2010CecBank - 07oct2010
CecBank - 07oct2010Agora Group
 
Q4 ’04 Venture Capital Fund Performance
Q4 ’04 Venture Capital Fund PerformanceQ4 ’04 Venture Capital Fund Performance
Q4 ’04 Venture Capital Fund Performancemensa25
 
Acceleris+ +centre+de+date+-++12mai2010
Acceleris+ +centre+de+date+-++12mai2010Acceleris+ +centre+de+date+-++12mai2010
Acceleris+ +centre+de+date+-++12mai2010Agora Group
 
G Gata - 13martie2012
G Gata - 13martie2012G Gata - 13martie2012
G Gata - 13martie2012Agora Group
 
Terence Barr - beyond smartphones - 24mai2011
Terence Barr  - beyond smartphones - 24mai2011Terence Barr  - beyond smartphones - 24mai2011
Terence Barr - beyond smartphones - 24mai2011Agora Group
 
Atc 2febr2008 assi
Atc 2febr2008 assiAtc 2febr2008 assi
Atc 2febr2008 assiAgora Group
 
Atc 2febr2008 snt
Atc 2febr2008 sntAtc 2febr2008 snt
Atc 2febr2008 sntAgora Group
 
CecBank - 18nov2010
CecBank - 18nov2010CecBank - 18nov2010
CecBank - 18nov2010Agora Group
 
Comparative Effectiveness Research: Sparking Innovation
Comparative Effectiveness Research: Sparking InnovationComparative Effectiveness Research: Sparking Innovation
Comparative Effectiveness Research: Sparking Innovationgbashe
 
ukrainian npp stress-test
ukrainian npp stress-test ukrainian npp stress-test
ukrainian npp stress-test Ilona Zayets
 
Bio World Insight 2 1 10
Bio World Insight 2 1 10Bio World Insight 2 1 10
Bio World Insight 2 1 10gbashe
 

Viewers also liked (14)

Microsoft - Programatica2010
Microsoft - Programatica2010Microsoft - Programatica2010
Microsoft - Programatica2010
 
CecBank - 07oct2010
CecBank - 07oct2010CecBank - 07oct2010
CecBank - 07oct2010
 
Q4 ’04 Venture Capital Fund Performance
Q4 ’04 Venture Capital Fund PerformanceQ4 ’04 Venture Capital Fund Performance
Q4 ’04 Venture Capital Fund Performance
 
Acceleris+ +centre+de+date+-++12mai2010
Acceleris+ +centre+de+date+-++12mai2010Acceleris+ +centre+de+date+-++12mai2010
Acceleris+ +centre+de+date+-++12mai2010
 
G Gata - 13martie2012
G Gata - 13martie2012G Gata - 13martie2012
G Gata - 13martie2012
 
Project 1
Project 1Project 1
Project 1
 
Terence Barr - beyond smartphones - 24mai2011
Terence Barr  - beyond smartphones - 24mai2011Terence Barr  - beyond smartphones - 24mai2011
Terence Barr - beyond smartphones - 24mai2011
 
Atc 2febr2008 assi
Atc 2febr2008 assiAtc 2febr2008 assi
Atc 2febr2008 assi
 
Atc 2febr2008 snt
Atc 2febr2008 sntAtc 2febr2008 snt
Atc 2febr2008 snt
 
CecBank - 18nov2010
CecBank - 18nov2010CecBank - 18nov2010
CecBank - 18nov2010
 
Comparative Effectiveness Research: Sparking Innovation
Comparative Effectiveness Research: Sparking InnovationComparative Effectiveness Research: Sparking Innovation
Comparative Effectiveness Research: Sparking Innovation
 
ukrainian npp stress-test
ukrainian npp stress-test ukrainian npp stress-test
ukrainian npp stress-test
 
Bio World Insight 2 1 10
Bio World Insight 2 1 10Bio World Insight 2 1 10
Bio World Insight 2 1 10
 
Re-Imagining our Neighbourhoods Slides
Re-Imagining our Neighbourhoods SlidesRe-Imagining our Neighbourhoods Slides
Re-Imagining our Neighbourhoods Slides
 

Similar to Agora Securitate yugo neumorni

HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015Dale Butler
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
The Future of ECM: Collaborative Workspaces
The Future of ECM: Collaborative WorkspacesThe Future of ECM: Collaborative Workspaces
The Future of ECM: Collaborative WorkspacesAIIM International
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentationRashid Khatmey
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference BriefingJesse Wilkins
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...hdicapitalarea
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureSecurity Innovation
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 

Similar to Agora Securitate yugo neumorni (20)

EC-Council Products and career path
EC-Council Products and career pathEC-Council Products and career path
EC-Council Products and career path
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
The Future of ECM: Collaborative Workspaces
The Future of ECM: Collaborative WorkspacesThe Future of ECM: Collaborative Workspaces
The Future of ECM: Collaborative Workspaces
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Opening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital FutureOpening the Talent Spigot to Securing our Digital Future
Opening the Talent Spigot to Securing our Digital Future
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

More from Agora Group

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...Agora Group
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseAgora Group
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftAgora Group
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Agora Group
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital ForensicsAgora Group
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMAgora Group
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the EnterpriseAgora Group
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateAgora Group
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessAgora Group
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu DopAgora Group
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru paciențiAgora Group
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...Agora Group
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Agora Group
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateAgora Group
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wireAgora Group
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileAgora Group
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LANAgora Group
 
Sprint backlog specified by example
Sprint backlog specified by exampleSprint backlog specified by example
Sprint backlog specified by exampleAgora Group
 

More from Agora Group (20)

How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
How to Digitally Transform and Stay Competitive with a Zero-code Digital Busi...
 
Microservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe proceseMicroservicii reutilizabile in arhitecturi bazate pe procese
Microservicii reutilizabile in arhitecturi bazate pe procese
 
The role of BPM in Paradigms Shift
The role of BPM in Paradigms ShiftThe role of BPM in Paradigms Shift
The role of BPM in Paradigms Shift
 
Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004Prezentare Ensight_BPM-20171004
Prezentare Ensight_BPM-20171004
 
Curs OSINT
Curs OSINTCurs OSINT
Curs OSINT
 
Curs Digital Forensics
Curs Digital ForensicsCurs Digital Forensics
Curs Digital Forensics
 
The next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPMThe next generation of Companies management: state of the art in BPM
The next generation of Companies management: state of the art in BPM
 
Speed Dialing the Enterprise
Speed Dialing the EnterpriseSpeed Dialing the Enterprise
Speed Dialing the Enterprise
 
ABPMP Romania
ABPMP RomaniaABPMP Romania
ABPMP Romania
 
Arhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de SănătateArhitectura proceselor în Sistemul Informațional de Sănătate
Arhitectura proceselor în Sistemul Informațional de Sănătate
 
IBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent BusinessIBM’s Smarter Process Reinvent Business
IBM’s Smarter Process Reinvent Business
 
eHealth 2014_Radu Dop
eHealth 2014_Radu DopeHealth 2014_Radu Dop
eHealth 2014_Radu Dop
 
Importanța registrelor pentru pacienți
Importanța registrelor pentru paciențiImportanța registrelor pentru pacienți
Importanța registrelor pentru pacienți
 
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
CYBERCRIME AND THE HEALTHCARE INDUSTRY: Sistemul de sănătate, noua țintă a at...
 
Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...Perspective naționale și internaționale ale informaticii și standardelor medi...
Perspective naționale și internaționale ale informaticii și standardelor medi...
 
UTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatateUTI_Dosarul electronic de sanatate
UTI_Dosarul electronic de sanatate
 
Class IT - Enemy inside the wire
Class IT - Enemy inside the wireClass IT - Enemy inside the wire
Class IT - Enemy inside the wire
 
Infologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobileInfologica - auditarea aplicatiilor mobile
Infologica - auditarea aplicatiilor mobile
 
Security threats in the LAN
Security threats in the LANSecurity threats in the LAN
Security threats in the LAN
 
Sprint backlog specified by example
Sprint backlog specified by exampleSprint backlog specified by example
Sprint backlog specified by example
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Agora Securitate yugo neumorni

  • 1. Security a continuous concern for the CIOs Yugo Neumorni, EMBA, CISA President, CIO Council IT Director, Vimetco Management This presentation, including any supporting materials, is owned by CIO Council Romania and is for the sole use of the intended CIO Council Romania audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of CIO Council Romania. © 2013 CIO Council Romania. All rights reserved.
  • 2. CIO Council Security = People + Process + Technology Best practices for security -Assessment / Risk analyze. -Protecting network -Protecting devices -Monitoring How many of you performed a business impact analyze?
  • 3. CIO Council Business impact analyze Selling cyber security is hard. KPIs and Budgets The executive should be aware of cyber security. Policies and Procedures Security is a culture!
  • 4. Cyber Security Threats Why cyber security will remain a key concern • Widespread use of new platform • Exploits kits. Increasingly available and easy to use • Attacks are becoming more sophisticated and have specific targets Cyber Security History, Threats, & Solutions – 2013 – Scott Wood http://www.youtube.com/watch?v=n25L89E-lfY
  • 5. Cyber Security Threats – new platform Why cyber security will remain a key concern • • • • • Mobile devices Improved functionality of smart phones and tablets Increased use of BYOD policies in the workplace Mobile device make for an interesting point of attack Apps a source of malware Android Malware Infiltrates Google Play Store, Infects 100K Devices
  • 6. Cyber Security Threats – new platform The cloud A single entry point that can be accessed from almost anywhere This can be abused in different ways. • Theft and destruction of data • DoS attacks • Hijacking of cloud service traffic and redirecting it to other sources of malicious content Cyber Security History, Threats, & Solutions – 2013 – Scott Wood http://www.youtube.com/watch?v=n25L89E-lfY
  • 7. Cyber Security Threats – new platform
  • 8. CIO Council Phishing sites that obtain your login and password information in order to hijack your account and scam your friends. (FB, TW) Click-jacking - Concealing hyperlinks beneath legitimate clickable content which, when clicked, causes a user to unknowingly perform actions, such as downloading malware, or sending your ID to a site. Poison Application Personal data exposed and passwords loss Scam
  • 10. Cyber Security – Targeted attacks • Higher payoff makes cyber attacks more of an enterprise – Hacktivist : groups of cyber criminals and/or protestor that target government and corporate websites to bring awareness to their cause – Cyberwar: US 2003, Letonia 2007, Georgia 2008, Stuxnet Iran 2010
  • 11. CIO Council The best practices • Implement strong Security Policy • Make Sure Network Security and Firewalls Are In Place • Regularly Update Your Network Security Tools • Employee’s Mobile Phone Apps • Establish a Incident Response Crisis Plan • Educate Your Employees
  • 13. CIO Council • • • • • • • • • Established in 2005 by five members 80 active members from large organisations Membership by invitation only Monthly meetings “CIO Council National Conference – March 13, “Cloud Adoption” 2013 study CIO Government Office initiative Co-founder of “Alianta Digitala pentru Romania” Non-profit organization
  • 15. CIO Council National Conference • More than 250 participants from 120 companies – 61% CIOs, IT managers, CEOs – 39% CFO, COO, HR managers, IT industry consultants, vendors, public sector representatives • • • • • Sponsor free speeches 3 panels 10 hours of elegant experience Perhaps the most important event in IT Industry in Romania www.cioconference.ro
  • 16. CIO Council National Conference – March 13 CIO Council www.cioconference.ro
  • 17. CIO Council National Conference – March 13 “CIO Council National Conference – March 13 CIO Council www.cioconference.ro
  • 18. CIO Council National Conference - testimonials “Va felicit pentru organizarea conferintei, subiectele abordate au fost interesante si de actualitate, audienta semnificativa si activa adica intr-un cuvant un frumos succes!” Bogdan Rotunjanu, IT Director, Orange “Multumesc, in numele echipei Coca-Cola HBC Romania, pentru conferinta excelent organizata si moderata . Subiectele au fost extraordinare si am plecat cu multe lucruri frumoase si interesante invatate aici” Liviu Osman, CIO Council member “I was really impressed for the organization and the high level of the event, Im really committed to come back in the next conference.” Manel Ballesteros, Director at SII Romania “Va felicit pentru un eveniment reuşit, plăcut şi extrem de valoros” Bassam Gemayel "Va felicit pentru evenimentul de ieri. Sincer ! No bla-bla event ! A fost un eveniment de tinuta, un eveniment ‘rotund’, atat in ceea ce va priveste, prezentatori si gazde cat si al celor prezenti in sala. Se vedea si simtea clar ca lumea nu se plictiseste. In drum spre casa ma gandeam de ce mama naibii nu am incercat sa va recrutez la Microsoft pe Yugo, Aurelian, Costi Mares etc.“ Ovidiu Artopolescu “Nu pot sa nu remarc calitatea si tinuta conferintei de ieri, atat prin alegerea subiectelor cat si calitatea dezbaterilor. Doresc sa felicit atat pe cei care au facut ca acest eveniment sa fie posibil cat si pe toti cei care au participat intr-un numar atat de mare la eveniment. Bravo!” Bogdan Bandila, CIO Council member “O conferinta excelenta din toate punctele de vedere! Felicitari organizatorilor si colegilor care au sustinut subiectele interesante ale agendei! Sunt onorat de participarea la prima Conferinta Nationala, alaturi de membrii CIO Council Romania!” Dragos Prisacaru, CIO Council member
  • 20. CIO Council • Sources: • • • Cyber Security History, Threats, & Solutions – 2013 – Scott Wood http://www.youtube.com/watch?v=n25L89E-lfY New York Times http://blogs.cio.com/mobile-security/17227/android-malware-infiltrates-google-play-store-infects-100kdevices#sthash.1UCQOTn6.dpuf

Editor's Notes

  1.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  2.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  3.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  4.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  5.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  6.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  7.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  8.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  9.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  10.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?
  11.  Cum arata la noi, e mai putin matura, distributia, e distant mare de la primaCum arata world, comparative Ce inteleg CIO din toate astea?