SlideShare a Scribd company logo
US $6Trl lost to cybercrime
every year. more profitable than global trade of all drugs.
US $6Trl lost to cybercrime
half the GDP of china
US $6Trl lost to cybercrime
333 times the GDP of North Korea
US $6Trl lost to cybercrime
12 times the gross yield from global gambling market
you can be hacked
let me turn your digitally monitored implantable device off
we are under attack
by 2019 ransomware will hit a company every 14 seconds
harder to detect
attackers hide in encrypted legitimate cloud traffic
the big data bang
200 billion smart devices connected by 2020
who survives wins big
prepared, informed, armed
security at the core
for
peace of
mind
situational awareness
what are the threats and what do they mean for you
#BECYBERRESILIENT
cybersecurity hygene
brush those old patches, floss those vulnerabilities
employee awareness
build cybersecurity consciousness, achieve nirvana
active defence
put your SOC on, protect your crown jewels
regulatory security support
and cyberdefence

More Related Content

What's hot

Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
Andrew Manoske
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
Mubarak Al Hadadi
 
10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
Entefy
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network security
Great Bay Software
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
Money 2Conf
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
Courion Corporation
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Core Security
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
eLearning Consortium 電子學習聯盟
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
Venafi
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
DarraghCommsec
 
NCSO
NCSONCSO
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
Bee_Ware
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Venafi
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
NTT Innovation Institute Inc.
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
Tripwire
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
prcircle
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 

What's hot (18)

Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
 
10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West 10 Signs data privacy is the new Wild West
10 Signs data privacy is the new Wild West
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network security
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
NCSO
NCSONCSO
NCSO
 
IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 

Similar to Cybersecurity in the gambling industry

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
NCCOMMS
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
QUICK HEAL TECHNOLOGIES LIMITED
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
QUICK HEAL TECHNOLOGIES LIMITED
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
Sarah Jarvis
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
Edology
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurity
Eboney Brown
 
How CyberSecurity Affects Society
How CyberSecurity Affects SocietyHow CyberSecurity Affects Society
How CyberSecurity Affects Society
Chika Wonah
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
Ahmed Abu Eldahab
 
cyber security
cyber securitycyber security
cyber security
FardeenBhat
 
Hack
HackHack
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
PranavRaj96
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
BetaBeta9
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
Mext Metaverse
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
XNSPY
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
centralohioissa
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
Lode Palle Importance of Cybersecurity.pptx
Lode Palle  Importance of Cybersecurity.pptxLode Palle  Importance of Cybersecurity.pptx
Lode Palle Importance of Cybersecurity.pptx
Lode Emmanuel Palle
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
dineshgarhwal77
 

Similar to Cybersecurity in the gambling industry (20)

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Combatting the threats your data faces
Combatting the threats your data faces Combatting the threats your data faces
Combatting the threats your data faces
 
Business inSecurity
Business inSecurityBusiness inSecurity
Business inSecurity
 
How CyberSecurity Affects Society
How CyberSecurity Affects SocietyHow CyberSecurity Affects Society
How CyberSecurity Affects Society
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
 
cyber security
cyber securitycyber security
cyber security
 
Hack
HackHack
Hack
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
article cybersecurity must B2B metaverse
article cybersecurity must B2B metaversearticle cybersecurity must B2B metaverse
article cybersecurity must B2B metaverse
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
Lode Palle Importance of Cybersecurity.pptx
Lode Palle  Importance of Cybersecurity.pptxLode Palle  Importance of Cybersecurity.pptx
Lode Palle Importance of Cybersecurity.pptx
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 

Cybersecurity in the gambling industry

Editor's Notes

  1. Big relevant Change in the world. The 2016 Cybercrime Report from Cybersecurity Ventures predicts cyber crime will cost the world in excess of $6 trillion annually by 2021, making it more profitable than the global trade of all major illegal drugs combined. It is a global phenomenon that does not leave anybody untouched.
  2. Big relevant Change in the world It is half the GDP of China. Cybercrime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal cost of business, forensic investigation, restoration and deletion of hacked data and systemsand reputational harm.
  3. Big relevant Change in the world Several time that of North Korea. Both countries appear to be very active in perpetrating cyberattacks.
  4. Big relevant Change in the world It is 12 times the gross gaming yield from the global gambling market
  5. Do you know that you can be hacked? Not something outside you, something inside you. Hundred of thousands – and possibly millions – of people can be hacked now via their wirelessly connected and digitally monitored implantable medical devices (IMDs), which include cardioverter defibrillators (ICD), pacemakers, deep brain neurostimulators, insulin pumps, ear tubes, and much more every day as technology improves. 45 trillion networked sensors 20 years from now.
  6. MALWARE By highlighting a shift in the world, you get prospects to open up about how that shift affects them, how it scares them, and where they see opportunities. Our companies have some of the largest transactional platforms that exist on the planet. They are easily the target of increasingly sophisticated attacks. In 2017 we have witnessed hackers taking malware to unprecedented levels of sophistication and impact. (ACR18p3) And all it takes is for someone within your organisation to open the wrong file, or navigate to the wrong website. Entire gaming operations have been brought down simply because someone within the customer support team opened what they thought was the screenshot sent by a customer, which turned out to be a malicious file – ransomware – which paralysed the entire organisation. Have you heard of WannaCry? The attack that brought down the entire UK health system in 2017. Currently every 40 seconds, a business falls victim to a ransomware attack. This will rise to every 14 seconds by 2019. Stealing of high rollers information. Malware, inside threats. Buying employees out that make small money through salary. Support opens screenshot sent from client that is complaining about the service. Fraud. Hacker playing 4 out of 5 players in the game. Repitation and information are your asset.
  7. WEAPONIZING CLOUD SERVICES By highlighting a shift in the world, you get prospects to open up about how that shift affects them, how it scares them, and where they see opportunities. What we also noticed in 2017 is that adversaries are becoming more adept at evasion— and weaponizing cloud services and other technology used for legitimate purposes. ACR18p3 By mixing their encrypted traffic with that of legitimate cloud based organisations – like Google, Amazon, Spotify – they became virtually impossible to detect. You have probably heard of DDoS attacks. These now involve an increasingly larger amount of traffic. Burst tactics are typically aimed at gaming websites and service providers due to their targets’ sensitivity to service availability and their inability to sustain such attack maneuvers. Timely or random bursts of high traffic rates over a period of days or even weeks can leave these organizations with no time to respond, causing severe service disruptions. ACR18p32 Stealing of high rollers information. Malware, inside threats. Buying employees out that make small money through salary. Support opens screenshot sent from client that is complaining about the service. Fraud. Hacker playing 4 out of 5 players in the game. Repitation and information are your asset.
  8. INTERNET OF THINGS GAPS IN SECURITY Plus we are getting into the habit of connecting everything around us. Adversaries are exploiting undefended gaps in security, many of which stem from the expanding Internet of Things (IoT) and use of cloud services. Microsoft predicts that data volumes online will be 50 times greater in 2020 than they were in 2016. 2 billion objects in 2006 to 200 billion objects by 2020 (Intel) An attacker might have the ability to turn off life support systems in hospitals or take control of connected cars on the road.
  9. WINNER AND LOSERS THE CHANGE WILL CREATE WINNERS AND LOOSER WINNER: have the essential, healthy life and cybersecurity strategy. Winners are those who know that it is just a matter of time before you are attacked. If you think you are safe, you a re delusional. You must be ready at all time to confront attack. LOSERS: They think they are safe, that they have a tool that does everything for them.
  10. The winners are those organisations that are confident that they have fully considered the information security implications of their current strategy and that their risk landscape incorporates and monitors relevant cyberthreats, vulnerability and risks.
  11. Having put security at the heart of the organisation’s strategy, they have maintained and even enhanced the trust of their customers, regulators and the media. By making cybersecurity a core part of their business strategy and culture, they have enabled the entire organisation to understand the risk they faced, embraced the innovation needed to counter those risks and had the resilience to regroup and restore operations smoothly and efficiently after a cyber breach. LIVE LIVE LIVE LIVE LIVE LIVE Organizations need an integrated cybersecurity vision – one that brings together the various functions and dependencies with other parts of the organization, external key stakeholders and third party suppliers.
  12. You will be able to go to sleep. You will be able to go on holiday.
  13. WIZARD 1 The first step for organizations seeking to enhance their cybersecurity ability is to develop a better understanding the nature of the threat to them. It will be impossible to build greater cybersecurity resilience winto the organisation without first identifying the causes of harm and how they might manifest themselves. Spear phishing, rogue employees planted to undertake espionage, leveraging of security gapscreated by convergence between personal and corporate devices on the network.
  14. WIZARD 2 With good cybersecurity hygiene in place it should be possible to prevent a very sizable proportion of common attackes. For the next few years, patching known vulnerabilities and removing web servers vulnerability could be the most impactful actions for boosting your cybersecurity. Implementing first-line-of-defense tools that can scale, like cloud security platforms. • Confirming that they adhere to corporate policies and practices for application, system, and appliance patching. • Employing network segmentation to help reduce outbreak exposures. • Adopting next-generation endpoint process monitoring tools. • Accessing timely, accurate threat intelligence data and processes that allow for that data to be incorporated into security monitoring and eventing. • Performing deeper and more advanced analytics. • Reviewing and practicing security response procedures. • Backing up data often and testing restoration procedures—processes that are critical in a world of fast-moving, network-based ransomware worms and destructive cyber weapons. • Reviewing third-party efficacy testing of security technologies to help reduce the risk of supply chain attacks. • Conducting security scanning of microservice, cloud service, and application administration systems. • Reviewing security systems and exploring the use of SSL analytics—and, if possible, SSL decryption.
  15. WIZARD 3 Employee awareness is a crucial frontline defence, building cybersecurity consciousness and password discipline throughout the organization. 90% of all attacks happen because of employee negligence: phishing attacks.
  16. WIZARD 4 SOC are moving into active defence – a deliberately planned and continuously executed campaign that aims to identify and remove hidden attackers and defeat likely threat scenarios targeting the organization’s most critical assets Crown jewels are the most valuable assets of an organization, must identify and protect well. CyberHat’s SOC The hackers point of view. If you think like the enemy, you will be one step ahead of the competition. Everything from the first moment `[visibility of network, team monitoring your network 24/4, team optimizing your security tools, so you get th eright messages, the right warning, high level forensic experts, intelligence team (threat intelligence and hunting)] Incidence response team, so if something happens you have someone that can help you the attacker. IBM can send you consultants at 500/hour and in one week. Extension of your team. Combination of all capability in house very rare. Not many companies will have in house capabilities, the ones that claim they have it they a re subcontracting. Developed internal technologies and methodologies that help us manage all these capabilities. Core is people, Israeli army experience. Exposure make expertise and technology better every day. Technology agnostic helps being up to date.
  17. The road to the promised land is littered with obstacles so prospects are sceptical about our ability to deliver. What is the best evidence that we can offer that we can make the story we are telling come true?