SlideShare a Scribd company logo
Webinar 3:
Cybersecurity /
Coronavirus Homeworking
Challenge
Programme
 Introduction by Toon Vanagt
 Fintech industry: A reliable partner
for the financial sector by Professor
Georges Ataya
o Case studies
o What methods should be put in place?
o The skills that are lacking
o Certifications
Your Speakers
Georges Ataya
Academic Director at Solvay Brussels School
Managing partner Ataya & partner
Co-Founder of the Belgian Cybersecurity Coalition
Co-founder DPO Circle
Member of the Advisory Boards at Agoria, BECI, CIONET,
ISACA
Past International Vice President at ISACA and co-
founder of the body of knowledge of CISM and CGEIT
Toon Vanagt
Host, Board of FinTech Belgium
CEO of data.be
Cybersecurity context
Fintech concerns for Cybersecurity
European regulations and guidelines
Certification for SME
Cybersecurity skills assessment
Competences and knowledge
Professional certification
Cybersecurity
for FINTECH
Prof. Georges Ataya
Urgent Cyber Security Issues
1. Financial Crimes
2.The Rise of Multi-Cloud Computing
3. Third-Party and Supply Chain Attacks
4. Shortage of Cybersecurity Professionals
5. More Sophisticated Phishing Exploits
6. Cyber Attacks on the Grid
7. Personal Attacks
8. State-Sponsored Attacks
9. IoT and Autonomous Systems
10. Smart Health Devices and EMR
“Cyber crime is big
business, with the most
elite hackers earning a cool
half a million dollars a
year just to test system
security; the bad guys are
raking in billions”.
Source: www.csoonline.com
The 14 biggest data breaches of the 21st
century
Adobe
Date: October 2013
Impact: 153 million user records
Adult Friend Finder
Date: October 2016
Impact: 412.2 million accounts
Canva
Date: May 2019
Impact: 137 million user accounts
eBay
Date: May 2014
Impact: 145 million users
Equifax
Date: July 29, 2017
Impact: 147.9 million consumers
LinkedIn
Date: 2012 (and 2016)
Impact: 165 million user accounts
Marriott International
Date: 2014-18
Impact: 500 million customers
Yahoo
Date: 2013-14
Impact: 3 billion user accounts
Sources of external threat
Intelligence
Agencies
Criminal
Groups
Terrorist
Groups
Activist
Groups
Armed
Forces
7
The fact that there’re many cases in which large
traditional banks have failed to protect the data of
their customers do not imply that Fintech is better
than other financial institutions
Source: FSBT.TECH (Open API Platform)
A report by PWC indicates that it is easy for the new
banks to focus on securing the activities of their
clients on their systems than for large conventional
banks.
EU RegulationseIDAS
setting the security and notification
requirements for digital service providers and
build national capabilities
help to manage digital identities by providing
online trust and allows citizens and business to
use national eID and trust services across borders
gives control to individuals over their personal
data and to simplify the regulatory
environment for international business
eIDAS
framework for European Cybersecurity
Certificates for products, processes and
services that will be valid throughout the EU
Cyber Security Coalition & CCB Elements of the scheme
Page 13
Cybersecurity Fundamentals for SME
Plan your cyber security
• Understand the enterprise context
• Management commitment
• Training, communication and awareness
• Custom made or internally developed software and hardware
• Incident management basics
Manage risks for your most important assets
• Inventory of IT devices
• Risk management (Predefined)
• Information classification and handling (minimum mores)
• Backups and Restore
Cybersecurity Technical measures
• Firewalls
• Secured configuration
• User access controls
• Malware
• Patch management
• Email Security
https://cyberguide.ccb.belgium.be/en
Cyber Security Coalition & CCB Elements of the scheme
Page 14
Cybersecurity Fundamentals for SME
https://cyberguide.ccb.belgium.be/en
Project 1 Project 2 Project 3 Project 4 Project 5
Self-assessment
questionnaire &
tool
Promotion &
Communication
Advice
Development
Labelling
Currently on hold
Registry of
specialists &
solution providers
Awareness Campaigns
15
Cybersecurity
Awareness
Corporate and general Management
Application Development
Business managers and Users
IT Professionals
Information Security Professionals
Awareness Classes
Incident Management
Guide
16
Rising risks in the digital economy
Building higher defensive walls and
installing defense-in-depth solutions
© Copyright ICTC.EU 2017© 2017 ICT Control NV SA - No reproduction or reuse 18
Source ISACA.ORG 19
What level of
protection do
we need?
IDENTIFY
DETECT
PROTECT
RESPOND
Cybersecurity processes
20
RECOVER © 2015 ICTC.EU
IDENTIFY
DETECT
PROTECT
RECOVER
RESPOND
Functions
Develop and implement
Cybersecurity processes
21
DETECT
DE.AE-5: Incident alert
thresholds are established
DE.AE-1
DE.AE-2
DE.AE-3
DE.AE-4
• COBIT 5 APO12.06
• ISA 62443-2-1:2009 4.2.3.10
• NIST SP 800-53 Rev. 4 IR-4, IR-5, IR-8
Anomalies and Events (DE.AE):
Anomalous activity is detected
in a timely manner and the
potential impact of events is
understood.
© 2015 ICTC.EU
22© 2017 ICT Control NV SA - No reproduction or reuse
The need for good business
practices
24
A MANAGER FOR CYBER SECURITY
PROTECTION and INCIDENT MANAGEMENT
Information Security Governance
Information Security Incident
Management
Information Security Program
Development & Management
Information Risk Management
& Compliance
SHORTAGES OF DIGITAL PROFESSIONALS
10 avril 2020 ©2020 Ataya & Partners. All Rights Reserved 25
TECH TRENDS WITH STAFFING NEEDS
Machine learning; Big data
Blockchain
Digital transformation
Cyber security; IoT security;
Cloud; Privacy by design
3D printing
Agile and a DevOps;
Technical debt and legacy debt
Various sources
INFORMATION SECURITY PROFESSIONS
1. App security engineer
2. Cyber security consultant
3. Data protection officer
4. Chief security officer
5. Security analyst
6. Security engineer
7. Security architect
8. Security and penetration testing expert
Source: esecurityplanet.com
CYBERSECURITY PROFESSIONS
1. Ethical hacker
2. Information Security Analyst
3. Penetration Tester/Vulnerability Analyst
4. Digital Forensic Analyst
5. Security Software Developer
6. Chief Information Security Officer (CISO)
7. Network Engineer/Security Architect
8. Incident Handler
source: eccouncil.org
26
ASSESSMENT OF
SKILLS
IN
DIGITAL GOVERNANCE,
TECHNOLOGY, AND
TRUST
Academy.atayapartners.com/fintech-sessions
DREAM. LEARN. LEAD.
• THANKS
Full online Education
Starting in April 2020
S2 (CISSP preparation)
G2 (COBIT 2019)
B2 (Data Management)
M2 (Application development)
April and
May 2020
28Academy.atayapartners.com/fintech-sessions
Graduation photo Trusted Fintech Program 2018-2019
//academy.atayapartners.com
Academy.atayapartners.com/fintech-sessions
Georges Ataya
Professor, founder and Academic Director of Digital and information
security management at SBS-EM
Co-Fouder of the Belgian Cybersecurity Coalition
Co-founder DPO Circle
Member of the Advisory Board: Agoria, BECI, CIONET, ISACA, belgian
Cybersecurity Coalition
Managing Director ICT Control advisory firm
Founded IT Management Academy
Past International Vice President at ISACA
Past Partner Ernst & Young
Past Deputy International CIO ITT World Directories
Previously Project Manager and Senior IT Auditor
Linkedin: ataya
Academy.atayapartners.com/fintech-sessions
• NEXT FRIDAY AT 14PM:
Webinar: Financial crisis survival / Coronavirus
Homeworking Challenge
• NEXT THURSDAY APRIL 23rd:
Digital Classroom: How to become and stay
licensed in Belgium?, April 23rd from 2pm to
6pm, in collaboration with Febelfin Academy

More Related Content

What's hot

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
Bart Van Den Brande
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial Services
Olivier Busolini
 
SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019
Dale Butler
 
IoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratioIoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratioJohn Moor
 
Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015
Jane Lambert
 
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
Andris Soroka
 
PCI in the Contact Centre
PCI in the Contact CentrePCI in the Contact Centre
PCI in the Contact Centre
silverliningUK
 
NCVO/Zurich webinar: Safeguarding through covid-19 and beyond
NCVO/Zurich webinar: Safeguarding through covid-19 and beyondNCVO/Zurich webinar: Safeguarding through covid-19 and beyond
NCVO/Zurich webinar: Safeguarding through covid-19 and beyond
NCVO - National Council for Voluntary Organisations
 
Indjic fintech module 2
Indjic fintech module 2Indjic fintech module 2
Indjic fintech module 2
Drago Indjic
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
Dale Butler
 
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by  Koen VingerhoetsFintech Belgium Summit 2017 - Blockchain - KBC - by  Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen Vingerhoets
FinTech Belgium
 
Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)
EOSC-hub project
 

What's hot (14)

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos20210526 cybersafety first! Sirius Legal webinar for Comeos
20210526 cybersafety first! Sirius Legal webinar for Comeos
 
Yet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial ServicesYet another cybersecurity framework for Financial Services
Yet another cybersecurity framework for Financial Services
 
SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019SMi Group's Benelux Infrastructure Forum 2019
SMi Group's Benelux Infrastructure Forum 2019
 
IoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratioIoT Security Foundation launch 23 Sept 2015 16-9ratio
IoT Security Foundation launch 23 Sept 2015 16-9ratio
 
Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015Ipo ip for business conference presentation slides 2 july 2015
Ipo ip for business conference presentation slides 2 july 2015
 
MOBES project
MOBES projectMOBES project
MOBES project
 
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)
 
PCI in the Contact Centre
PCI in the Contact CentrePCI in the Contact Centre
PCI in the Contact Centre
 
NCVO/Zurich webinar: Safeguarding through covid-19 and beyond
NCVO/Zurich webinar: Safeguarding through covid-19 and beyondNCVO/Zurich webinar: Safeguarding through covid-19 and beyond
NCVO/Zurich webinar: Safeguarding through covid-19 and beyond
 
Indjic fintech module 2
Indjic fintech module 2Indjic fintech module 2
Indjic fintech module 2
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by  Koen VingerhoetsFintech Belgium Summit 2017 - Blockchain - KBC - by  Koen Vingerhoets
Fintech Belgium Summit 2017 - Blockchain - KBC - by Koen Vingerhoets
 
Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)Guardomic: EOSC-hub week demo (Prague)
Guardomic: EOSC-hub week demo (Prague)
 

Similar to Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge - 03-04-20

SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
Dale Butler
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
Beawre pitch
Beawre pitchBeawre pitch
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
Dale Butler
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
alvin chin
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
TelecomValley
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
Dale Butler
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
Radouane Mrabet
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
accenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
#essaywriting
 
sample assignment
sample assignmentsample assignment
sample assignment
#essaywriting
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
SeasiaInfotech2
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
koushikichakraborty3
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
S .Ali Raza
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
The Digital Insurer
 

Similar to Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge - 03-04-20 (20)

SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conferenceSMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
SMi Group's 7th annual European Smart Grid Cyber Security 2017 conference
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
Cyber-menaces et cyber-préjudices : regards croisés par Gilles DESOBLIN & Red...
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023Generali France Risk care – Insurer Innovation Award 2023
Generali France Risk care – Insurer Innovation Award 2023
 

More from FinTech Belgium

Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
Digital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners BrochureDigital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners Brochure
FinTech Belgium
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024
FinTech Belgium
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
FinTech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
FinTech Belgium
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
FinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
FinTech Belgium
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
FinTech Belgium
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
FinTech Belgium
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
FinTech Belgium
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
FinTech Belgium
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
FinTech Belgium
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
FinTech Belgium
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
FinTech Belgium
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
FinTech Belgium
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
FinTech Belgium
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
FinTech Belgium
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
FinTech Belgium
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
FinTech Belgium
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
FinTech Belgium
 

More from FinTech Belgium (20)

Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
Digital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners BrochureDigital Finance Summit 2024 Partners Brochure
Digital Finance Summit 2024 Partners Brochure
 
Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024Fintech Belgium General Assembly and Anniversary Event 2024
Fintech Belgium General Assembly and Anniversary Event 2024
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
 

Recently uploaded

what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
DOT TECH
 
how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.
DOT TECH
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
va2132004
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
Writo-Finance
 
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
ydubwyt
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
DOT TECH
 
Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...
Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...
Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...
beulahfernandes8
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
DOT TECH
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
telilaalilemlem
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
Falcon Invoice Discounting
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
Commercial Bank of Ceylon PLC
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
Avanish Goel
 
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit CardPoonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
nickysharmasucks
 

Recently uploaded (20)

what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
 
how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
 
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
一比一原版BCU毕业证伯明翰城市大学毕业证成绩单如何办理
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
 
Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...
Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...
Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
APP I Lecture Notes to students 0f 4the year
APP I  Lecture Notes  to students 0f 4the yearAPP I  Lecture Notes  to students 0f 4the year
APP I Lecture Notes to students 0f 4the year
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024Commercial Bank Economic Capsule - May 2024
Commercial Bank Economic Capsule - May 2024
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
 
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit CardPoonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Card
 

Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge - 03-04-20

  • 2. Programme  Introduction by Toon Vanagt  Fintech industry: A reliable partner for the financial sector by Professor Georges Ataya o Case studies o What methods should be put in place? o The skills that are lacking o Certifications
  • 3. Your Speakers Georges Ataya Academic Director at Solvay Brussels School Managing partner Ataya & partner Co-Founder of the Belgian Cybersecurity Coalition Co-founder DPO Circle Member of the Advisory Boards at Agoria, BECI, CIONET, ISACA Past International Vice President at ISACA and co- founder of the body of knowledge of CISM and CGEIT Toon Vanagt Host, Board of FinTech Belgium CEO of data.be
  • 4. Cybersecurity context Fintech concerns for Cybersecurity European regulations and guidelines Certification for SME Cybersecurity skills assessment Competences and knowledge Professional certification Cybersecurity for FINTECH Prof. Georges Ataya
  • 5.
  • 6. Urgent Cyber Security Issues 1. Financial Crimes 2.The Rise of Multi-Cloud Computing 3. Third-Party and Supply Chain Attacks 4. Shortage of Cybersecurity Professionals 5. More Sophisticated Phishing Exploits 6. Cyber Attacks on the Grid 7. Personal Attacks 8. State-Sponsored Attacks 9. IoT and Autonomous Systems 10. Smart Health Devices and EMR “Cyber crime is big business, with the most elite hackers earning a cool half a million dollars a year just to test system security; the bad guys are raking in billions”. Source: www.csoonline.com The 14 biggest data breaches of the 21st century Adobe Date: October 2013 Impact: 153 million user records Adult Friend Finder Date: October 2016 Impact: 412.2 million accounts Canva Date: May 2019 Impact: 137 million user accounts eBay Date: May 2014 Impact: 145 million users Equifax Date: July 29, 2017 Impact: 147.9 million consumers LinkedIn Date: 2012 (and 2016) Impact: 165 million user accounts Marriott International Date: 2014-18 Impact: 500 million customers Yahoo Date: 2013-14 Impact: 3 billion user accounts
  • 7. Sources of external threat Intelligence Agencies Criminal Groups Terrorist Groups Activist Groups Armed Forces 7
  • 8. The fact that there’re many cases in which large traditional banks have failed to protect the data of their customers do not imply that Fintech is better than other financial institutions Source: FSBT.TECH (Open API Platform) A report by PWC indicates that it is easy for the new banks to focus on securing the activities of their clients on their systems than for large conventional banks.
  • 9.
  • 11. setting the security and notification requirements for digital service providers and build national capabilities help to manage digital identities by providing online trust and allows citizens and business to use national eID and trust services across borders gives control to individuals over their personal data and to simplify the regulatory environment for international business eIDAS framework for European Cybersecurity Certificates for products, processes and services that will be valid throughout the EU
  • 12.
  • 13. Cyber Security Coalition & CCB Elements of the scheme Page 13 Cybersecurity Fundamentals for SME Plan your cyber security • Understand the enterprise context • Management commitment • Training, communication and awareness • Custom made or internally developed software and hardware • Incident management basics Manage risks for your most important assets • Inventory of IT devices • Risk management (Predefined) • Information classification and handling (minimum mores) • Backups and Restore Cybersecurity Technical measures • Firewalls • Secured configuration • User access controls • Malware • Patch management • Email Security https://cyberguide.ccb.belgium.be/en
  • 14. Cyber Security Coalition & CCB Elements of the scheme Page 14 Cybersecurity Fundamentals for SME https://cyberguide.ccb.belgium.be/en Project 1 Project 2 Project 3 Project 4 Project 5 Self-assessment questionnaire & tool Promotion & Communication Advice Development Labelling Currently on hold Registry of specialists & solution providers
  • 16. Cybersecurity Awareness Corporate and general Management Application Development Business managers and Users IT Professionals Information Security Professionals Awareness Classes Incident Management Guide 16
  • 17. Rising risks in the digital economy
  • 18. Building higher defensive walls and installing defense-in-depth solutions © Copyright ICTC.EU 2017© 2017 ICT Control NV SA - No reproduction or reuse 18
  • 19. Source ISACA.ORG 19 What level of protection do we need?
  • 22. DETECT DE.AE-5: Incident alert thresholds are established DE.AE-1 DE.AE-2 DE.AE-3 DE.AE-4 • COBIT 5 APO12.06 • ISA 62443-2-1:2009 4.2.3.10 • NIST SP 800-53 Rev. 4 IR-4, IR-5, IR-8 Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the potential impact of events is understood. © 2015 ICTC.EU 22© 2017 ICT Control NV SA - No reproduction or reuse The need for good business practices
  • 23.
  • 24. 24 A MANAGER FOR CYBER SECURITY PROTECTION and INCIDENT MANAGEMENT Information Security Governance Information Security Incident Management Information Security Program Development & Management Information Risk Management & Compliance
  • 25. SHORTAGES OF DIGITAL PROFESSIONALS 10 avril 2020 ©2020 Ataya & Partners. All Rights Reserved 25 TECH TRENDS WITH STAFFING NEEDS Machine learning; Big data Blockchain Digital transformation Cyber security; IoT security; Cloud; Privacy by design 3D printing Agile and a DevOps; Technical debt and legacy debt Various sources INFORMATION SECURITY PROFESSIONS 1. App security engineer 2. Cyber security consultant 3. Data protection officer 4. Chief security officer 5. Security analyst 6. Security engineer 7. Security architect 8. Security and penetration testing expert Source: esecurityplanet.com CYBERSECURITY PROFESSIONS 1. Ethical hacker 2. Information Security Analyst 3. Penetration Tester/Vulnerability Analyst 4. Digital Forensic Analyst 5. Security Software Developer 6. Chief Information Security Officer (CISO) 7. Network Engineer/Security Architect 8. Incident Handler source: eccouncil.org
  • 26. 26 ASSESSMENT OF SKILLS IN DIGITAL GOVERNANCE, TECHNOLOGY, AND TRUST Academy.atayapartners.com/fintech-sessions
  • 27. DREAM. LEARN. LEAD. • THANKS Full online Education Starting in April 2020 S2 (CISSP preparation) G2 (COBIT 2019) B2 (Data Management) M2 (Application development) April and May 2020
  • 30. Georges Ataya Professor, founder and Academic Director of Digital and information security management at SBS-EM Co-Fouder of the Belgian Cybersecurity Coalition Co-founder DPO Circle Member of the Advisory Board: Agoria, BECI, CIONET, ISACA, belgian Cybersecurity Coalition Managing Director ICT Control advisory firm Founded IT Management Academy Past International Vice President at ISACA Past Partner Ernst & Young Past Deputy International CIO ITT World Directories Previously Project Manager and Senior IT Auditor Linkedin: ataya Academy.atayapartners.com/fintech-sessions
  • 31.
  • 32. • NEXT FRIDAY AT 14PM: Webinar: Financial crisis survival / Coronavirus Homeworking Challenge • NEXT THURSDAY APRIL 23rd: Digital Classroom: How to become and stay licensed in Belgium?, April 23rd from 2pm to 6pm, in collaboration with Febelfin Academy

Editor's Notes

  1. When watching the trends and the extent of attacks, we understand the need for securiting the logic of our processes, the essence of how we do business.
  2. The motives behind most APTs are as old as civilization itself: espionage, sabotage, crime, terrorism, warfare, protest and vandalism. Such threats are familiar to everybody, although their physical manifestations are generally beyond the everyday work experiences of most citizens and company staff. The average person rarely encounters spies, criminals or hackers when going about his/her business, but networks are bringing such threats much closer to home.
  3. Abundant Regulations seek to bring organisation to new level of basic security
  4. It is not a secret that the complexity of our business processes, the multitude of diverse technologies and the absence of homogeneity of our architecture constitute major vulnerabilities On the other hand, the expansion of cyber criminal activities, the demanding requirements of various regulations and the demand for improved services increase on their turn the need for more effort required to deliver up to expectations.
  5. Roundel in Fort de Salses (southern France), 15th century, drawing byViollet-le-Duc Today, cybersecurity now needs to be addressed in a more holistic manner. Building higher defensive walls and installing defense-in-depth solutions are no longer sufficient to prevent criminal intrusions and compromise. Today, many organisations still put all their faith in annual intrusion tests run with external consultants, with little regards to the complexity of the enterprise system.
  6. Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
  7. Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
  8. The CISO function evolves as new management methods and threats landscape require different skills and capabilities.