SlideShare a Scribd company logo
1 of 25
GAMING & SIMULATION IN CYBER RESILIENCE
G2G3.COMENGAGE. TRANSFORM. SUCCEED.
Jason McClay, Operations Director, The G2G3 Group Limited, part of Capita plc
ENGAGE. TRANSFORM. SUCCEED. G2G3.COM
AIM
THE AIM OF MY PRESENTATION TODAY IS
TO SUBMIT TO YOU THAT IN ORDER TO
IMPROVE OUR CHANCES OF COMBATING
CYBER SECURITY THREATS GAMING AND
SIMULATION WILL HAVE AN INCREASING
ROLE TO PLAY
PEOPLE ARE THE ACHILLES HEEL OF CYBER
SECURITY
G2G3.COMENGAGE. TRANSFORM. SUCCEED. G2G3.COM
THE SECURITY
SINGULARITY IS
COMING. HUMANS ARE
THE BIGGEST PROBLEM
ENGAGE. TRANSFORM. SUCCEED. G2G3.COM
"ADVANCED
TARGETED ATTACKS
MAKE PREVENTION-
CENTRIC STRATEGIES
OBSOLETE. SECURING
ENTERPRISES IN 2020
WILL REQUIRE A SHIFT
TO PEOPLE-CENTRIC
SECURITY
STRATEGIES"
Neil MacDonald, Gartner
ENGAGE. TRANSFORM. SUCCEED. G2G3.COM
HOW CAN WE ENGAGE PEOPLE TO MAKE AN
INVESTMENT IN LEARNING ABOUT CYBER SECURITY?
WORKFORCE DEMOGRAPHIC
G2G3.COMENGAGE. TRANSFORM. SUCCEED.
HACKERS TARGET MANAGEMENT
G2G3.COMENGAGE. TRANSFORM. SUCCEED.
WORKFORCE DEMOGRAPHIC
G2G3.COMENGAGE. TRANSFORM. SUCCEED.
A SERIOUS GAME IS A GAME
DESIGNED FOR A PRIMARY
PURPOSE OTHER THAN PURE
ENTERTAINMENT
GAME SCIENCE HAS THE POWER TO
SPEAK TO AUDIENCES LIKE NEVER
THE AVERAGE AMERICAN BORN
AFTER 1970 WILL HAVE PLAYED
TEN THOUSAND HOURS OF
COMPUTER AND VIDEO GAMES BY
THE TIME THEY REACH 21
5.93 MILLION YEARS
PLAYING WORLD OF
SADLY, MOST WORKPLACE
TRAINING IS LESS THAN
ENGAGING
TOTAL
ENGAGEMENT
Human beings learn best from experience,
particularly when feedback from actions is
rapid and unambiguous
Peter Senge, Fifth Discipline
360 DEGREE SIMULATION
TOTAL IMMERSION
Summary
• IT USERS AS IMPORTANT AS IT
PROFESSIONALS
• WE MUST BE CREATIVE IN HOW WE
ENGAGE
• THE CYBER SECURITY MO LENDS ITSELF
WELL
• GAMING AND SIMULATION WILL BE
PREVALENT
ENGAGE. TRANSFORM.
SUCCEED.
G2G3.COENGAGE. TRANSFORM.
SUCCEED.
G2G3.CO
Jason McClay
Operations Director
G2G3
jm@g2g3.com
jason.mcclay@capita.co.uk
0787 059 0013
QUESTIONS?
G2G3 Cyber Security

More Related Content

Similar to G2G3 Cyber Security

King.com Presentation
King.com Presentation King.com Presentation
King.com Presentation bennrayner
 
[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego BernalTI Safe
 
Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Justin Pirie
 
Insurance Data & Analytics Summit
Insurance Data & Analytics SummitInsurance Data & Analytics Summit
Insurance Data & Analytics Summitdmurph4
 
Information Security
Information SecurityInformation Security
Information Securitytrunko
 
The Next e-Commerce Revolution
The Next e-Commerce RevolutionThe Next e-Commerce Revolution
The Next e-Commerce RevolutionFrank Lampen
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?OurCrowd
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19Citrin Cooperman
 
Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation Reading Room
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Cloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness ReportCloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness ReportGandhi Legacy Tour
 
Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...
Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...
Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...Jamison K. Bell | OvenPOP 360
 
CYDigital Pitch Deck for Crowdfunder
CYDigital Pitch Deck for CrowdfunderCYDigital Pitch Deck for Crowdfunder
CYDigital Pitch Deck for CrowdfunderCYDigital
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersTrustmarque
 
CD December 2015 City Insights presentation
CD December 2015 City Insights presentationCD December 2015 City Insights presentation
CD December 2015 City Insights presentationComit Projects Ltd
 

Similar to G2G3 Cyber Security (20)

King.com Presentation
King.com Presentation King.com Presentation
King.com Presentation
 
[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal[CLASS 2014] Palestra Técnica - Diego Bernal
[CLASS 2014] Palestra Técnica - Diego Bernal
 
Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?
 
Insurance Data & Analytics Summit
Insurance Data & Analytics SummitInsurance Data & Analytics Summit
Insurance Data & Analytics Summit
 
Information Security
Information SecurityInformation Security
Information Security
 
The Next e-Commerce Revolution
The Next e-Commerce RevolutionThe Next e-Commerce Revolution
The Next e-Commerce Revolution
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Sept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborneSept-Oct16_InfoSecProArticle_BrettOsborne
Sept-Oct16_InfoSecProArticle_BrettOsborne
 
How Media Will Be Transformed By The Blockchain - Ian Farmer, Frontiering
How Media Will Be Transformed By The Blockchain - Ian Farmer, FrontieringHow Media Will Be Transformed By The Blockchain - Ian Farmer, Frontiering
How Media Will Be Transformed By The Blockchain - Ian Farmer, Frontiering
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation Evantage Technology Cybersecurity presentation
Evantage Technology Cybersecurity presentation
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Cloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness ReportCloud Computing Disaster Readiness Report
Cloud Computing Disaster Readiness Report
 
Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...
Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...
Death by Google Alerts: 461 Pages of Social Media Competitive Analysis in 3 W...
 
CYDigital Pitch Deck for Crowdfunder
CYDigital Pitch Deck for CrowdfunderCYDigital Pitch Deck for Crowdfunder
CYDigital Pitch Deck for Crowdfunder
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
 
Avg White Paper (4)
Avg White Paper (4)Avg White Paper (4)
Avg White Paper (4)
 
CD December 2015 City Insights presentation
CD December 2015 City Insights presentationCD December 2015 City Insights presentation
CD December 2015 City Insights presentation
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

G2G3 Cyber Security

Editor's Notes

  1. Cyber Security is a very serious subject for society as a whole, the extent of that threat is a matter of opinion however regardless of whether you believe in the concept of cyber warfare, the threat of cyber security is real and with many actors.
  2. WE’VE SPENT AS MUCH TIME PLAYING WOW AS WE HAVE EVOLVING AS A SPECIES
  3. But regardless, it's amazing how many products and services are available now to cybercriminals. For example, this testing platform, which enables the cybercriminals to test the quality of their viruses before they release them on the world. For a small fee, they can upload it and make sure everything is good. But it goes further. Cybercriminals now have crime packs with business intelligence reporting dashboards to manage the distribution of their malicious code. This is the market leader in malware distribution, the Black Hole Exploit Pack, responsible for nearly one third of malware distribution in the last couple of quarters. It comes with technical installation guides, video setup routines, and get this, technical support. You can email the cybercriminals and they'll tell you how to set up your illegal hacking server.
  4. But regardless, it's amazing how many products and services are available now to cybercriminals. For example, this testing platform, which enables the cybercriminals to test the quality of their viruses before they release them on the world. For a small fee, they can upload it and make sure everything is good. But it goes further. Cybercriminals now have crime packs with business intelligence reporting dashboards to manage the distribution of their malicious code. This is the market leader in malware distribution, the Black Hole Exploit Pack, responsible for nearly one third of malware distribution in the last couple of quarters. It comes with technical installation guides, video setup routines, and get this, technical support. You can email the cybercriminals and they'll tell you how to set up your illegal hacking server.