SlideShare a Scribd company logo
'Life's A Breach'
Who Dun it
A crime solving evening event provided by
Cyber Security Partners Ltd
Agenda
• Welcome drinks and networking 5:30pm-5:50pm
• Introductions and agenda for evening 5:50pm-5:55pm
• Who dun it 5:55pm-6:15pm
• Food and networking 6:15pm-6:45pm
• Game results followed by prizes 6:45pm-7:00pm
• Mini presentations 7pm- 7:10pm
• Q&A 7:10pm-7:20pm
• Networking to finish the night
Setting the scene
• Small Company Ltd sells widgets
• Utilises SaaS based solutions extensively
• Almost everyone works all hours
• Key workers have access to SaaS solutions via multiple devices
• External consultant brought in to 'tidy up' access controls
Setting the scene
• It appears that £20,000 has disappeared
• Accounts all reconciled
• Only MD and Bookkeeper have access to accounts
• Help me establish 'who dun it'.
How it works
• Each character has a clue
• There are some false trails
• Build up the clues to find out who did it
• Write your chosen suspect's name on paper, your name and give it to Kevin
• All the correct answers will go into a draw for the prize
Happy Clue Searching!
Suspects...
Suspects...
Clue’s
Who
Why
Works late Full access Keys Advance New
phone
Expenses Holidays
Robert
Tony
Lynne
Clare
Kyle
Natteleigh
Lucy
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Solution
• PAC number for Bookkeeper's phone
• Transferred number to new phone
• Recovered backup from cloud
• Accessed accounts and bank from phone
SIM swap fraud
• NCSC advice
• Use complex pin or password
• Make sure lost or stolen devices can be
tracked, locked or wiped
• Keep device up to date
• Keep apps up to date
• CSP advice
• Is your 2fa app pin protected?
• Enable device restrictions on SaaS service
• Define limits which need 2 people to sign off
on
Questions
'Life's a Breach' Cyber Security Murder Mystery With a Twist

More Related Content

What's hot

SaaS Subscription Billing with ChargeBee
SaaS Subscription Billing with ChargeBeeSaaS Subscription Billing with ChargeBee
SaaS Subscription Billing with ChargeBee
Chargebee
 
Example Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow DiagramExample Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow Diagram
Equilibria, Inc.
 
rpa in healthcare (1).pdf
rpa in healthcare (1).pdfrpa in healthcare (1).pdf
rpa in healthcare (1).pdf
essindiaseo
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service Provider
Debojyoti Ghosh
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process Intelligence
Mindfields Global
 
Meet Richard - An Odoo Story
Meet Richard - An Odoo StoryMeet Richard - An Odoo Story
Meet Richard - An Odoo Story
Odoo
 
How Odoo helped an Organization Grow 3 Fold
How Odoo helped an Organization Grow 3 FoldHow Odoo helped an Organization Grow 3 Fold
How Odoo helped an Organization Grow 3 Fold
Odoo
 
Recruiter Investors Presentations 2022
Recruiter Investors Presentations 2022Recruiter Investors Presentations 2022
Recruiter Investors Presentations 2022
RedChip Companies, Inc.
 
How Does RPA Work? | What Is Robotic Process Automation? Edureka
How Does RPA Work? | What Is Robotic Process Automation? EdurekaHow Does RPA Work? | What Is Robotic Process Automation? Edureka
How Does RPA Work? | What Is Robotic Process Automation? Edureka
Edureka!
 
Technical Support Manual Training
Technical Support Manual TrainingTechnical Support Manual Training
Technical Support Manual Training
Superb Internet Training Division
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity Lever
Knoldus Inc.
 
Big Data Reference Architecture for Aviation Domain for Customer Satisfaction
Big Data Reference Architecture for Aviation Domain for Customer SatisfactionBig Data Reference Architecture for Aviation Domain for Customer Satisfaction
Big Data Reference Architecture for Aviation Domain for Customer Satisfaction
hari_surya
 
RPA Intro.pdf
RPA Intro.pdfRPA Intro.pdf
RPA Intro.pdf
Hamdy El-asawy
 
P2P Document
P2P DocumentP2P Document
P2P Document
Kishore Js
 
Intelligent Process Automation in Audit
Intelligent Process Automation in AuditIntelligent Process Automation in Audit
Intelligent Process Automation in Audit
10xDS - Exponential Digital Solutions
 
WaterTech - SIRIUS-S Residenziali
WaterTech - SIRIUS-S ResidenzialiWaterTech - SIRIUS-S Residenziali
WaterTech - SIRIUS-S Residenziali
WaterTech S.p.A.
 
Redesign of payment UX/UI — MoneyLion
Redesign of payment UX/UI — MoneyLionRedesign of payment UX/UI — MoneyLion
Redesign of payment UX/UI — MoneyLion
JaneMuder
 
Robotic process automation (rpa)
Robotic process automation (rpa)Robotic process automation (rpa)
Robotic process automation (rpa)
Aapna Infotech
 
Capgemini Robotic Process Automation special edition summer 2017
Capgemini Robotic Process Automation special edition summer 2017Capgemini Robotic Process Automation special edition summer 2017
Capgemini Robotic Process Automation special edition summer 2017
UiPath
 
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your EnvironmentAI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
Cprime
 

What's hot (20)

SaaS Subscription Billing with ChargeBee
SaaS Subscription Billing with ChargeBeeSaaS Subscription Billing with ChargeBee
SaaS Subscription Billing with ChargeBee
 
Example Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow DiagramExample Call Center Work/Information Flow Diagram
Example Call Center Work/Information Flow Diagram
 
rpa in healthcare (1).pdf
rpa in healthcare (1).pdfrpa in healthcare (1).pdf
rpa in healthcare (1).pdf
 
Amazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service ProviderAmazing Benefits of Hiring a Managed Service Provider
Amazing Benefits of Hiring a Managed Service Provider
 
Scaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process IntelligenceScaling up Hyperautomation with Process Intelligence
Scaling up Hyperautomation with Process Intelligence
 
Meet Richard - An Odoo Story
Meet Richard - An Odoo StoryMeet Richard - An Odoo Story
Meet Richard - An Odoo Story
 
How Odoo helped an Organization Grow 3 Fold
How Odoo helped an Organization Grow 3 FoldHow Odoo helped an Organization Grow 3 Fold
How Odoo helped an Organization Grow 3 Fold
 
Recruiter Investors Presentations 2022
Recruiter Investors Presentations 2022Recruiter Investors Presentations 2022
Recruiter Investors Presentations 2022
 
How Does RPA Work? | What Is Robotic Process Automation? Edureka
How Does RPA Work? | What Is Robotic Process Automation? EdurekaHow Does RPA Work? | What Is Robotic Process Automation? Edureka
How Does RPA Work? | What Is Robotic Process Automation? Edureka
 
Technical Support Manual Training
Technical Support Manual TrainingTechnical Support Manual Training
Technical Support Manual Training
 
Business Process Automation A Productivity Lever
Business Process Automation A Productivity LeverBusiness Process Automation A Productivity Lever
Business Process Automation A Productivity Lever
 
Big Data Reference Architecture for Aviation Domain for Customer Satisfaction
Big Data Reference Architecture for Aviation Domain for Customer SatisfactionBig Data Reference Architecture for Aviation Domain for Customer Satisfaction
Big Data Reference Architecture for Aviation Domain for Customer Satisfaction
 
RPA Intro.pdf
RPA Intro.pdfRPA Intro.pdf
RPA Intro.pdf
 
P2P Document
P2P DocumentP2P Document
P2P Document
 
Intelligent Process Automation in Audit
Intelligent Process Automation in AuditIntelligent Process Automation in Audit
Intelligent Process Automation in Audit
 
WaterTech - SIRIUS-S Residenziali
WaterTech - SIRIUS-S ResidenzialiWaterTech - SIRIUS-S Residenziali
WaterTech - SIRIUS-S Residenziali
 
Redesign of payment UX/UI — MoneyLion
Redesign of payment UX/UI — MoneyLionRedesign of payment UX/UI — MoneyLion
Redesign of payment UX/UI — MoneyLion
 
Robotic process automation (rpa)
Robotic process automation (rpa)Robotic process automation (rpa)
Robotic process automation (rpa)
 
Capgemini Robotic Process Automation special edition summer 2017
Capgemini Robotic Process Automation special edition summer 2017Capgemini Robotic Process Automation special edition summer 2017
Capgemini Robotic Process Automation special edition summer 2017
 
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your EnvironmentAI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
AI & Robotic Process Automation (RPA) to Digitally Transform Your Environment
 

More from Cyber Security Partners

CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
Cyber Security Partners
 
CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023
Cyber Security Partners
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
Cyber Security Partners
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
Cyber Security Partners
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Cyber Security Partners
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security Compliance
Cyber Security Partners
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
Cyber Security Partners
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptx
Cyber Security Partners
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
Cyber Security Partners
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
Cyber Security Partners
 
NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
Cyber Security Partners
 

More from Cyber Security Partners (11)

CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023CSP Overview of Services Brochure 2023
CSP Overview of Services Brochure 2023
 
CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023CSP LegalTech Conference Breakout Session 2023
CSP LegalTech Conference Breakout Session 2023
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
 
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event ReturnsWho Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
Who Dun It? Our 'Cyber Attack Murder Mystery' Event Returns
 
Security Assurance Vs Security Compliance
Security Assurance Vs Security ComplianceSecurity Assurance Vs Security Compliance
Security Assurance Vs Security Compliance
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
 
How anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptxHow anyone can get a career in Cyber Security 2022.pptx
How anyone can get a career in Cyber Security 2022.pptx
 
Funniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptxFunniest Cyber Crimes that actually worked.pptx
Funniest Cyber Crimes that actually worked.pptx
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

'Life's a Breach' Cyber Security Murder Mystery With a Twist

  • 1. 'Life's A Breach' Who Dun it A crime solving evening event provided by Cyber Security Partners Ltd
  • 2. Agenda • Welcome drinks and networking 5:30pm-5:50pm • Introductions and agenda for evening 5:50pm-5:55pm • Who dun it 5:55pm-6:15pm • Food and networking 6:15pm-6:45pm • Game results followed by prizes 6:45pm-7:00pm • Mini presentations 7pm- 7:10pm • Q&A 7:10pm-7:20pm • Networking to finish the night
  • 3. Setting the scene • Small Company Ltd sells widgets • Utilises SaaS based solutions extensively • Almost everyone works all hours • Key workers have access to SaaS solutions via multiple devices • External consultant brought in to 'tidy up' access controls
  • 4. Setting the scene • It appears that £20,000 has disappeared • Accounts all reconciled • Only MD and Bookkeeper have access to accounts • Help me establish 'who dun it'.
  • 5. How it works • Each character has a clue • There are some false trails • Build up the clues to find out who did it • Write your chosen suspect's name on paper, your name and give it to Kevin • All the correct answers will go into a draw for the prize
  • 9. Clue’s Who Why Works late Full access Keys Advance New phone Expenses Holidays Robert Tony Lynne Clare Kyle Natteleigh Lucy X X X X X X X X X X X X X X X X X X X X X X
  • 10. Solution • PAC number for Bookkeeper's phone • Transferred number to new phone • Recovered backup from cloud • Accessed accounts and bank from phone
  • 11. SIM swap fraud • NCSC advice • Use complex pin or password • Make sure lost or stolen devices can be tracked, locked or wiped • Keep device up to date • Keep apps up to date • CSP advice • Is your 2fa app pin protected? • Enable device restrictions on SaaS service • Define limits which need 2 people to sign off on