SlideShare a Scribd company logo
Cyber Security Awareness Month
October, 2017
Chinatu Uzuegbu
CISSP, CISM, CISA, CEH, ITIL, MCSE
Breaking News!!!
• Nigeria loses about N127b($450m) to cyber crime
annually.
• In Nigeria, it was reported that 3,500(70%)
successful Cyber attacks targeted the InfoTech space
in the country including the infrastructures of the
government.
• Nigeria ranks 3rd in the global internet crime after
United Kingdom and USA.
• Africa as a whole loses about $2b every year as
reported in 2016.
Breaking News!!! Cont’d
• A malware, known as ‘Lazarus’ was used to compromise and hack into
over 200,000 banking and financial systems in over 150 countries. It was
reported that the Malware originated from the Middle East, mostly Syria,
Iran and Kenya. Nigeria if not proactive enough would soon be in the
target list.
• In the USA, the rate of Cyber breaches targeting Health Care
Organisations and the corresponding Electronic Health Records(EHR)
has increased from 0.63% before 2015, then 34% in 2015 and 90% as at
today as Ponemon Institute reported.???? Drastic!
• On Ransomware alone, which was more or less the major Malware
challenge in 2017 that would hack into the Victim’s System, encrypt the
system and then request for ransom before a release through the
WannaCry Malware; there was an alarming loss of $24m before 2015
and as at first quarter in 2016 it increased to $209m .
Why so Much Loss to Cyber Crime????
• As Technology emerges at the speed of light, the Cyber Criminals run at
pace to exploit vulnerabilities inherent on the new systems.
• There is a consistent daily release of hundreds and thousands of new
Software Applications ranging from Desktop Systems to Mobile Apps for
different specialised purposes.
• The bad and malicious guys are steadily on top of their game doing what
they know how to do best with the view of exploiting vulnerabilities as
every application comes with its own weaknesses, these guys try to take
advantage ....
• This is Cyber age and there is nothing anyone can do about it, virtually
every aspect of life is riding on the Cyber, Internet of things is already in
progress . The bad and malicious guys keep threatening and gaining
grounds.
• The rise of Cyber War is so drastic that If Nigeria does not rise to combating
Cyber Crime, the yearly loss could increase to $trillion.
• There is much misuse of the Cyber Resources ranging from personal
to corporate levels.
Why so much Loss to Cyber Crime... Cont’d
• Personal Privacies/human rights are being breached on daily basis, creating room for the
bad guys to unduly monitor and track individuals and firms until they gain grounds and
achieve their malicious intents.
• Critical Information Assets and Forums that should be highly sensitive and confidential
are now in the Open, policies binding the management of Information at ‘rest’, ‘in
transit’ and ‘discussed’ could fail as a result of the use of back camera and all sorts of
unwarranted monitoring tools.
• Little wonder how employees get information secretly discussed in the boardroom
circulated across the globe even before the meeting ends.
• As the Cyber is emerging with new tools, there are no further updates and corresponding
Cyber Security tools effected on the Security Policy of firms and the Government.
• Most Victims of Cyber attacks do not have a proactive knowledge on how to secure their
Resources.
• Unfortunately, The Cyber Security Pros that should mediate between the Systems and
the attackers with the view of closing up the security gaps are few in the market and not
really on top of their game and lagging in pace with the attackers.
• Cyber Security is quite a new field and there is a general knowledge gap to most
concerned.
Why Cyber Security Awareness Month(CSAM)
As a result of the huge gap in Cyber Security knowledge-base and the high
rate of attacks:
• The National Cyber Security Division (NCSD) within the Department of
Homeland Security and the National Cyber Security Alliance (NCSA, a non-
profit organization) of United States took a decision to set aside every
month of October for yearly Cyber Security Awareness to School students
and the general public.
• The aim is to get the masses aware of Cyber Security techniques; this is
expected to close-up the knowledge gaps to a reasonable extent and at the
same time establish a proactive culture of vigilance and protection from
Cyber Threats.
• Cyber Security Awareness Volunteer Education(C-SAVE) movement was also
initiated by the NCSD and NCSA groups to be executed during this period.
• Nigeria is already imbibing the culture of Cyber Security awareness to
students of both secondary and tertiary institutions during this awareness
period going forward.
• There is a clarion call on all stakeholders to rise to the fearful attacks and
Expectations from Cyber Security Awareness 2017
• Here comes the October 2017 edition of Cyber Security Awareness
program with global reflection on Security approaches and Measures.
• We would be looking at various Security Nuggets that would promote
a level of vigilance and attention to Confidentiality, Integrity and
availability of critical Cyber Assets accessible to all computer Users.
• Cyber Security is the responsibility of all System Users irrespective of
position and status even though it is better driven from the Top level
Management down to the lowest Cadre.
• In this view, it is highly encouraged that All Stakeholders including
Smartphone Users should pay attention to the Security Nuggets as
they would be published in batches with detailed explanations on
application techniques.
• Kindly stay informed as the subsequent articles are published
throughout the month.
Together, we would fight Cyber
Crimes....
Welcome to the October 2017 Cyber
Security Awareness Month
Thank You!

More Related Content

What's hot

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
Avanzo net
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
Rohit Srivastava
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
Habib Siddiqui
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
Maurice Dawson
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
fmi_igf
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
Hadeel Sadiq Obaid
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 

What's hot (20)

Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
cyber security
cyber securitycyber security
cyber security
 
cyber security
cyber securitycyber security
cyber security
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 

Similar to Cyber Security Awareness Month 2017

Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
ANA Cyber Security Forensic Pvt. Ltd.
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
Ritik Kumar
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
Chinatu Uzuegbu
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
NTT Innovation Institute Inc.
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017
dotZADNA
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shubham ghimire
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
AfnanHusain
 
Cyber security
Cyber securityCyber security
Cyber security
TonyYeung23
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
IrfanaRahim2
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
eresavenzon
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
Chinatu Uzuegbu
 
You will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docxYou will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docx
taishao1
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Ivan Sang
 
Cyber Security
Cyber SecurityCyber Security

Similar to Cyber Security Awareness Month 2017 (20)

Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Cyber security awareness - iWeek2017
Cyber security awareness  - iWeek2017Cyber security awareness  - iWeek2017
Cyber security awareness - iWeek2017
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptxCYBERCRIME-WPS Office.pptx
CYBERCRIME-WPS Office.pptx
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
You will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docxYou will be the required technical report; a ten-page single-spaced .docx
You will be the required technical report; a ten-page single-spaced .docx
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from Chinatu Uzuegbu

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
Chinatu Uzuegbu
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
Chinatu Uzuegbu
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
Chinatu Uzuegbu
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
Chinatu Uzuegbu
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
Chinatu Uzuegbu
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
Chinatu Uzuegbu
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
Chinatu Uzuegbu
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
Chinatu Uzuegbu
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
Chinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
Chinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
Chinatu Uzuegbu
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
Chinatu Uzuegbu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
Chinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (17)

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
Effectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdfEffectiveness of Cyber Security Awareness.pdf
Effectiveness of Cyber Security Awareness.pdf
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Cyber Security Awareness Month 2017

  • 1. Cyber Security Awareness Month October, 2017 Chinatu Uzuegbu CISSP, CISM, CISA, CEH, ITIL, MCSE
  • 2. Breaking News!!! • Nigeria loses about N127b($450m) to cyber crime annually. • In Nigeria, it was reported that 3,500(70%) successful Cyber attacks targeted the InfoTech space in the country including the infrastructures of the government. • Nigeria ranks 3rd in the global internet crime after United Kingdom and USA. • Africa as a whole loses about $2b every year as reported in 2016.
  • 3. Breaking News!!! Cont’d • A malware, known as ‘Lazarus’ was used to compromise and hack into over 200,000 banking and financial systems in over 150 countries. It was reported that the Malware originated from the Middle East, mostly Syria, Iran and Kenya. Nigeria if not proactive enough would soon be in the target list. • In the USA, the rate of Cyber breaches targeting Health Care Organisations and the corresponding Electronic Health Records(EHR) has increased from 0.63% before 2015, then 34% in 2015 and 90% as at today as Ponemon Institute reported.???? Drastic! • On Ransomware alone, which was more or less the major Malware challenge in 2017 that would hack into the Victim’s System, encrypt the system and then request for ransom before a release through the WannaCry Malware; there was an alarming loss of $24m before 2015 and as at first quarter in 2016 it increased to $209m .
  • 4. Why so Much Loss to Cyber Crime???? • As Technology emerges at the speed of light, the Cyber Criminals run at pace to exploit vulnerabilities inherent on the new systems. • There is a consistent daily release of hundreds and thousands of new Software Applications ranging from Desktop Systems to Mobile Apps for different specialised purposes. • The bad and malicious guys are steadily on top of their game doing what they know how to do best with the view of exploiting vulnerabilities as every application comes with its own weaknesses, these guys try to take advantage .... • This is Cyber age and there is nothing anyone can do about it, virtually every aspect of life is riding on the Cyber, Internet of things is already in progress . The bad and malicious guys keep threatening and gaining grounds. • The rise of Cyber War is so drastic that If Nigeria does not rise to combating Cyber Crime, the yearly loss could increase to $trillion. • There is much misuse of the Cyber Resources ranging from personal to corporate levels.
  • 5. Why so much Loss to Cyber Crime... Cont’d • Personal Privacies/human rights are being breached on daily basis, creating room for the bad guys to unduly monitor and track individuals and firms until they gain grounds and achieve their malicious intents. • Critical Information Assets and Forums that should be highly sensitive and confidential are now in the Open, policies binding the management of Information at ‘rest’, ‘in transit’ and ‘discussed’ could fail as a result of the use of back camera and all sorts of unwarranted monitoring tools. • Little wonder how employees get information secretly discussed in the boardroom circulated across the globe even before the meeting ends. • As the Cyber is emerging with new tools, there are no further updates and corresponding Cyber Security tools effected on the Security Policy of firms and the Government. • Most Victims of Cyber attacks do not have a proactive knowledge on how to secure their Resources. • Unfortunately, The Cyber Security Pros that should mediate between the Systems and the attackers with the view of closing up the security gaps are few in the market and not really on top of their game and lagging in pace with the attackers. • Cyber Security is quite a new field and there is a general knowledge gap to most concerned.
  • 6. Why Cyber Security Awareness Month(CSAM) As a result of the huge gap in Cyber Security knowledge-base and the high rate of attacks: • The National Cyber Security Division (NCSD) within the Department of Homeland Security and the National Cyber Security Alliance (NCSA, a non- profit organization) of United States took a decision to set aside every month of October for yearly Cyber Security Awareness to School students and the general public. • The aim is to get the masses aware of Cyber Security techniques; this is expected to close-up the knowledge gaps to a reasonable extent and at the same time establish a proactive culture of vigilance and protection from Cyber Threats. • Cyber Security Awareness Volunteer Education(C-SAVE) movement was also initiated by the NCSD and NCSA groups to be executed during this period. • Nigeria is already imbibing the culture of Cyber Security awareness to students of both secondary and tertiary institutions during this awareness period going forward. • There is a clarion call on all stakeholders to rise to the fearful attacks and
  • 7. Expectations from Cyber Security Awareness 2017 • Here comes the October 2017 edition of Cyber Security Awareness program with global reflection on Security approaches and Measures. • We would be looking at various Security Nuggets that would promote a level of vigilance and attention to Confidentiality, Integrity and availability of critical Cyber Assets accessible to all computer Users. • Cyber Security is the responsibility of all System Users irrespective of position and status even though it is better driven from the Top level Management down to the lowest Cadre. • In this view, it is highly encouraged that All Stakeholders including Smartphone Users should pay attention to the Security Nuggets as they would be published in batches with detailed explanations on application techniques. • Kindly stay informed as the subsequent articles are published throughout the month.
  • 8. Together, we would fight Cyber Crimes.... Welcome to the October 2017 Cyber Security Awareness Month