SlideShare a Scribd company logo
CYBER SECURITY
03 Days Masterclass
th th th
28 - 29 - 30 June 2018 | MUMBAI
By Mr. Edgar Perez: a well renowned industry expert worldwide
We're in the stone age of cyber security. Real learning will only come after the 1st major
incident. . . . . . Dr Christopher Frei
As information technology becomes ever more complex and Internet usage increasingly widespread,
cybersecurity is becoming an increasingly important and business-critical field. Unfortunately, most
organizations are not prepared to handle cybersecurity threats. In fact, 66% of IT and security professionals
say that their firms are unprepared to recover from a cyberattack. A key example of this unpreparedness is the
fact that many of the companies impacted by the recent WannaCry attack didn't install critical updates into
their Windows infrastructure that had been released by Microsoft back in March.
Attempting to disrupt the landscape of technologies focused on cybersecurity is artificial intelligence and,
more specifically, deep learning. Taking the flexibility and thinking capacity of the human mind, digitizing it,
and creating a genius system faster, more consistent and potentially more capable than any human brain,
deep learning is now plowing through colossal mountains of data, often in real time, to uncover new and often
unexpected relationships, providing unique insights into threats, and empowering improvements to machine
learning models and mitigation processes. One of the benefits of these technologies will be to enable analysts
or threat responders to focus on the half-dozen critical events of the day (rather than distill 50,000 erroneous
alerts generated each day).
Edgar Perez's Masterclass in Cybersecurity will bring CEOs, board members and top executives up to speed
on the most recent technologies (such as artificial intelligence) and battle-tested approaches to protect their
companies' valuable information and intellectual property from prying eyes of hackers and competitors, and
leverage their cyber success in both cultivating stronger relationships with current and new clients and
safeguarding the interests of all stakeholders, partners and employees.
CS 2018
www.marcepinc.com info@marcepinc.comTel: 022-62210100 Cell: 09619046105
LATEST INDUSTRY INSIGHTS
IDENTIFY THREATS & OPPORTUNITIES
DEVELOP A CYBERSECURITY PLAN
DAY 1: UNDERSTAND THE LOOMING THREAT
o Understanding today's cyber attacks
o How to get better at responding to cyber threats
o Combating today's attacks with 21st century tools
o Anatomy of a cyberattack explained
o Cybersecurity testing as a component of a strong governance process
o Protection of firm networks and client information
o Detection of unauthorized activity and other security vulnerabilities
DAY 2: PREPARE AN EFFECTIVE RESPONSE
o Why a Cybersecurity Framework is urgently needed
o Using the Cybersecurity Framework to strengthen information security
o The Cybersecurity Framework from conceptualization to implementation
o Core of cybersecurity activities and references common across critical sectors
o Aligning standards, guidelines and practices with current vs. target profiles
o How the organization views cyber threats through the implementation tiers
DAY 3: DEPLOY AND MONITOR A SUCCESSFUL STRATEGY
o Social Engineering and Cognitive Biases
o How Information Security is Affected by Behavior Economics
o Today's Systems Development Environment
o Coordination
o Information sharing
o Planning and readiness
o Continuous Improvement
Cybersecurity Overview and Trends
Understanding the Cybersecurity Testing Method
The Basics of Security Architecture
To Phish or Not To Phish
Introduction to the Cybersecurity Framework
The Cybersecurity Framework Components
Establishing or Improving a Cybersecurity Program
Introduction to Cyber Network Defense
Social Engineering: How the “Weak Human Link” Can Become the Organization's Greatest
Strength
The Four Components of the Cyber Preparedness Continuum:
CYBERSECURITY
03 Days Masterclass
www.marcepinc.com info@marcepinc.comTel: 022-62210100 Cell: 09619046105
Three Days Training Agenda
Edgar Perez is a published author, business consultant for billion-dollar private equity and hedge funds,
and Council Member at the Gerson Lehrman Group. He has subject matter expertise in artificial
intelligence and deep learning, cyber security and financial regulation (Dodd-Frank Act).
He is author of The AI Breakthrough, How Artificial Intelligence is Advancing Deep Learning and
Revolutionizing Your World (2018), Knightmare on Wall Street, The Rise and Fall of Knight Capital and
the Biggest Risk for Financial Markets (2013), and The Speed Traders, An Insider’s Look at the New
High-Frequency Trading Phenomenon That is Transforming the Investing World, published in English by
McGraw-Hill Inc. (2011), 交易快手, published in Mandarin by China Financial Publishing House
(2012), and Investasi Super Kilat, published in Bahasa Indonesia by Kompas Gramedia (2012).
The Course Director:
th th th
28 - 29 - 30 June 2018 | MUMBAI
Examples of case studies included in Mr. Perez's
Masterclass in Cybersecurity:
Worldwide cyberattack by the WannaCry ransomware
cryptoworm
It targeted computers running the Microsoft Windows
operating system by encrypting data and demanding
ransom payments in Bitcoin
Within a day, it infected more than 230,000 computers in
over 150 countries
Britain's National Health Service (NHS), Telefónica,
FedEx and Deutsche Bahn were hit along with many
other companies worldwide
A security patch had been released by Microsoft on
March 2017; unfortunately, many organizations didn't
apply it until it was too late
The importance of using appropriate software and
having the latest security patches installed
Insights gained from organizations that proactively
leveraged cybersecurity to encourage customer
satisfaction and maximize retention
CASE STUDY 1: THE “WANNACRY” RANSOMWARE
ATTACK
Lack of cybersecurity discipline leading to crippling
business downtime
CASE STUDY 2: HOME DEPOT'S CUSTOMER DATA
HACK
From phishing attack to a vendor to a $179 million loss
September payment data systems breached (5 months'
worth of data)
56 million credit and debit cards, numbers, expiration dates
and CCVs
53 million customer email addresses
Hackers gained access to Home Depot's network by
phishing the login credentials of one of its vendors and
exploiting unpatched Windows vulnerability
Installed malware on self-checkout registers
As of March 2017, cost of the breach is at least $179
million
Final total likely to be much higher because of legal fees
and any other undisclosed payouts
CASE STUDY 3: 83 MILLION ACCOUNTS HACKED AT
JPMORGAN CHASE
Vendor Compromise Leading to Largest Financial
Services Breach
By July 2014, a Russian crime ring was able to amass 1.2
billion unique user name and password combinations
JPMorgan Chasedetermined that some of these
combinations allowed access to its Corporate Challenge
website
Hackers had obtained the website certificate from the site's
vendor, Simmco Data Systems; this allowed them to pose as
the race website operator and intercept traffic, such as race
participants' login credentials
A few weeks later, the bank learned that its systems had
been breached as well. Hackers tested stolen usernames
and passwords on an older system handling bank employee
benefits. When those worked, they tested the credentials on
other bank systems
Ultimately, JPMorgan Chase's attackers compromised 90
servers storing contact information for current and former
customers
The attack ultimately impacted 76 million households and 7
million small businesses
CASE STUDY 4: WHEN THE BEST TECHNOLOGY
CAN'T REPLACE HUMAN JUDGEMENT
Little Holiday Cheer as 40 Million Credit Cards
Numbers are Stolen
On December 12, 2013, the FBI alerted Target of a
massive data breach
Three days later, the firm confirmed an attack and
eradicated malware designed to steal credit card data
used at the firm's 1,797 stores surreptitiously installed in
their POS system
Six months earlier, the firm had begun installing a $1.6
million malware detection tool made by
FireEye.Specialists in Bangalore would monitor its
computers around the clock and alert the firm's IT team
in Minneapolis
By mid-November ,however, intruders had gained
access to the system by using stolen credentials from a
third-party vendor
On Saturday November 30, two days after
Thanksgiving, hackers were spotted by FireEye's tool as
they were ready to start data exfiltration. Bangalore got
an alert and flagged the firm's security team. They did
nothing
Target stood by as 40 million credit card numbers flowed
out of its computers
CYBERSECURITY
03 Days Masterclass
Mr. Edgar Perez Reference links:
https://goo.gl/DMhy9N
www.marcepinc.com info@marcepinc.comTel: 022-62210100 Cell: 09619046105
th th th
28 - 29 - 30 June 2018 | MUMBAI
https://goo.gl/sa7TKd
https://goo.gl/jaJfPX
Terms and Conditions
Payment terms - Upon completion and return of the registration form, full payment is required not later than 5 business days from the date of invoice. Payment must be received prior to the event date. Marcep Inc. reserves
the right to refuse admission to the event if payment has not been received.
Cancellation, postponement and substitution policy - You may substitute delegates at any time by providing reasonable advance notice to Marcep Inc. In the event that Marcep Inc. postpones an event for any reason and
the delegate is unable to attend on the revised date, you will receive full credit of the contract fee paid. On mutual agreement, you may use this credit for another Marcep Inc. event which must occur within one year from the
date of postponement. Except as specified above, no credits will be issued for cancellations.There are no refunds given under any circumstances.
Marcep Inc. is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/ postponement of an event. Marcep Inc. will not take any liability whatsoever if the event is cancelled, rescheduled
or postponed due to act of God, natural calamities or any other emergencies. Please note that while course speakers and topics were confirmed at the time of marketing, for circumstances beyond our control, the
organization reserves the right to substitute, alter or cancel the speakers and/or topics Marcep Inc. reserves the right to alter or modify the speakers and/or topics if necessary without any liability to you what so ever. Updates
on any substitutions or alterations will be provided as soon as possible.
Discounts All 'Early Bird' Discounts require payment at time of registration and before the cut-off date in order to receive any discount. Offered discounts by Marcep Inc. (including team discounts) must also require
payment at the time of registration.All discount offers will stand cancelled if payment is not received at the time of registration.
R
An ISO 9001:2015 CERTIFIED COMPANY
Marcep Inc.
Campz Landmark, Suite 103, 1st Floor, Next to TATA Motors,
S.V. Road Jogeshwari - West, Mumbai - 400102 - India
Tel: 022-62210100, Fax: 022- 62210103, Cell: 9167469140
Email: URL:info@marcepinc.com www.marcepinc.com
For group nomination reply on:queries
info@marcepinc.com
Participation Fees Includes: Workshop Documentation, Refreshment, Luncheon, Certificate Of Participation
Non- Residential Training:
Payment Term:
Payment Is Required Within 5 Working Days From the Date
Of Invoice. Account Transfer/Cheque/DD Should Be In Favour
Of “Marcep Inc.” Payable At Par In Mumbai.
Investment fees
01 Delegate - (Base Price)INR: 35,500/-
Additional GST of 18% is applicable
Sales Hotline No.:
or email: raj@marcepinc.com
9619046105
I / We Hereby Confirm To The Above And Authorize Our Participants To The Programme. Please Send The Invoice To:
Company Name:
Nominating Authority:
Designation: Email:
Company Postal Address:
Tel No.:
* Signature is Required for Booking
Signature
Cell No.:
Organisation Details & Authorization:
Please register the following delegate/s
(For Additional delegates photocopy this form)
DELEGATE DETAILS
www.marcepinc.com
Mailing Address:
Name Designation Email Location
CYBERSECURITY
03 Days Masterclass
Registration Form: CS 2018
th th th
28 - 29 - 30 June 2018 | MUMBAI

More Related Content

What's hot

Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
Strategy&, a member of the PwC network
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
Insights success media and technology pvt ltd
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
Stephanie Holman
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Information Security
Information SecurityInformation Security
Information Security
trunko
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
EMC
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
Roen Branham
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
Management Events
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
Tatainteractive1
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
Nexon Asia Pacific
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 

What's hot (20)

Risky Business
Risky BusinessRisky Business
Risky Business
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Information Security
Information SecurityInformation Security
Information Security
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 

Similar to Cyber security master class 2018

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
preetichaubey4
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
Kate Dalakova
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
thinkwithniche
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
K7 Computing Pvt Ltd
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
K7 Computing Pvt Ltd
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
AbimbolaFisher1
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
 

Similar to Cyber security master class 2018 (20)

Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 

More from Sanjana Khound

Construction quality control site inspection training (2) pages-deleted
Construction quality control  site inspection training (2) pages-deletedConstruction quality control  site inspection training (2) pages-deleted
Construction quality control site inspection training (2) pages-deleted
Sanjana Khound
 
Steam and water analysis system 1
Steam and water analysis system 1Steam and water analysis system 1
Steam and water analysis system 1
Sanjana Khound
 
Steps to boiler chemical cleaning and treatment selection
Steps to boiler chemical cleaning and treatment selectionSteps to boiler chemical cleaning and treatment selection
Steps to boiler chemical cleaning and treatment selection
Sanjana Khound
 
Troubleshooting chemical plants training
Troubleshooting chemical plants trainingTroubleshooting chemical plants training
Troubleshooting chemical plants training
Sanjana Khound
 
Extending service life of old structures
Extending service life of old structuresExtending service life of old structures
Extending service life of old structures
Sanjana Khound
 
Pharmaceutical csv training
Pharmaceutical csv trainingPharmaceutical csv training
Pharmaceutical csv training
Sanjana Khound
 

More from Sanjana Khound (6)

Construction quality control site inspection training (2) pages-deleted
Construction quality control  site inspection training (2) pages-deletedConstruction quality control  site inspection training (2) pages-deleted
Construction quality control site inspection training (2) pages-deleted
 
Steam and water analysis system 1
Steam and water analysis system 1Steam and water analysis system 1
Steam and water analysis system 1
 
Steps to boiler chemical cleaning and treatment selection
Steps to boiler chemical cleaning and treatment selectionSteps to boiler chemical cleaning and treatment selection
Steps to boiler chemical cleaning and treatment selection
 
Troubleshooting chemical plants training
Troubleshooting chemical plants trainingTroubleshooting chemical plants training
Troubleshooting chemical plants training
 
Extending service life of old structures
Extending service life of old structuresExtending service life of old structures
Extending service life of old structures
 
Pharmaceutical csv training
Pharmaceutical csv trainingPharmaceutical csv training
Pharmaceutical csv training
 

Recently uploaded

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 

Recently uploaded (20)

Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 

Cyber security master class 2018

  • 1. CYBER SECURITY 03 Days Masterclass th th th 28 - 29 - 30 June 2018 | MUMBAI By Mr. Edgar Perez: a well renowned industry expert worldwide We're in the stone age of cyber security. Real learning will only come after the 1st major incident. . . . . . Dr Christopher Frei As information technology becomes ever more complex and Internet usage increasingly widespread, cybersecurity is becoming an increasingly important and business-critical field. Unfortunately, most organizations are not prepared to handle cybersecurity threats. In fact, 66% of IT and security professionals say that their firms are unprepared to recover from a cyberattack. A key example of this unpreparedness is the fact that many of the companies impacted by the recent WannaCry attack didn't install critical updates into their Windows infrastructure that had been released by Microsoft back in March. Attempting to disrupt the landscape of technologies focused on cybersecurity is artificial intelligence and, more specifically, deep learning. Taking the flexibility and thinking capacity of the human mind, digitizing it, and creating a genius system faster, more consistent and potentially more capable than any human brain, deep learning is now plowing through colossal mountains of data, often in real time, to uncover new and often unexpected relationships, providing unique insights into threats, and empowering improvements to machine learning models and mitigation processes. One of the benefits of these technologies will be to enable analysts or threat responders to focus on the half-dozen critical events of the day (rather than distill 50,000 erroneous alerts generated each day). Edgar Perez's Masterclass in Cybersecurity will bring CEOs, board members and top executives up to speed on the most recent technologies (such as artificial intelligence) and battle-tested approaches to protect their companies' valuable information and intellectual property from prying eyes of hackers and competitors, and leverage their cyber success in both cultivating stronger relationships with current and new clients and safeguarding the interests of all stakeholders, partners and employees. CS 2018 www.marcepinc.com info@marcepinc.comTel: 022-62210100 Cell: 09619046105 LATEST INDUSTRY INSIGHTS IDENTIFY THREATS & OPPORTUNITIES DEVELOP A CYBERSECURITY PLAN
  • 2. DAY 1: UNDERSTAND THE LOOMING THREAT o Understanding today's cyber attacks o How to get better at responding to cyber threats o Combating today's attacks with 21st century tools o Anatomy of a cyberattack explained o Cybersecurity testing as a component of a strong governance process o Protection of firm networks and client information o Detection of unauthorized activity and other security vulnerabilities DAY 2: PREPARE AN EFFECTIVE RESPONSE o Why a Cybersecurity Framework is urgently needed o Using the Cybersecurity Framework to strengthen information security o The Cybersecurity Framework from conceptualization to implementation o Core of cybersecurity activities and references common across critical sectors o Aligning standards, guidelines and practices with current vs. target profiles o How the organization views cyber threats through the implementation tiers DAY 3: DEPLOY AND MONITOR A SUCCESSFUL STRATEGY o Social Engineering and Cognitive Biases o How Information Security is Affected by Behavior Economics o Today's Systems Development Environment o Coordination o Information sharing o Planning and readiness o Continuous Improvement Cybersecurity Overview and Trends Understanding the Cybersecurity Testing Method The Basics of Security Architecture To Phish or Not To Phish Introduction to the Cybersecurity Framework The Cybersecurity Framework Components Establishing or Improving a Cybersecurity Program Introduction to Cyber Network Defense Social Engineering: How the “Weak Human Link” Can Become the Organization's Greatest Strength The Four Components of the Cyber Preparedness Continuum: CYBERSECURITY 03 Days Masterclass www.marcepinc.com info@marcepinc.comTel: 022-62210100 Cell: 09619046105 Three Days Training Agenda Edgar Perez is a published author, business consultant for billion-dollar private equity and hedge funds, and Council Member at the Gerson Lehrman Group. He has subject matter expertise in artificial intelligence and deep learning, cyber security and financial regulation (Dodd-Frank Act). He is author of The AI Breakthrough, How Artificial Intelligence is Advancing Deep Learning and Revolutionizing Your World (2018), Knightmare on Wall Street, The Rise and Fall of Knight Capital and the Biggest Risk for Financial Markets (2013), and The Speed Traders, An Insider’s Look at the New High-Frequency Trading Phenomenon That is Transforming the Investing World, published in English by McGraw-Hill Inc. (2011), 交易快手, published in Mandarin by China Financial Publishing House (2012), and Investasi Super Kilat, published in Bahasa Indonesia by Kompas Gramedia (2012). The Course Director: th th th 28 - 29 - 30 June 2018 | MUMBAI
  • 3. Examples of case studies included in Mr. Perez's Masterclass in Cybersecurity: Worldwide cyberattack by the WannaCry ransomware cryptoworm It targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in Bitcoin Within a day, it infected more than 230,000 computers in over 150 countries Britain's National Health Service (NHS), Telefónica, FedEx and Deutsche Bahn were hit along with many other companies worldwide A security patch had been released by Microsoft on March 2017; unfortunately, many organizations didn't apply it until it was too late The importance of using appropriate software and having the latest security patches installed Insights gained from organizations that proactively leveraged cybersecurity to encourage customer satisfaction and maximize retention CASE STUDY 1: THE “WANNACRY” RANSOMWARE ATTACK Lack of cybersecurity discipline leading to crippling business downtime CASE STUDY 2: HOME DEPOT'S CUSTOMER DATA HACK From phishing attack to a vendor to a $179 million loss September payment data systems breached (5 months' worth of data) 56 million credit and debit cards, numbers, expiration dates and CCVs 53 million customer email addresses Hackers gained access to Home Depot's network by phishing the login credentials of one of its vendors and exploiting unpatched Windows vulnerability Installed malware on self-checkout registers As of March 2017, cost of the breach is at least $179 million Final total likely to be much higher because of legal fees and any other undisclosed payouts CASE STUDY 3: 83 MILLION ACCOUNTS HACKED AT JPMORGAN CHASE Vendor Compromise Leading to Largest Financial Services Breach By July 2014, a Russian crime ring was able to amass 1.2 billion unique user name and password combinations JPMorgan Chasedetermined that some of these combinations allowed access to its Corporate Challenge website Hackers had obtained the website certificate from the site's vendor, Simmco Data Systems; this allowed them to pose as the race website operator and intercept traffic, such as race participants' login credentials A few weeks later, the bank learned that its systems had been breached as well. Hackers tested stolen usernames and passwords on an older system handling bank employee benefits. When those worked, they tested the credentials on other bank systems Ultimately, JPMorgan Chase's attackers compromised 90 servers storing contact information for current and former customers The attack ultimately impacted 76 million households and 7 million small businesses CASE STUDY 4: WHEN THE BEST TECHNOLOGY CAN'T REPLACE HUMAN JUDGEMENT Little Holiday Cheer as 40 Million Credit Cards Numbers are Stolen On December 12, 2013, the FBI alerted Target of a massive data breach Three days later, the firm confirmed an attack and eradicated malware designed to steal credit card data used at the firm's 1,797 stores surreptitiously installed in their POS system Six months earlier, the firm had begun installing a $1.6 million malware detection tool made by FireEye.Specialists in Bangalore would monitor its computers around the clock and alert the firm's IT team in Minneapolis By mid-November ,however, intruders had gained access to the system by using stolen credentials from a third-party vendor On Saturday November 30, two days after Thanksgiving, hackers were spotted by FireEye's tool as they were ready to start data exfiltration. Bangalore got an alert and flagged the firm's security team. They did nothing Target stood by as 40 million credit card numbers flowed out of its computers CYBERSECURITY 03 Days Masterclass Mr. Edgar Perez Reference links: https://goo.gl/DMhy9N www.marcepinc.com info@marcepinc.comTel: 022-62210100 Cell: 09619046105 th th th 28 - 29 - 30 June 2018 | MUMBAI https://goo.gl/sa7TKd https://goo.gl/jaJfPX
  • 4. Terms and Conditions Payment terms - Upon completion and return of the registration form, full payment is required not later than 5 business days from the date of invoice. Payment must be received prior to the event date. Marcep Inc. reserves the right to refuse admission to the event if payment has not been received. Cancellation, postponement and substitution policy - You may substitute delegates at any time by providing reasonable advance notice to Marcep Inc. In the event that Marcep Inc. postpones an event for any reason and the delegate is unable to attend on the revised date, you will receive full credit of the contract fee paid. On mutual agreement, you may use this credit for another Marcep Inc. event which must occur within one year from the date of postponement. Except as specified above, no credits will be issued for cancellations.There are no refunds given under any circumstances. Marcep Inc. is not responsible for any loss or damage as a result of a substitution, alteration or cancellation/ postponement of an event. Marcep Inc. will not take any liability whatsoever if the event is cancelled, rescheduled or postponed due to act of God, natural calamities or any other emergencies. Please note that while course speakers and topics were confirmed at the time of marketing, for circumstances beyond our control, the organization reserves the right to substitute, alter or cancel the speakers and/or topics Marcep Inc. reserves the right to alter or modify the speakers and/or topics if necessary without any liability to you what so ever. Updates on any substitutions or alterations will be provided as soon as possible. Discounts All 'Early Bird' Discounts require payment at time of registration and before the cut-off date in order to receive any discount. Offered discounts by Marcep Inc. (including team discounts) must also require payment at the time of registration.All discount offers will stand cancelled if payment is not received at the time of registration. R An ISO 9001:2015 CERTIFIED COMPANY Marcep Inc. Campz Landmark, Suite 103, 1st Floor, Next to TATA Motors, S.V. Road Jogeshwari - West, Mumbai - 400102 - India Tel: 022-62210100, Fax: 022- 62210103, Cell: 9167469140 Email: URL:info@marcepinc.com www.marcepinc.com For group nomination reply on:queries info@marcepinc.com Participation Fees Includes: Workshop Documentation, Refreshment, Luncheon, Certificate Of Participation Non- Residential Training: Payment Term: Payment Is Required Within 5 Working Days From the Date Of Invoice. Account Transfer/Cheque/DD Should Be In Favour Of “Marcep Inc.” Payable At Par In Mumbai. Investment fees 01 Delegate - (Base Price)INR: 35,500/- Additional GST of 18% is applicable Sales Hotline No.: or email: raj@marcepinc.com 9619046105 I / We Hereby Confirm To The Above And Authorize Our Participants To The Programme. Please Send The Invoice To: Company Name: Nominating Authority: Designation: Email: Company Postal Address: Tel No.: * Signature is Required for Booking Signature Cell No.: Organisation Details & Authorization: Please register the following delegate/s (For Additional delegates photocopy this form) DELEGATE DETAILS www.marcepinc.com Mailing Address: Name Designation Email Location CYBERSECURITY 03 Days Masterclass Registration Form: CS 2018 th th th 28 - 29 - 30 June 2018 | MUMBAI