SlideShare a Scribd company logo
UNCLASSIFIED
UNCLASSIFIED
Kansas City Terrorism Early Warning
Inter Agency Analysis Center
Cyber Threat Information Program
Missouri City/County
Manager’s Association
CYBER BRIEFING
May 7, 2015
UNCLASSIFIED
UNCLASSIFIED
Recent Cyber Events
• South Carolina DOR. – 3.6 million SSNs stolen and
tax returns exposed. – ( Direct Cost = $14 million,
User fraud loss = $5.2 Billion)
• Shamoon (aka: Wiper) – Steals credentials wipes
boot record from 30,000 to 50,000 computers at
Saudi Aramco and RasGas.
• Banking DDOS against JP Morgan/Chase, PNC, Wells
Fargo, Bank Of America. Total of 8 banks attacked.
UNCLASSIFIED
UNCLASSIFIED
Recent Cyber Events
• TARGET ( 40 MILLION credit cards) and other
retailers.
• City of Wichita ( > 60,000 vendor financial
records)
• 14 banks, 12 cities and 10 police departments
disabled during the Ferguson unrest.
UNCLASSIFIED
UNCLASSIFIED
VIDEO 1
UNCLASSIFIED
UNCLASSIFIED
So What ?
• Computer network exploitation by threat actors enables:
• Massive financial losses
• Degradation/disruption of services
• Extortion
• Intellectual property theft
• Counterfeiting
• Theft of proprietary data
• Identity theft (personally identifiable information)
• Access to credit
• Loss of money and credibility
UNCLASSIFIED
UNCLASSIFIED
Agenda
• Threat Landscape
• Actors (Bad Guys)
• Attack types (Bad Stuff that Bad Guys do)
• Vulnerabilities (The things that Bad guys attack)
• Cyber Threats and Trends (The Future)
• What Can You Do ?
UNCLASSIFIED
UNCLASSIFIED
EVALUATE YOUR RISK.
THREAT + VULNERABILITY +
CONSEQUENCE
=
RISK
UNCLASSIFIED
UNCLASSIFIED
CYBER THREAT LANDSCAPE
UNCLASSIFIED
UNCLASSIFIED
Cyber Threat Landscape
• Cyber Threat Actors
• State Sponsored
• Terrorist/Violent Extremists
• Insider Threat
• Hackers
• Hacktivists
• Criminals / Organized Crime
UNCLASSIFIED
UNCLASSIFIED
Hacker Evolution
UNCLASSIFIED
UNCLASSIFIED
Hacker Evolution
UNCLASSIFIED
UNCLASSIFIED
Hacker Evolution
UNCLASSIFIED
UNCLASSIFIED
Cyber Threat Motivations
• Notoriety
• Political Statement
• Money – Banks, Credit Cards, Extortion, etc.
• Intellectual Property / Trade Secrets
• Information for Negotiating Positions
(competitive advantage)
• Infrastructure Attack – Terrorism
UNCLASSIFIED
UNCLASSIFIED
Nation-State Terrorists Insiders Hackers Hacktivists Criminals
Commercial
Espionage
Fun/Curiosity/
Ego X
Money X X X X X
Retaliation/
retribution X X X
Political
Statement X X
Intellectual
Property X X X X
Negotiation
Information X X
Deny, Disrupt,
Degrade,
Destroy X X X X
Cyber Threat Motivations
(Intent)
UNCLASSIFIED
UNCLASSIFIED
Cyber Targets
• Government Networks
• Federal
• State
• Local
• Tribal and Territorial
• Critical Infrastructure and Key Resources (CIKR)
Networks
• Over 85% owned by private sector
• Industrial Control Systems/SCADA
• Embedded systems
• Business and Home Networks
UNCLASSIFIED
UNCLASSIFIED
Cyber Threats
• Supply Chain Exploitation
• Cyber exploitation, manipulation, diversion, or substitution of
counterfeit, suspect, or fraudulent items impacting US CIKR
• Disruption
• Distributed Denial of Service (DDOS) attack (effort to prevent site
or service from functioning efficiently or at all, temporarily or
indefinitely)
• Cyber Crime
• Criminals seeking sensitive, protected information for financial
gain
UNCLASSIFIED
UNCLASSIFIED
• Corporate Espionage
• Threat actors targeting US companies to gather intelligence and
sensitive corporate data for competitive advantage
• Advanced Persistent Threat
• Stealthy, coordinated cyber activity over long period of time
directed against political, business, and economic targets
• Industrial Control Systems/SCADA
• Threat actors disrupt ICS/SCADA based processes
Cyber Threats
UNCLASSIFIED
UNCLASSIFIED 21
Devices, Systems and Networks
• Desktops/Laptops
• OS/App
• Servers
• OS/App
• Printers
• Routers
• VPN
• DNS system
• PSAPS
• Public Notification Systems
• Mobile devices
• Household appliances
• Televisions
• Refrigerators
• Baby monitors
UNCLASSIFIED
UNCLASSIFIED
Embedded Systems
22
Computers built into other systems
Examples:
• Digital X-ray Machines, Medical Devices
• Computer Controlled Industrial Equipment
• Automobiles
• ATMs
• Printer/copier/fax machines
The underlying computer is likely to have unpatched vulnerabilities because
it is not on the System Administrators list of “computers,” or the system
must be upgraded by the vendor.
UNCLASSIFIED
UNCLASSIFIED
Industrial Control Systems (ICS)
23
Controls processes such as manufacturing, product handling,
production, and distribution. Industrial Control Systems include
Supervisory Control and Data Acquisition systems (SCADA).
Examples
 Robotic assembly lines
 Water treatment
 Electric Power Grid
 Building controls
UNCLASSIFIED
UNCLASSIFIED
Internet Connected Communications
Communications systems that are not typically considered computer networks that
are, none the less, connected to external networks such as the Internet.
Examples:
• Telephone switching – PBX, VOIP
• Emergency notification systems
• First responder communications (Trunked voice/data
terminals)
UNCLASSIFIED
UNCLASSIFIED
Targeting and Attack Techniques
• Social engineering
• Spear phishing
• Spoofing e-mail accounts
• Exploiting vulnerabilities
• Malware
• Downloaders, Trojans, Keyloggers, etc.
• External memory devices (USB)
• Supply-chain exploitation
• Leveraging trusted insiders
• Denial of Service
• Mobile Device Attacks
UNCLASSIFIED
UNCLASSIFIED
Advanced Persistent Threat (APT)
• Category of cyber attack against political, business, or economic
targets
• Federal agencies
• State agencies
• City governments
• Commercial and non-profit organizations
• Actors use full spectrum of computer intrusion techniques and
technology
• Characterized by focus on specific information objectives rather than
immediate financial gain
• Stealthy, coordinated, focused activity over a long period of time
Operators are skilled, motivated, organized, well-funded
UNCLASSIFIED
UNCLASSIFIED
Advanced Persistent Threat (APT)
• Information objectives include:
• Gov’t policy/planning
• Corporate proprietary data
• Contract data
• International meetings (G20, IMF,
Climate Change)
• Sabotage
• Espionage
• Use of compromised
computers as intermediate hop
points in future compromises
UNCLASSIFIED
UNCLASSIFIED
Advanced Persistent Threat (APT)
Methodology
• Reconnaissance
• Initial intrusion into network
• Establish backdoor into the network
• Obtain user credentials (login ID, passwords)
• Escalate privileges, move laterally through the network
• Search for and exfiltrate data
• Maintain persistence
UNCLASSIFIED
UNCLASSIFIED
Advanced Persistent Threat (APT)
Examples of APT in open reporting
• Operation Aurora – Damballa
• Finance, Technology, Media – 30+ Countries
• LURID APT – Trend Micro
• Diplomatic, Government, Space-related agencies and companies – 61
Countries
• Nitro – Symantec
• Gas, Oil, Energy, Chemical Sectors – 8 countries
• Shady Rat – Symantec
• Governments, corporations, nonprofits, 14 countries
• FLAME – Kaspersky
• Mid-eastern countries
UNCLASSIFIED
UNCLASSIFIED
VIDEO 2
UNCLASSIFIED
UNCLASSIFIED
Cyber Threats and Trends
UNCLASSIFIED
UNCLASSIFIED
Trends
• ENORMOUS increase in Cyber Attacks/Crime both in numbers
and sophistication.
• State sponsored attacks likely to increase. (Cyber Warfare is real
now.)
• Cyberweapon toolkits are common place utilized by not only state
sponsored attackers, but by any entity with medium/high skills.
• Cyber Crime As a Service is a full fledged business model.
• Anyone can use point and click services to deliver a devastating
attack.
UNCLASSIFIED
UNCLASSIFIED
Trends
Nation-States That Have Declared
Offensive Cyber Capability
• Iran
• India
• UK
• China
• Russia
• U.S.A.
• Australia
• Italy
• France
• Syria
• Germany
• Israel
UNCLASSIFIED
UNCLASSIFIED
Trends
Hactivists / Jihadists
• Alliances with ideologically similar groups
• More Skilled
• More Organized
• More Aggressive
• More of them
UNCLASSIFIED
UNCLASSIFIED
Trends
Cyber Criminals
• Can occasionally approach the sophistication
if not the endurance of State sponsored
attackers
• Adding much more emphasis to mobile
devices.
• Adds a physical dimension to the Cyber realm.
UNCLASSIFIED
UNCLASSIFIED
Trends
Shift in targeting preferences
• State / Local
• State networks
• Local Municipalities / Agencies
• FD, PD, Cities, NGOs
• Universities, Colleges, Votech
• Businesses
UNCLASSIFIED
UNCLASSIFIED
COMMON
ATTACK TYPES /
MITIGATION
STRATEGIES
UNCLASSIFIED
UNCLASSIFIED
Attacks from outside the firewall
UNCLASSIFIED
UNCLASSIFIED
Big Three Most Common Attacks
DDoS – Distributed Denial of Service
SQL-I - Structured Query Language Injection
Defacements
UNCLASSIFIED
UNCLASSIFIED
Commonly Seen Attacks
Attack Type (TTP – Tactics, Techniques,
Procedures)
What is it?
Who uses them?
Preferred targets?
Consequences?
Prevention / Mitigation.
UNCLASSIFIED
UNCLASSIFIED
Distributed Denial of Service (DDoS)
WHAT IS IT?
A DDOS attack tries to render a website either inoperable or
inaccessible by using large numbers of computers sending
overwhelming numbers of requests at a computer.
The target can become so busy trying to answer bogus requests
that it cannot answer valid user requests and the website is
unusable.
UNCLASSIFIED
UNCLASSIFIED
Distributed Denial of Service (DDoS)
WHO USES IT ?
Used to be well resourced adversaries (state
sponsored, cyber crime enterprise)
More recently seen from Hactivists, (Anonymous
Affiliates)
Anyone with $200 - $800 can rent a botnet with
10,000 computers for a day to attack anyone.
UNCLASSIFIED
UNCLASSIFIED
Distributed Denial of Service (DDoS)
Examples?
During unrest associated with Ferguson MO shooting.
15 Banking institutions
State, Counties, Cities, Police departments (at least 12)
Educational institutions
UNCLASSIFIED
UNCLASSIFIED
Distributed Denial of Service (DDoS)
Prevention
Can’t be prevented – Plan for it
Establishing connections with multiple ISPs.
Ensure that service level agreements (SLA) with ISPs
contain provisions for DDoS prevention (such as IP
address rotation)
Assure the network has redundant systems and sufficient
excess capacity
UNCLASSIFIED
UNCLASSIFIED
Distributed Denial of Service (DDoS)
Prevention
• Enable rate limiting at the network perimeter
• Create backup remote site networks with multiple address
capability
• Segment web services across multiple machines and
networks
• Host public facing websites with ISPs having capability to
withstand significant DDoS attacks
UNCLASSIFIED
UNCLASSIFIED
Distributed Denial of Service (DDoS)
MITIGATION
Executing ISP address rotation
Block source IP addresses that are generating DDoS
traffic at the network boundary or within the ISP
infrastructure. ( DDoS attacks can come from tens of
thousands of addresses that rotate randomly, making this
strategy difficult to implement.)
Acquire increased bandwidth from the ISP (This solution is
limited by your own servers ability to handle the increased
traffic.)
UNCLASSIFIED
UNCLASSIFIED
SQL Injection (SQL-I)
WHAT IS IT?
A form of attack on a database-driven Web site in which
the attacker executes unauthorized SQL commands by
taking advantage of insecure bypassing the firewall.
Used to steal information from a database and/or to
gain access to an organization's host computers
through the computer that is hosting the database.
UNCLASSIFIED
UNCLASSIFIED
SQL Injection (SQL-I)
Who uses it?
State sponsored, cyber criminals, Hackers,
Hacktivists, Jihadists, Anonymous, script-kiddies
Very effective tools are freely available
Recipes for finding targets (call google dorks) are
all over the open internet.
UNCLASSIFIED
UNCLASSIFIED
SQL Injection (SQL-I)
Local Examples?
KCKPD
Release of Accident records and related personal
information
Wichita
Release of vendor/personal financial information
UNCLASSIFIED
UNCLASSIFIED
SQL Injection (SQL-I)
Prevention
Limit databased services
Assure all applications and operating systems are patched
to current level
Keep an eye for announced vulnerabilities
Dynamic monitoring at the firewall or application server
Threat detection services
Applications configuration security ( Passwords )
UNCLASSIFIED
UNCLASSIFIED
SQL Injection (SQL-I)
MITIGATION
Watch for “breach” announcements
Notification process
Prevent further breaches (turn off access till it’s fixed)
Aggressively pursue disclosures
Where applicable, get outside help (FBI, DHS, USSS,
Commercial services)
UNCLASSIFIED
UNCLASSIFIED
DEFACEMENT
WHAT IS IT?
Any unauthorized changes made to the
appearance of either a single webpage, or an
entire site. In some cases, a website is
completely taken down and replaced by
something new.
UNCLASSIFIED
UNCLASSIFIED
DEFACEMENT
Who uses it?
Plethora of Jihadists
“Anonymous” Affiliates
Syrian Electronic Army
POH (Plain old hackers)
UNCLASSIFIED
UNCLASSIFIED
DEFACEMENT
Examples?
Akron OH
Marines.com
Huffington
MO.GOV
Check out www.zone-h.com (database of
180,000)
UNCLASSIFIED
UNCLASSIFIED
DEFACEMENT
Prevention / Mitigation
Keep Server systems and CMS apps up-to-date
Better passwords
Don’t share system accounts outside organization
Reputation monitoring services
Good backups
UNCLASSIFIED
UNCLASSIFIED
Attacks That Get
Through The Firewall
UNCLASSIFIED
UNCLASSIFIED
APT – The Really Bad Stuff
• Computer network exploitation by threat actors
enables:
• Massive financial losses
• Degradation/disruption of services
• Extortion
• Intellectual property theft
• Counterfeiting
• Theft of proprietary data
• Identity theft (personally identifiable information)
• Access to credit
• Loss of money and credibility
UNCLASSIFIED
UNCLASSIFIED
Computer Network Exploitation
(Try to stay on the left side
of the Cyber “Kill Chain”)
The Bad Guys are INSIDE the computer now.
UNCLASSIFIED
UNCLASSIFIED
Spear-Phishing
• Targeted e-mails containing malicious attachments or links
• E-mails forged to look as if they came from a legitimate
source and have a subject that the victim is likely to open.
• Target e-mail addresses can be harvested from Web sites,
social networks, etc.
• Targeting of CEOs, executives is called “whaling”.
63
UNCLASSIFIED
UNCLASSIFIED 64
Sample Phishing Website
(Via fsecure.com)
UNCLASSIFIED
UNCLASSIFIED 65
Sample Phishing Website
(Via fsecure.com)
Compromised police academy server in India
UNCLASSIFIED
UNCLASSIFIED 66
(Via nytimes.com)
UNCLASSIFIED
UNCLASSIFIED
Prevention
Constant Education
Information Sharing between agencies
OPSEC
Cyber Hygiene
PASSWORDS!!!!!!!!!!!!!
Response plans
Cyber Tabletop Exercises
Test Your Capabilities
Figure Out Roles and Responsibilities
UNCLASSIFIED
UNCLASSIFIED
What is your plan?
How to recover?
WHO ?
COST ?
How to mitigate
CRITICAL SERVICES
How to deal with the public
PUBLIC CONFIDENCE
LIABILITY
UNCLASSIFIED
UNCLASSIFIED
EVALUATE YOUR RISK.
THREAT + VULNERABILITY +
CONSEQUENCE
=
RISK
UNCLASSIFIED
UNCLASSIFIED
WHO CAN YOU CALL?
Fusion Center:
KC Regional Terrorism Early Warning
Cyber Threat Intelligence Program
kctew@kcpd.org
(816) 413-3588
Missouri Information Analysis Center
St Louis Terrorism Early Warning
UNCLASSIFIED
UNCLASSIFIED
OR
ID
NV
WY
MT
ND
SD
UT
WA
CO
NE
MN
KS
OK
NM
AZ
TX
AR
LA
AL GA
FL
TN NC
SC
MS
Southeast Regional
Coordinator –
Heather Perez (CFIX)
Western Regional
Coordinator -
Dana Kilian - NCRIC
AK
CA
Troy Campbell – Co-Chair – KCTEW
Devin King – Co-Chair – LA-SAFE
National Capital Regional
Coordinator -
Fleming Campbell (WRTAC)
WI
IA
MO
IL
IN
MI
ME
KY
OH
VA
WV
PA
NY
NJ
NH
MA
RI
MD
CT
DE
VT
DC
Northeast Regional
Coordinator -
Brett Paradis (CTIC)
Midwest Regional
Coordinator –
Kelley Goldblatt (MC3)
Central Regional
Coordinator -
John Burrell - MATIC
NFCA Cyber Intelligence Network (CIN)
UNCLASSIFIED
UNCLASSIFIED
WHO CAN YOU CALL?
The Department of Homeland Security (DHS)
The National Cybersecurity & Communications Integration Center
(NCCIC)
The U.S. Computer Emergency Readiness Team (US-CERT)
The Industrial Control Systems Cyber Emergency Response Team (ICS-
CERT)
The National Coordinating Center for Telecommunications (NCC)
74
UNCLASSIFIED
UNCLASSIFIED
WHO CAN YOU CALL?
The USSS – US SECRET SERVICE
Your Nearest field office usually has a local
Electronic Crimes Task Force
Has Critical Incident Response Teams
75
UNCLASSIFIED
UNCLASSIFIED
WHO CAN YOU CALL?
The Federal Bureau of Investigations (FBI)
Your Local FBI Cyber Division
FBI CyWatch
FBI Critical Incident Response Group (CIRG) Strategic
Information and Operations Center (SIOC)
76
UNCLASSIFIED
UNCLASSIFIED
WHO CAN YOU CALL?
KC Regional Terrorism Early Warning
Cyber Threat Intelligence Program
kctew@kcpd.org
(816) 413-3588
UNCLASSIFIED
UNCLASSIFIED
Discussion
UNCLASSIFIED
UNCLASSIFIED
Contact:
Troy Campbell
KCTEW
Cyber Threat Intelligence Program
tcampbell@kcpd.org
(816) 413-3588
UNCLASSIFIED
UNCLASSIFIED
Cyber Information Sharing Issues
UNCLASSIFIED
UNCLASSIFIED
Cyber Information Sharing –A Challenging Process
UNCLASSIFIED
UNCLASSIFIED
Issues in Intelligence
Information Sharing
• No Cross Community Standards
• Formats
• Flow Paths
• Classification Downgrades
• Identity requests
• Standard terminology
• Two-way information Flows

More Related Content

Similar to Combating Cyber Threats: Cyber Thread Information Program

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
Kavitha Gupta, CIPP-Asia
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
Karen Moxley
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
Ajeet Choudhary
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
benefitexpress
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
Alessa
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Ivan Sang
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
SonakshiMundra
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
Joe Nathans
 
Cyber security
Cyber securityCyber security
Cyber security
Perfect Training Center
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
John Donahue
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
Don Caeiro
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
Brooks18
Brooks18Brooks18
Brooks18
Chuck Brooks
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 

Similar to Combating Cyber Threats: Cyber Thread Information Program (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8Cyber crimeppt1-1209117277348428-8
Cyber crimeppt1-1209117277348428-8
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem? Sanctions Risk - What's the Problem?
Sanctions Risk - What's the Problem?
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Brooks18
Brooks18Brooks18
Brooks18
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 

Recently uploaded

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 

Recently uploaded (20)

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 

Combating Cyber Threats: Cyber Thread Information Program