SlideShare a Scribd company logo
1
Stop the BREACH!
Farook Al-Jibouri
March 2018
IT LIVE 2018, Baghdad – Iraq
2
3
The story of “wheelsnation.net”
The Shifting of IT
Environment
(… or why
security has
become so
important)
5
• Many applications/transactions now operate over
the web
• Cloud is changing our notion of a perimeter
• Worker mobility is redefining the IT landscape
• Shadow IT is becoming enterprise IT
• Majority of web transactions are now encrypted
(SSL)
• The security model has changed from good
people vs. bad people to enabling zero-trust
6
CIO spending priority for 2018
SECURITY #1
7
Expect increase spending in 2018
88% of CIOS
8
YET 66% OF COMPANIES
ARE STILL BREACHED
66%$86BSPENT ON SECURITY
IN 2017
And worse, they’re breached
on average five or more times
TODAY’S SECURITY IS NOT SECURE
9
62% CEOs INCORRECTLY
CITE MALWARE
As the primary threat to cybersecurity vs identity.
That’s wrong. Phishing, privilege and compromised
passwords are more prevalent — something TOs recognize.
CEOs were more likely (62% vs 35%) than Technical Officers to believe malware is the primary threat to cybersecurity
10
SENSATIONAL MALWARE HEADLINES IN 2017
11
SENSATIONAL MALWARE HEADLINES IN 2017
WANNACRY
Britain’s National Health System
one of the biggest victimsNHS
Systems infected overnight
in 150 countries200k+
PETYA
Companies using same accounting
software fall victim to ransomware100s
NOTPETYA
Claims to be ransomware but
simply spreads and encrypts.
Targets privileged access and credentials.
BADRABBIT
Another major ransomware outbreak
Variant of Petya
12
IS IRAQ FAR AWAY FROM BREACH?
WANNACRY
Britain’s National Health System
one of the biggest victimsNHS
Systems infected overnight
in 150 countries200k+
PETYA
Companies using same accounting
software fall victim to ransomware100s
NOTPETYA
Claims to be ransomware but
simply spreads and encrypts.
Targets privileged access and credentials.
BADRABBIT
Another major ransomware outbreak
Variant of Petya
13
Arabic States
Iraq ranked 19 / 22
14
Globally
Iraq ranked 159 / 193
15
CEOs are MISALIGNED
With cybersecurity priorities
16
60% of CEOs are
MISINVESTING
Investing the most in malware prevention even though
92% TOs claim “well-prepared” for malware
CEOs intend to invest the most in malware prevention (60%) vs privileged access abuse (28%) or stolen passwords (32%)
17
CEOs are MISINFORMED
CEO Disconnect On Cybersecurity Increases Risk Of Breaches
This despite recent massive innovation, including machine learning, that has dramatically reduced the burden of deploying and managing MFA
CEOs biggest concern with security is poor user experience
This same innovation has dramatically reduce the learning curve and burden for users, become smarter about when to prompt and uses ubiquitous smartphones
18
40% more TECH OFFICERS
Frustrated by inadequate security budgets than CEOs
(31% Technical Officers vs 22% CEOs)
19
2018 Predictions
Ransomware
Breaches Get Worse
GDPR
Biometric Adoption
AI & Machine Learning
More Mobile Threats
20
THIS NEW THREATSCAPE REQUIRES
ZERO TRUST SECURITY
21
Regulations & Compliance
We have to do it … NOW!
22
Making the BUSINESS CASE
for SECURITY
23
AVOID SERVICE INTERRUPTION!
E.g. Internet shutdown on Exams
BUSINESS CONTINUITY
e.g. Gov Websites and critical services
GET DEEPER
having deep visibility with help you detect breaches earlier.
STAY IN CONTROL!
AVOID the CRISIS
24
HOW WE CAN HAD
ZERO TRUST SECURITY?
Think Strategy … not Product
25
50%fewer breaches
FORRESTER FINDS IMPLEMENTING
BEST PRACTICES RESULTS IN
in cost savings$5 MIL
less on technology costs40%
26
In the absence of security education or experience,
people (employees, users, customers, …) naturally
make poor security decisions with technology
Stay Up-to-Date!
27
Iraq Progress towards Cyber Security
Iraqi Cyber Events
Response Team
Central Bank of Iraq ISACA Iraq
28
What Iraq Security Needs?
* Infrastructure Security: e.g. IGW
basic To have robust security for the country infrastructure
* Iraq National Cyber Security Center
drive Security researches and analysis of threat landscape
* Professional Learning Centers for Security
for Capacity building
* Regulations & Policy
29
Enjoy the rest of
IT LIVE 2018 

More Related Content

What's hot

100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
Temok IT Services
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
Samvel Gevorgyan
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
Bryson Bort
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
Mohamed Zaheer Husain
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
Imperva
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
Carol Meng-Shih Wang
 
Why Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application SecurityWhy Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application Security
IndusfacePvtLtd
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
ixiademandgen
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
Zoe Gilbert
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
Seqrite
 

What's hot (20)

100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
NDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeawaysNDIA 2021 - solar winds overview and takeaways
NDIA 2021 - solar winds overview and takeaways
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Why Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application SecurityWhy Startups Need to Strengthen Application Security
Why Startups Need to Strengthen Application Security
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 

Similar to IT Live 2018 - Farook Al-Jibouri: Stop The Breach

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
Appian
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Argyle Executive Forum
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
Brafton
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
VARINDIA
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
Taranggg11
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
Eoin Keary
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
CBIZ, Inc.
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Merry D'souza
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
Dharmendra Rama
 
Cscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyCscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-survey
George Wainblat
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
Cigniti Technologies Ltd
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
Management Events
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
TechSci Research
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
Yamuna5
 

Similar to IT Live 2018 - Farook Al-Jibouri: Stop The Breach (20)

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Cscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyCscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-survey
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

IT Live 2018 - Farook Al-Jibouri: Stop The Breach

  • 1. 1 Stop the BREACH! Farook Al-Jibouri March 2018 IT LIVE 2018, Baghdad – Iraq
  • 2. 2
  • 3. 3 The story of “wheelsnation.net”
  • 4. The Shifting of IT Environment (… or why security has become so important)
  • 5. 5 • Many applications/transactions now operate over the web • Cloud is changing our notion of a perimeter • Worker mobility is redefining the IT landscape • Shadow IT is becoming enterprise IT • Majority of web transactions are now encrypted (SSL) • The security model has changed from good people vs. bad people to enabling zero-trust
  • 6. 6 CIO spending priority for 2018 SECURITY #1
  • 7. 7 Expect increase spending in 2018 88% of CIOS
  • 8. 8 YET 66% OF COMPANIES ARE STILL BREACHED 66%$86BSPENT ON SECURITY IN 2017 And worse, they’re breached on average five or more times TODAY’S SECURITY IS NOT SECURE
  • 9. 9 62% CEOs INCORRECTLY CITE MALWARE As the primary threat to cybersecurity vs identity. That’s wrong. Phishing, privilege and compromised passwords are more prevalent — something TOs recognize. CEOs were more likely (62% vs 35%) than Technical Officers to believe malware is the primary threat to cybersecurity
  • 11. 11 SENSATIONAL MALWARE HEADLINES IN 2017 WANNACRY Britain’s National Health System one of the biggest victimsNHS Systems infected overnight in 150 countries200k+ PETYA Companies using same accounting software fall victim to ransomware100s NOTPETYA Claims to be ransomware but simply spreads and encrypts. Targets privileged access and credentials. BADRABBIT Another major ransomware outbreak Variant of Petya
  • 12. 12 IS IRAQ FAR AWAY FROM BREACH? WANNACRY Britain’s National Health System one of the biggest victimsNHS Systems infected overnight in 150 countries200k+ PETYA Companies using same accounting software fall victim to ransomware100s NOTPETYA Claims to be ransomware but simply spreads and encrypts. Targets privileged access and credentials. BADRABBIT Another major ransomware outbreak Variant of Petya
  • 15. 15 CEOs are MISALIGNED With cybersecurity priorities
  • 16. 16 60% of CEOs are MISINVESTING Investing the most in malware prevention even though 92% TOs claim “well-prepared” for malware CEOs intend to invest the most in malware prevention (60%) vs privileged access abuse (28%) or stolen passwords (32%)
  • 17. 17 CEOs are MISINFORMED CEO Disconnect On Cybersecurity Increases Risk Of Breaches This despite recent massive innovation, including machine learning, that has dramatically reduced the burden of deploying and managing MFA CEOs biggest concern with security is poor user experience This same innovation has dramatically reduce the learning curve and burden for users, become smarter about when to prompt and uses ubiquitous smartphones
  • 18. 18 40% more TECH OFFICERS Frustrated by inadequate security budgets than CEOs (31% Technical Officers vs 22% CEOs)
  • 19. 19 2018 Predictions Ransomware Breaches Get Worse GDPR Biometric Adoption AI & Machine Learning More Mobile Threats
  • 20. 20 THIS NEW THREATSCAPE REQUIRES ZERO TRUST SECURITY
  • 21. 21 Regulations & Compliance We have to do it … NOW!
  • 22. 22 Making the BUSINESS CASE for SECURITY
  • 23. 23 AVOID SERVICE INTERRUPTION! E.g. Internet shutdown on Exams BUSINESS CONTINUITY e.g. Gov Websites and critical services GET DEEPER having deep visibility with help you detect breaches earlier. STAY IN CONTROL! AVOID the CRISIS
  • 24. 24 HOW WE CAN HAD ZERO TRUST SECURITY? Think Strategy … not Product
  • 25. 25 50%fewer breaches FORRESTER FINDS IMPLEMENTING BEST PRACTICES RESULTS IN in cost savings$5 MIL less on technology costs40%
  • 26. 26 In the absence of security education or experience, people (employees, users, customers, …) naturally make poor security decisions with technology Stay Up-to-Date!
  • 27. 27 Iraq Progress towards Cyber Security Iraqi Cyber Events Response Team Central Bank of Iraq ISACA Iraq
  • 28. 28 What Iraq Security Needs? * Infrastructure Security: e.g. IGW basic To have robust security for the country infrastructure * Iraq National Cyber Security Center drive Security researches and analysis of threat landscape * Professional Learning Centers for Security for Capacity building * Regulations & Policy
  • 29. 29 Enjoy the rest of IT LIVE 2018 

Editor's Notes

  1. Let’s look at this another way: Last year we spent over $86B on cyber security yet a stunned 2/3rds of companies were still breached And worse, those that were breached averaged five or more separate breaches Bottom line: Something has to change. Today’s security is not secure.
  2. Why do we need a massive rethink of security? Simple: Shareholders are not safe Recent Ponemon study shows that stocks drop 5% after a breach is announced And worse, 30% of impacted consumers discontinue their relationship with the breached company A recent example of shareholder impact is Chipotle which saw it’s stock drop by $400M after announcing a breach Consumers are not safe Over one billion Yahoo users accounts were compromised for years before notifying users Note: this impacted the takeover offer from Verizon to the tune of $350M or 7% of the offer price Governments are not safe Poor authentication and misused privileged accounts resulted in 25M stolen personnel records Note: OPM breach involved the compromise of a “jump box” giving hackers control of every machine on the network Companies are not safe DNS provider (Dyn) knocked offline by a botnet of millions of IoT devices compromised because they all shared the same default password
  3. Why do we need a massive rethink of security? Simple: Shareholders are not safe Recent Ponemon study shows that stocks drop 5% after a breach is announced And worse, 30% of impacted consumers discontinue their relationship with the breached company A recent example of shareholder impact is Chipotle which saw it’s stock drop by $400M after announcing a breach Consumers are not safe Over one billion Yahoo users accounts were compromised for years before notifying users Note: this impacted the takeover offer from Verizon to the tune of $350M or 7% of the offer price Governments are not safe Poor authentication and misused privileged accounts resulted in 25M stolen personnel records Note: OPM breach involved the compromise of a “jump box” giving hackers control of every machine on the network Companies are not safe DNS provider (Dyn) knocked offline by a botnet of millions of IoT devices compromised because they all shared the same default password
  4. Why do we need a massive rethink of security? Simple: Shareholders are not safe Recent Ponemon study shows that stocks drop 5% after a breach is announced And worse, 30% of impacted consumers discontinue their relationship with the breached company A recent example of shareholder impact is Chipotle which saw it’s stock drop by $400M after announcing a breach Consumers are not safe Over one billion Yahoo users accounts were compromised for years before notifying users Note: this impacted the takeover offer from Verizon to the tune of $350M or 7% of the offer price Governments are not safe Poor authentication and misused privileged accounts resulted in 25M stolen personnel records Note: OPM breach involved the compromise of a “jump box” giving hackers control of every machine on the network Companies are not safe DNS provider (Dyn) knocked offline by a botnet of millions of IoT devices compromised because they all shared the same default password
  5. This new threatscape requires a complete paradigm shift. One that rethinks and challenges the network perimeter-based approach One that puts identity at the foundation of the massive security rethink. One that removes trust from the network and redefines security to follow identity based on knowing the user and their device before granting access A new paradigm that frees companies to move fearlessly into the modern cloudscape by not relying on implicit trust, but enforcing a dynamic security policy that only trusts when verified
  6. So how we can deliver Zero Trust Security?
  7. If you do these things, then what are the benefits of achieving Zero Trust maturity? According to a brand new study from Forrester, entitled “Stop the Breach”, there are massive benefits to improving Zero Trust maturity including: 50% reduction in the number of reported breaches An average of $5M in cost savings related to breaches Interestingly, the most mature organizations preferred an integrated platform approach vs point and custom one-off solutions. This strategic approach led to a 40% reduction in IAM technology costs as a percentage of IT budget. Massive savings.
  8. So what makes different or better than alternatives?