SlideShare a Scribd company logo
1 of 26
Deloitte.
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
The Hacking Mind 
Know your enemy
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Quotes 
“Security is the responsibility of the datacenter” 
“Our organization is not a likely target.” 
“Security does not help us to sell more products” 
“We don’t have budget for security improvements”
© 2014 Deloitte The Netherlands 4 
“They Couldn’t Hit an Elephant at that Distance.” 
John SedgwickMay 9, 1864
The danger 
And the protection against Cybercrime 
© 2014 Deloitte The Netherlands 5 
8% 
45% 
47% 
0% 
49% 
51% 
0% 
10% 
20% 
30% 
40% 
50% 
60% 
Low/Bad 
Average 
High/Good 
Risk andprotectionagainstcybercrime (n=51) 
Risk 
Protected 
24% 
63% 
14% 
Victim of cybercrime? (n=51) 
Yes 
No 
Unkown 
-60 
-40 
-20 
0 
20 
40 
60 
Mobile 
Social media 
Data analytics 
Cyber security 
CFO’s: Investment priorities (n=25) 
(Extremely) High 
(Extremely) Low 
Executives estimate the risks of digitalization to be high and claim to be adequately protected against cyber attacks. However, they did decide to heavily invest in Cyber security.
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Security Controls 
Business Impact 
An organization’s point of view 
Text 
Asset 
An attacker’s point of view 
Set of skills 
Motives 
Text 
Actor 
Attack Vectors
“A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. A hacker is someone who experiments with the limitations of systems for intellectual curiosity.” Bruce Schneier, Secrets and Lies (2000) 
The danger 
Whatis a hacker? 
© 2014 Deloitte The Netherlands 7
The danger 
Who is targeting you? 
© 2014 Deloitte The Netherlands 8 
Attacker Determination 
Attacker Sophistication 
Accidental 
Discovery 
Malware 
Insider 
Lone Hacker / 
Hobbyist 
Business 
Partner 
‘Script kiddy’ 
Disgruntled 
ex-Employee 
Disgruntled 
Customer 
Competitor 
Disgruntled 
ex-IT 
Administrator 
‘Hacktivism’ 
Cyber 
Terrorism 
Hacker 
Collectives 
Organised Crime 
State-sponsored 
Cyber Warfare 
Type Permission? Criminal Intent? 
Blackhat No Yes 
Greyhat No No 
Whitehat Yes No
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Some thoughts 
1.Attackersandresearchersscan everyIP in the public domain daily; 
2.Non-targeted attacks can have significant impact; 
3.A majority of the security incidents are caused by non-targeted attacks; 
4.Non-targetedattacks canlead totargetedattacks; 
Targeted Attacks 
Focused on your day-to-day business activities, for example by: 
•Cybercriminals; steal data, steal money, affect continuity 
•Disgruntled employees; compromise systems from the inside 
•Hacktivists; having moral reasons to attack 
Non-Targeted Attacks 
Mass-spread malwarevia email, websites, usb-sticks aimingto: 
•Infect systems/servers forbotnets 
•Encryptdata andforce organizationtopay(ransomware) 
•Createstepping stoneforconsequent targetedattack 
Targeted and Non-Targeted Attacks
Hackers 
•Unlimited time, low costs 
•Only one hole is sufficient 
•Rules do not apply 
Defenders 
•Limited time, limited budget 
•Time between discovery and mitigation 
•Everything is connected and nobody is in charge 
Hackers vs. Defenders 
An asymmetric fight 
© 2014 Deloitte The Netherlands 10
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
CyberResilience 
How to survive and thrive in the digital world
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited.
© 2014. For information, contact Deloitte Touche TohmatsuLimited. 
Zodat jij en je organisatie je onbezorgd op het internet kunnen begeven. 
Happy foto!
Deloitte. 
Deloitte refers to one or more of Deloitte ToucheTohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a more detailed description of DTTL and its member firms. 
This communication is for internal distribution and use only among personnel of Deloitte ToucheTohmatsu Limited, its member firms, and their related entities (collectively, the “Deloitte network”). None of the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication.

More Related Content

Viewers also liked

Marketing of Emptiness Eng
Marketing of Emptiness EngMarketing of Emptiness Eng
Marketing of Emptiness EngSCodeseira
 
IES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de pazIES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de pazPepa Líndez Cazorla
 
Todos Cantamos
Todos CantamosTodos Cantamos
Todos Cantamosdiegocamin
 
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...Aranda Emprende
 
La participación ciudadana en la administración local
La participación ciudadana en la administración localLa participación ciudadana en la administración local
La participación ciudadana en la administración localIbiza Melián
 
Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...Juan Carlos Sanchez
 
Producción gráfica 2
Producción gráfica 2Producción gráfica 2
Producción gráfica 2titochagoya
 
Ec. internacional clase 14 inversión extranjera directa
Ec. internacional   clase 14 inversión extranjera directaEc. internacional   clase 14 inversión extranjera directa
Ec. internacional clase 14 inversión extranjera directaCarlos Rojas
 
Ideas innovadoras CGInnova
Ideas innovadoras CGInnovaIdeas innovadoras CGInnova
Ideas innovadoras CGInnovaAndoni Carrion
 
La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)ajc98
 
Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11Marcel Media
 

Viewers also liked (16)

Marketing of Emptiness Eng
Marketing of Emptiness EngMarketing of Emptiness Eng
Marketing of Emptiness Eng
 
IES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de pazIES RIBERA DEL FARDES. Escuela, espacio de paz
IES RIBERA DEL FARDES. Escuela, espacio de paz
 
Todos Cantamos
Todos CantamosTodos Cantamos
Todos Cantamos
 
Diseño proyectos 102058__16
Diseño proyectos  102058__16Diseño proyectos  102058__16
Diseño proyectos 102058__16
 
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
Curso de verano: Las nuevas tecnologías como instrumentos de información y em...
 
La participación ciudadana en la administración local
La participación ciudadana en la administración localLa participación ciudadana en la administración local
La participación ciudadana en la administración local
 
Solar panel
Solar panelSolar panel
Solar panel
 
Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...Why customer value propositions really matter - A focus on the telecom servic...
Why customer value propositions really matter - A focus on the telecom servic...
 
Producción gráfica 2
Producción gráfica 2Producción gráfica 2
Producción gráfica 2
 
Ec. internacional clase 14 inversión extranjera directa
Ec. internacional   clase 14 inversión extranjera directaEc. internacional   clase 14 inversión extranjera directa
Ec. internacional clase 14 inversión extranjera directa
 
Next-Generation Optical Access Architecture
Next-Generation Optical Access ArchitectureNext-Generation Optical Access Architecture
Next-Generation Optical Access Architecture
 
Ideas innovadoras CGInnova
Ideas innovadoras CGInnovaIdeas innovadoras CGInnova
Ideas innovadoras CGInnova
 
OESTRUS OVIS
OESTRUS OVISOESTRUS OVIS
OESTRUS OVIS
 
La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)La zarzuela (2) (1) (1)
La zarzuela (2) (1) (1)
 
Ingresantes gue las mercedes 2015
Ingresantes gue las mercedes 2015Ingresantes gue las mercedes 2015
Ingresantes gue las mercedes 2015
 
Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11Threadless Email and Social Media Presentation #MMSEM11
Threadless Email and Social Media Presentation #MMSEM11
 

Similar to Mkb cyber advies nederland / Roel van Rijsewijk Deloitte

Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Xtandit_Marketing
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynoteGerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynoteXeroAccounting
 
Deloitte johan ten houten
Deloitte johan ten houtenDeloitte johan ten houten
Deloitte johan ten houtenBigDataExpo
 
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014CIOnl
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsPuneet Kukreja
 
Harnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital TransformationHarnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital TransformationStephen Huppert
 
Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Bluewire Media
 
Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2Onno Tjeerdsma
 
Larry Quinlan closing keynote
Larry Quinlan closing keynoteLarry Quinlan closing keynote
Larry Quinlan closing keynoteSeattleSIM
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Annie-Marie Page
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Developing The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar IiDeveloping The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar Iiphilliplhunter
 

Similar to Mkb cyber advies nederland / Roel van Rijsewijk Deloitte (20)

Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?Hoe gemakkelijk is het om digitaal in te breken?
Hoe gemakkelijk is het om digitaal in te breken?
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynoteGerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
Gerhard Vorster, Headwinds – Disruption is Real • Xerocon 2014 keynote
 
Deloitte johan ten houten
Deloitte johan ten houtenDeloitte johan ten houten
Deloitte johan ten houten
 
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
Innovation Beyond IT - Erik Ubels (Deloitte) CIO Summit 2014
 
Fidelis Cybersecurity Overview
Fidelis Cybersecurity OverviewFidelis Cybersecurity Overview
Fidelis Cybersecurity Overview
 
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data AssetsFS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
 
Harnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital TransformationHarnessing the 'Bang': from Digital Disruption to Digital Transformation
Harnessing the 'Bang': from Digital Disruption to Digital Transformation
 
Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013Pete Williams Deloitte Centre for the Edge #SMDU 2013
Pete Williams Deloitte Centre for the Edge #SMDU 2013
 
Dr Harvey Lewis - Trends in Big Data, Key Challenges for Skills
Dr Harvey Lewis - Trends in Big Data, Key Challenges for SkillsDr Harvey Lewis - Trends in Big Data, Key Challenges for Skills
Dr Harvey Lewis - Trends in Big Data, Key Challenges for Skills
 
Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2Everett.brandboek.digitaal.2
Everett.brandboek.digitaal.2
 
Larry Quinlan closing keynote
Larry Quinlan closing keynoteLarry Quinlan closing keynote
Larry Quinlan closing keynote
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2Future-proof your business - West Sussex Recover & Rise S4W2
Future-proof your business - West Sussex Recover & Rise S4W2
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Developing The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar IiDeveloping The Best In House Counsel Seminar Ii
Developing The Best In House Counsel Seminar Ii
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Mkb cyber advies nederland / Roel van Rijsewijk Deloitte

  • 2. © 2014. For information, contact Deloitte Touche TohmatsuLimited. The Hacking Mind Know your enemy
  • 3. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Quotes “Security is the responsibility of the datacenter” “Our organization is not a likely target.” “Security does not help us to sell more products” “We don’t have budget for security improvements”
  • 4. © 2014 Deloitte The Netherlands 4 “They Couldn’t Hit an Elephant at that Distance.” John SedgwickMay 9, 1864
  • 5. The danger And the protection against Cybercrime © 2014 Deloitte The Netherlands 5 8% 45% 47% 0% 49% 51% 0% 10% 20% 30% 40% 50% 60% Low/Bad Average High/Good Risk andprotectionagainstcybercrime (n=51) Risk Protected 24% 63% 14% Victim of cybercrime? (n=51) Yes No Unkown -60 -40 -20 0 20 40 60 Mobile Social media Data analytics Cyber security CFO’s: Investment priorities (n=25) (Extremely) High (Extremely) Low Executives estimate the risks of digitalization to be high and claim to be adequately protected against cyber attacks. However, they did decide to heavily invest in Cyber security.
  • 6. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Security Controls Business Impact An organization’s point of view Text Asset An attacker’s point of view Set of skills Motives Text Actor Attack Vectors
  • 7. “A hacker is someone who thinks outside the box. It's someone who discards conventional wisdom, and does something else instead. It's someone who looks at the edge and wonders what's beyond. It's someone who sees a set of rules and wonders what happens if you don't follow them. A hacker is someone who experiments with the limitations of systems for intellectual curiosity.” Bruce Schneier, Secrets and Lies (2000) The danger Whatis a hacker? © 2014 Deloitte The Netherlands 7
  • 8. The danger Who is targeting you? © 2014 Deloitte The Netherlands 8 Attacker Determination Attacker Sophistication Accidental Discovery Malware Insider Lone Hacker / Hobbyist Business Partner ‘Script kiddy’ Disgruntled ex-Employee Disgruntled Customer Competitor Disgruntled ex-IT Administrator ‘Hacktivism’ Cyber Terrorism Hacker Collectives Organised Crime State-sponsored Cyber Warfare Type Permission? Criminal Intent? Blackhat No Yes Greyhat No No Whitehat Yes No
  • 9. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Some thoughts 1.Attackersandresearchersscan everyIP in the public domain daily; 2.Non-targeted attacks can have significant impact; 3.A majority of the security incidents are caused by non-targeted attacks; 4.Non-targetedattacks canlead totargetedattacks; Targeted Attacks Focused on your day-to-day business activities, for example by: •Cybercriminals; steal data, steal money, affect continuity •Disgruntled employees; compromise systems from the inside •Hacktivists; having moral reasons to attack Non-Targeted Attacks Mass-spread malwarevia email, websites, usb-sticks aimingto: •Infect systems/servers forbotnets •Encryptdata andforce organizationtopay(ransomware) •Createstepping stoneforconsequent targetedattack Targeted and Non-Targeted Attacks
  • 10. Hackers •Unlimited time, low costs •Only one hole is sufficient •Rules do not apply Defenders •Limited time, limited budget •Time between discovery and mitigation •Everything is connected and nobody is in charge Hackers vs. Defenders An asymmetric fight © 2014 Deloitte The Netherlands 10
  • 11. © 2014. For information, contact Deloitte Touche TohmatsuLimited. CyberResilience How to survive and thrive in the digital world
  • 12. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 13. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 14. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 15. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 16. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 17. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 18. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 19. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 20. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 21. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 22. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 23. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 24. © 2014. For information, contact Deloitte Touche TohmatsuLimited.
  • 25. © 2014. For information, contact Deloitte Touche TohmatsuLimited. Zodat jij en je organisatie je onbezorgd op het internet kunnen begeven. Happy foto!
  • 26. Deloitte. Deloitte refers to one or more of Deloitte ToucheTohmatsu Limited, a UK private company limited by guarantee (“DTTL”), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as “Deloitte Global”) does not provide services to clients. Please see www.deloitte.com/about for a more detailed description of DTTL and its member firms. This communication is for internal distribution and use only among personnel of Deloitte ToucheTohmatsu Limited, its member firms, and their related entities (collectively, the “Deloitte network”). None of the Deloitte network shall be responsible for any loss whatsoever sustained by any person who relies on this communication.