SlideShare a Scribd company logo
1 of 16
Download to read offline
Cyber & Information Security

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Information Security - Overview

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
What is Information Security?
Information Security ensures protection, confidentiality, integrity & availability of an
organization’s assets against exploitation or attacks to degrade or destroy information
from outside or inside the organization

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Information Security Has Many Attack
Vectors
Information security is not only about technology. Many successful attacks require little
or no technical knowledge.

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Sophisticated Attackers Focus on
High-Value Targets
Government & Financial Institutions
are by far the most attractive
targets for sophisticated actors such
as nation states or organized
criminal organizations

Source: Booz Allen Hamilton analysis of the top 20 information
security attacks in 2012

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Striving for a Better Approach

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Where to Start? The Three Tiers of
Information Security
Effective Information Security requires a trained and aware workforce and well-defined
and enforced policy and procedures. With these, any credible information security tools
will be effective. Without this, no set of tools will work.

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Components of Effective Information
Security
An effective information security program is built on a foundation of leadership
supported by the three pillars of well-thought-out strategy & governance, organizationwide awareness & training, and advanced technology

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Focus on the People
People are the most vital aspect of your Cybersecurity defense and should always be
your first priority for investment

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Adopt a Holistic Approach and Tools
There is temptation to buy a “tool” to fix the problem and it rarely, if ever, works. Tools
that are too complex for your team require extensive tuning and integration will rarely
be effective

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Threats come from...

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
Every Organization is Under Attack

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
2013 Attack vector by Industry

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
The growing malware threat
From one every MINUTE to one every SECOND

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
The New Breed of Cyber Attacks
Nature of threats changing / Today’s attacks sophisticated and successful

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL
The total bill for cybercrime...

$388 Billion – The total bill for cybercrime footed by
online adults in 24 countries…
• $114bn – Direct cash costs of cybercrime
• $274bn – Victims valued the time lost to cybercrime

Cybercrime is bigger than…
• The global black market in marijuana, cocaine, and heroin combined ($288bn)
and approaching the value of all global drug trafficking ($411bn)
• At $388bn, cybercrime is more than 100 times the annual expenditures of
UNICEF ($3.65bn)

Ahmet Hamdi ATALAY

11 Nisan 2013’ISTANBUL

More Related Content

Viewers also liked

Protocol for a Brain Training Program
Protocol for a Brain Training ProgramProtocol for a Brain Training Program
Protocol for a Brain Training ProgramJulian L. Sevillano
 
Xx mistrzostwa pierwszej pomocy pck2
Xx mistrzostwa pierwszej pomocy pck2Xx mistrzostwa pierwszej pomocy pck2
Xx mistrzostwa pierwszej pomocy pck2callieee
 
Sistem Global Danışmanlık Tanıtım
Sistem Global Danışmanlık TanıtımSistem Global Danışmanlık Tanıtım
Sistem Global Danışmanlık TanıtımPinar Gönenç
 
Surat batas usia_maksimal_tubel
Surat batas usia_maksimal_tubelSurat batas usia_maksimal_tubel
Surat batas usia_maksimal_tubelPengembangan2016
 
Türkiye'de ar ge ahatalay-may2014
Türkiye'de ar ge ahatalay-may2014Türkiye'de ar ge ahatalay-may2014
Türkiye'de ar ge ahatalay-may2014Ahmet Hamdi Atalay
 
İhracata Yönelik Ar-Ge Teşvikler
İhracata Yönelik Ar-Ge Teşviklerİhracata Yönelik Ar-Ge Teşvikler
İhracata Yönelik Ar-Ge TeşviklerNecdet Terkes
 
Mobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAY
Mobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAYMobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAY
Mobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAYAhmet Hamdi Atalay
 
KİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIM
KİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIMKİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIM
KİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIMKİRİŞ BİLİŞİM
 
SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014
SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014
SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014Ahmet Hamdi Atalay
 
Yatırımlarda Devlet Teşvikleri
Yatırımlarda Devlet TeşvikleriYatırımlarda Devlet Teşvikleri
Yatırımlarda Devlet TeşvikleriSüreyya Sakınç
 
Ar ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇k
Ar ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇kAr ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇k
Ar ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇kAli CAVUSOGLU
 
DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013
DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013
DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013Crow Digital Marketing
 
Office Manual by Thao Ngo
Office Manual by Thao NgoOffice Manual by Thao Ngo
Office Manual by Thao NgoThao Ngo
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentationangelicausa13
 
Bilim, Teknoloji ve Sanayide Türkiye’nin Durumu
Bilim, Teknoloji ve Sanayide Türkiye’nin DurumuBilim, Teknoloji ve Sanayide Türkiye’nin Durumu
Bilim, Teknoloji ve Sanayide Türkiye’nin DurumuUfuk Kılıç
 

Viewers also liked (18)

Protocol for a Brain Training Program
Protocol for a Brain Training ProgramProtocol for a Brain Training Program
Protocol for a Brain Training Program
 
Xx mistrzostwa pierwszej pomocy pck2
Xx mistrzostwa pierwszej pomocy pck2Xx mistrzostwa pierwszej pomocy pck2
Xx mistrzostwa pierwszej pomocy pck2
 
Tubisad Bilgi ve İletisim Sektoru 2013 Pazar Verileri
Tubisad Bilgi ve İletisim Sektoru 2013 Pazar VerileriTubisad Bilgi ve İletisim Sektoru 2013 Pazar Verileri
Tubisad Bilgi ve İletisim Sektoru 2013 Pazar Verileri
 
apuntes
apuntes apuntes
apuntes
 
Sistem Global Danışmanlık Tanıtım
Sistem Global Danışmanlık TanıtımSistem Global Danışmanlık Tanıtım
Sistem Global Danışmanlık Tanıtım
 
Surat batas usia_maksimal_tubel
Surat batas usia_maksimal_tubelSurat batas usia_maksimal_tubel
Surat batas usia_maksimal_tubel
 
Türkiye'de ar ge ahatalay-may2014
Türkiye'de ar ge ahatalay-may2014Türkiye'de ar ge ahatalay-may2014
Türkiye'de ar ge ahatalay-may2014
 
İhracata Yönelik Ar-Ge Teşvikler
İhracata Yönelik Ar-Ge Teşviklerİhracata Yönelik Ar-Ge Teşvikler
İhracata Yönelik Ar-Ge Teşvikler
 
Mobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAY
Mobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAYMobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAY
Mobil haberlesmede 3G ve otesi 4G- 5G_Ahmet Hamdi ATALAY
 
KİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIM
KİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIMKİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIM
KİRİŞ BİLİŞİM ve DANIŞMANLIK TANITIM
 
SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014
SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014
SİBER GÜVENLİK ve SİBER SUÇLAR-AHA_Aralık2014
 
Yatırımlarda Devlet Teşvikleri
Yatırımlarda Devlet TeşvikleriYatırımlarda Devlet Teşvikleri
Yatırımlarda Devlet Teşvikleri
 
Ar ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇k
Ar ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇kAr ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇k
Ar ge çalişmalari ve patent sayisi arasindaki̇ dengesi̇zli̇k
 
TARAFTech-Tanitim Dosyas
TARAFTech-Tanitim DosyasTARAFTech-Tanitim Dosyas
TARAFTech-Tanitim Dosyas
 
DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013
DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013
DÜNYADA VE TÜRKİYE’DE AR-GE FAALİYETLERİ 2013
 
Office Manual by Thao Ngo
Office Manual by Thao NgoOffice Manual by Thao Ngo
Office Manual by Thao Ngo
 
Chapter9 presentation
Chapter9 presentationChapter9 presentation
Chapter9 presentation
 
Bilim, Teknoloji ve Sanayide Türkiye’nin Durumu
Bilim, Teknoloji ve Sanayide Türkiye’nin DurumuBilim, Teknoloji ve Sanayide Türkiye’nin Durumu
Bilim, Teknoloji ve Sanayide Türkiye’nin Durumu
 

Similar to Cyber & information security-aha2013

Business Proposal A.I.S.S.
Business Proposal A.I.S.S.Business Proposal A.I.S.S.
Business Proposal A.I.S.S.Ashish Thapa
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA EssayWinstina Kennedy
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyICT Watch
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekJohn Bambenek
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responseMaciej Buczkowski
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT PresentationDaniel McGarvey
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxbartholomeocoombs
 

Similar to Cyber & information security-aha2013 (20)

Information Security
Information SecurityInformation Security
Information Security
 
Business Proposal A.I.S.S.
Business Proposal A.I.S.S.Business Proposal A.I.S.S.
Business Proposal A.I.S.S.
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
IESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John BambenekIESBGA 2014 Cybercrime Seminar by John Bambenek
IESBGA 2014 Cybercrime Seminar by John Bambenek
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-response
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT Presentation
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Chapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docxChapter 11 – According to the authors, privacy and security go hand .docx
Chapter 11 – According to the authors, privacy and security go hand .docx
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Cyber & information security-aha2013

  • 1. Cyber & Information Security Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 2. Information Security - Overview Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 3. What is Information Security? Information Security ensures protection, confidentiality, integrity & availability of an organization’s assets against exploitation or attacks to degrade or destroy information from outside or inside the organization Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 4. Information Security Has Many Attack Vectors Information security is not only about technology. Many successful attacks require little or no technical knowledge. Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 5. Sophisticated Attackers Focus on High-Value Targets Government & Financial Institutions are by far the most attractive targets for sophisticated actors such as nation states or organized criminal organizations Source: Booz Allen Hamilton analysis of the top 20 information security attacks in 2012 Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 6. Striving for a Better Approach Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 7. Where to Start? The Three Tiers of Information Security Effective Information Security requires a trained and aware workforce and well-defined and enforced policy and procedures. With these, any credible information security tools will be effective. Without this, no set of tools will work. Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 8. Components of Effective Information Security An effective information security program is built on a foundation of leadership supported by the three pillars of well-thought-out strategy & governance, organizationwide awareness & training, and advanced technology Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 9. Focus on the People People are the most vital aspect of your Cybersecurity defense and should always be your first priority for investment Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 10. Adopt a Holistic Approach and Tools There is temptation to buy a “tool” to fix the problem and it rarely, if ever, works. Tools that are too complex for your team require extensive tuning and integration will rarely be effective Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 11. Threats come from... Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 12. Every Organization is Under Attack Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 13. 2013 Attack vector by Industry Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 14. The growing malware threat From one every MINUTE to one every SECOND Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 15. The New Breed of Cyber Attacks Nature of threats changing / Today’s attacks sophisticated and successful Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL
  • 16. The total bill for cybercrime... $388 Billion – The total bill for cybercrime footed by online adults in 24 countries… • $114bn – Direct cash costs of cybercrime • $274bn – Victims valued the time lost to cybercrime Cybercrime is bigger than… • The global black market in marijuana, cocaine, and heroin combined ($288bn) and approaching the value of all global drug trafficking ($411bn) • At $388bn, cybercrime is more than 100 times the annual expenditures of UNICEF ($3.65bn) Ahmet Hamdi ATALAY 11 Nisan 2013’ISTANBUL