SlideShare a Scribd company logo
1 of 37
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
CYBERSECURITY ISSUES AND
PROSPECTS IN EAST ASIA
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
And the predictions happening…
• Remote work introduces more security problems!
– Remember zoombombing!
• Identity and multi-factor authentication (MFA)
will take center stage
• Tons of high-profile IoT hacks, some of which will
make headline news
• Ransomware will get worse and worse
• Lots of 5G vulnerabilities will become headline
news as the technology grows
• Advanced Persistent Threats (APT) attacks will be
widely available from criminal networks. The dark
web will allow criminals to buy access into more
sensitive personal or corporate information
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
ARE THINGS BETTER POST PANDEMIC?
•Phishing Becomes Costliest Breach – due to its constant
evolution…
•Healthcare Breach Costs Hit Double Digits for First Time
Ever
•Insufficient Security Staffing
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
EVOLUTION OF CYBERCRIMES, CYBER CRIMINALS!
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
A GOOD CRISIS SHOULD NOT BE
WASTED
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
LEARNINGS
FROM ESTONIA
• What Estonia knows about cyberwarfare
LEARNINGS
FROM ESTONIA
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
WHERE ELSE ARE WE VULNERABLE?
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
JANUARY 1, 2023,
LEARNINGS
* AT LEAST 282 FLIGHTS WERE
CANCELED, DIVERTED, OR
DELAYED, AFFECTING THOUSANDS
OF PASSENGERS AT THE NINOY
AQUINO INTERNATIONAL AIRPORT
(NAIA) AND OTHER AIRPORTS
NATIONWIDE.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
JANUARY 12, 2023
• Flights delayed across the US after FAA system
outage
• created over 10,000 flight delays and more than
1,300 cancellations
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
ATTACK TO CRITICAL INFRASTRUCTURE
• Power/Energy
• Water Supply
• Telecommunications/ICT
• Healthcare
• Ports/Airports
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
The Oldsmar, Florida Incident: Teamviewer AROUND 8 AM on Friday morning, Feb 8, 2021. An
employee of a water treatment plant in the 15,000-
person city of Oldsmar, Florida, noticed that his mouse
cursor was moving strangely on his computer screen,
out of his control, as local police would later tell it.
Initially, he wasn't concerned; the plant used the
remote-access software TeamViewer to allow staff to
share screens and troubleshoot IT issues, and his
boss often connected to his computer to monitor the
facility's systems.
But a few hours later, police say, the plant operator
noticed his mouse moving out of his control again. This
time there would be no illusion of benign monitoring
from a supervisor or IT person. The cursor began
clicking through the water treatment plant's controls.
Within seconds, the intruder was attempting to change
the water supply's levels of sodium hydroxide, also
known as lye or caustic soda, moving the setting from
100 parts per million to 11,100 parts per million. In low
concentrations the corrosive chemical regulates the
PH level of potable water. At high levels, it severely
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
STUXNET
Stuxnet Worm: One of the World's First Cyber Attacks | World101
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
THE GROWING MOMENTUM OF
DISINFORMATION WITHIN CYBER WARFARE
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
THE STATE OF DISINFORMATION - TAIWAN
August 2022
• Across social media, fabricated stories claimed that China was evacuating its citizens
from Taiwan and missiles were targeting a local airport, just days after U.S. House
Speaker Nancy Pelosi had arrived on the island
• At the same time, messages appeared on hacked digital signage in 7-Eleven
convenience stores throughout Taiwan that had been changed to read: "Warmonger
Pelosi, get out of Taiwan!" At a train station in the southern port city of Kaohsiung,
altered digital signs called Pelosi "an old witch."
• Hackers even brought down Taiwanese president Tsai Ing-wen's official government
website for around 20 minutes
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
• Are the bad actors winning?
• Dangers of Geofencing: Privacy Issues
• Inconvenience of Convenience
• IOT
• Baby Monitors
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
HOW ARE COUNTRIES COPING?
• Top Cybersecurity Agenda in the REGION
• What and HOW Countries within East ASIA are responding?
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
What are these 2 countries doing differently:
There are a few trends being observed
regarding the cybersecurity market share in
Malaysia:
The government is investing more in
cybersecurity, which is driving up demand
for solutions
•An increasing awareness of cybersecurity risks
due to education as well as real-life example of
cyber breaches.
•More and more businesses are outsourcing
their cybersecurity needs, which is increasing
the market share of cybersecurity providers.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
What are these 2 countries doing differently:
Singapore
Four pillars underpin the Strategy, namely:
•Building a Resilient Infrastructure. A key focus of the
Strategy is to ensure that Singapore's essential services are
protected
•Creating a Safer Cyberspace
•Developing a Vibrant Cybersecurity Ecosystem
•Strengthening International partnerships.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
WHAT DO WE HAVE?
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
16 CYBERCRIMES COVERED UNDER
CYBERCRIME PREVENTION ACT –
REPUBLIC ACT 10175
cybercrime in the Philippines
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
DND 10 POINT DEFENSE AGENDA
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
CYBER RANGES
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
WHAT CAN YOU DO AS
A REAL INFLUENCERS TO
INFLUENCE PARADIGM
SHIFT IN THE
PHILIPPINES TOWARDS
A CYBERSAFE COUNTRY?
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
What cybersecurity trends can we expect to see in
2023
• More Focus on the “unmanned”, AI, Electronic
Warfare
• Greater focus on protecting the “REMOTE” and
“Hybrid”
• Greater reliance on the cloud is exposing more risk
for businesses
• Increased exploitation of connectedness between
applications and systems
• Effects of geopolitical tensions continue
• Economic constraints breed new cybersecurity
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
BREAKOUT SESSION
• The class will be divided into 5
• Nominate a presenter and a note taker
• Scenario: Out of the 5 critical infrastructure, 1 team will be assigned a Critical
Infrastructure and you will identify how do you plan to PROTECT this infrastructure from
Cyber Attack or any form of Malicious Cyber Threat. What are your initial
recommendations?
• Water supply (drinking water, waste water/sewage, stemming of surface water (e.g. dikes)
• Health Sector (Hospitals, Pharmaceuticals)
• Transportation systems (fuel supply, railway network, airports, harbours, inland shipping);
• Electricity and Power Generation, transmission and distribution; (e.g. natural gas, fuel oil, coal, nuclear
power)
• Telecommunication; coordination for successful operations
• Others:
• Security services/Law Enforcement (police, military)
• Economic sector; Goods and services and financial services (banking, clearing);
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
• 15 Mins to brainstorm
• Each team will be given 5 mins to present
• Arrange the Infrastructure by Criticality based on the
team’s decision
• Explain WHY you arranged it that way
• Indicate HELP NEEDED from the Government – Funding,
Manpower/Resources, Training/Other Resources
• With the limited resources – What can you and your team
do?
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
CYBERSECURITY IS A SHARED RESPONSIBILITY!
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
THANK YOU!
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
• https://www.gartner.com/
• https://www.isaca.org/
• https://cipher.com/
• https://techwireasia.com/2023/01/top-5-data-
breach-incidents-in-southeast-asia-in-2022/
• https://www.openaccessgovernment.org/cybersecu
rity-trends-to-expect-in-2023-digital-technologies-
applications-services/150943/
• https://www.securitymagazine.com/articles/98729-
18-cybersecurity-predictions-for-2023
• Credits to online materials and original owners
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
ADDITIONAL SLIDES!
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
CAREERS IN CYBERSECURITY
CTTO
This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.

More Related Content

Similar to Mr+Pulido+-+Cybersecurity+Issues+and+Prospects+in+East+Asia.pptx

wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
SophiaPalmira1
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
jsnyder40
 

Similar to Mr+Pulido+-+Cybersecurity+Issues+and+Prospects+in+East+Asia.pptx (20)

IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
CA_Module_1.pdf
CA_Module_1.pdfCA_Module_1.pdf
CA_Module_1.pdf
 
India is Cyber Vulnerable
India is Cyber VulnerableIndia is Cyber Vulnerable
India is Cyber Vulnerable
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 

Recently uploaded

Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdfForbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
UK Journal
 

Recently uploaded (8)

Analyzing Nepal's Third Investment Summit.pdf
Analyzing Nepal's Third Investment Summit.pdfAnalyzing Nepal's Third Investment Summit.pdf
Analyzing Nepal's Third Investment Summit.pdf
 
Decentralisation and local government in India
Decentralisation and local government in IndiaDecentralisation and local government in India
Decentralisation and local government in India
 
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Musina
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In MusinaTop^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Musina
Top^Clinic ^%[+27785538335__Safe*Women's clinic//Abortion Pills In Musina
 
13052024_First India Newspaper Jaipur.pdf
13052024_First India Newspaper Jaipur.pdf13052024_First India Newspaper Jaipur.pdf
13052024_First India Newspaper Jaipur.pdf
 
Income Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdfIncome Tax Regime Dilemma – New VS. Old pdf
Income Tax Regime Dilemma – New VS. Old pdf
 
Press-Information-Bureau-14-given-citizenship.pdf
Press-Information-Bureau-14-given-citizenship.pdfPress-Information-Bureau-14-given-citizenship.pdf
Press-Information-Bureau-14-given-citizenship.pdf
 
Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdfForbes Senior Contributor Billy Bambrough  Master of Tech Journalism.pdf
Forbes Senior Contributor Billy Bambrough Master of Tech Journalism.pdf
 
19052024_First India Newspaper Jaipur.pdf
19052024_First India Newspaper Jaipur.pdf19052024_First India Newspaper Jaipur.pdf
19052024_First India Newspaper Jaipur.pdf
 

Mr+Pulido+-+Cybersecurity+Issues+and+Prospects+in+East+Asia.pptx

  • 1. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. CYBERSECURITY ISSUES AND PROSPECTS IN EAST ASIA
  • 2. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
  • 3. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
  • 4. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. And the predictions happening… • Remote work introduces more security problems! – Remember zoombombing! • Identity and multi-factor authentication (MFA) will take center stage • Tons of high-profile IoT hacks, some of which will make headline news • Ransomware will get worse and worse • Lots of 5G vulnerabilities will become headline news as the technology grows • Advanced Persistent Threats (APT) attacks will be widely available from criminal networks. The dark web will allow criminals to buy access into more sensitive personal or corporate information
  • 5. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. ARE THINGS BETTER POST PANDEMIC? •Phishing Becomes Costliest Breach – due to its constant evolution… •Healthcare Breach Costs Hit Double Digits for First Time Ever •Insufficient Security Staffing
  • 6. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. EVOLUTION OF CYBERCRIMES, CYBER CRIMINALS!
  • 7. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
  • 8. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. A GOOD CRISIS SHOULD NOT BE WASTED
  • 9. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. LEARNINGS FROM ESTONIA • What Estonia knows about cyberwarfare LEARNINGS FROM ESTONIA
  • 10. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. WHERE ELSE ARE WE VULNERABLE?
  • 11. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. JANUARY 1, 2023, LEARNINGS * AT LEAST 282 FLIGHTS WERE CANCELED, DIVERTED, OR DELAYED, AFFECTING THOUSANDS OF PASSENGERS AT THE NINOY AQUINO INTERNATIONAL AIRPORT (NAIA) AND OTHER AIRPORTS NATIONWIDE.
  • 12. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. JANUARY 12, 2023 • Flights delayed across the US after FAA system outage • created over 10,000 flight delays and more than 1,300 cancellations
  • 13. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. ATTACK TO CRITICAL INFRASTRUCTURE • Power/Energy • Water Supply • Telecommunications/ICT • Healthcare • Ports/Airports
  • 14. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. The Oldsmar, Florida Incident: Teamviewer AROUND 8 AM on Friday morning, Feb 8, 2021. An employee of a water treatment plant in the 15,000- person city of Oldsmar, Florida, noticed that his mouse cursor was moving strangely on his computer screen, out of his control, as local police would later tell it. Initially, he wasn't concerned; the plant used the remote-access software TeamViewer to allow staff to share screens and troubleshoot IT issues, and his boss often connected to his computer to monitor the facility's systems. But a few hours later, police say, the plant operator noticed his mouse moving out of his control again. This time there would be no illusion of benign monitoring from a supervisor or IT person. The cursor began clicking through the water treatment plant's controls. Within seconds, the intruder was attempting to change the water supply's levels of sodium hydroxide, also known as lye or caustic soda, moving the setting from 100 parts per million to 11,100 parts per million. In low concentrations the corrosive chemical regulates the PH level of potable water. At high levels, it severely
  • 15. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. STUXNET Stuxnet Worm: One of the World's First Cyber Attacks | World101
  • 16. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. THE GROWING MOMENTUM OF DISINFORMATION WITHIN CYBER WARFARE
  • 17. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. THE STATE OF DISINFORMATION - TAIWAN August 2022 • Across social media, fabricated stories claimed that China was evacuating its citizens from Taiwan and missiles were targeting a local airport, just days after U.S. House Speaker Nancy Pelosi had arrived on the island • At the same time, messages appeared on hacked digital signage in 7-Eleven convenience stores throughout Taiwan that had been changed to read: "Warmonger Pelosi, get out of Taiwan!" At a train station in the southern port city of Kaohsiung, altered digital signs called Pelosi "an old witch." • Hackers even brought down Taiwanese president Tsai Ing-wen's official government website for around 20 minutes
  • 18. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. • Are the bad actors winning? • Dangers of Geofencing: Privacy Issues • Inconvenience of Convenience • IOT • Baby Monitors
  • 19. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. HOW ARE COUNTRIES COPING? • Top Cybersecurity Agenda in the REGION • What and HOW Countries within East ASIA are responding?
  • 20. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. What are these 2 countries doing differently: There are a few trends being observed regarding the cybersecurity market share in Malaysia: The government is investing more in cybersecurity, which is driving up demand for solutions •An increasing awareness of cybersecurity risks due to education as well as real-life example of cyber breaches. •More and more businesses are outsourcing their cybersecurity needs, which is increasing the market share of cybersecurity providers.
  • 21. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. What are these 2 countries doing differently: Singapore Four pillars underpin the Strategy, namely: •Building a Resilient Infrastructure. A key focus of the Strategy is to ensure that Singapore's essential services are protected •Creating a Safer Cyberspace •Developing a Vibrant Cybersecurity Ecosystem •Strengthening International partnerships.
  • 22. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
  • 23. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.
  • 24. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. WHAT DO WE HAVE?
  • 25. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. 16 CYBERCRIMES COVERED UNDER CYBERCRIME PREVENTION ACT – REPUBLIC ACT 10175 cybercrime in the Philippines
  • 26. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. DND 10 POINT DEFENSE AGENDA
  • 27. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. CYBER RANGES
  • 28. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. WHAT CAN YOU DO AS A REAL INFLUENCERS TO INFLUENCE PARADIGM SHIFT IN THE PHILIPPINES TOWARDS A CYBERSAFE COUNTRY?
  • 29. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. What cybersecurity trends can we expect to see in 2023 • More Focus on the “unmanned”, AI, Electronic Warfare • Greater focus on protecting the “REMOTE” and “Hybrid” • Greater reliance on the cloud is exposing more risk for businesses • Increased exploitation of connectedness between applications and systems • Effects of geopolitical tensions continue • Economic constraints breed new cybersecurity
  • 30. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. BREAKOUT SESSION • The class will be divided into 5 • Nominate a presenter and a note taker • Scenario: Out of the 5 critical infrastructure, 1 team will be assigned a Critical Infrastructure and you will identify how do you plan to PROTECT this infrastructure from Cyber Attack or any form of Malicious Cyber Threat. What are your initial recommendations? • Water supply (drinking water, waste water/sewage, stemming of surface water (e.g. dikes) • Health Sector (Hospitals, Pharmaceuticals) • Transportation systems (fuel supply, railway network, airports, harbours, inland shipping); • Electricity and Power Generation, transmission and distribution; (e.g. natural gas, fuel oil, coal, nuclear power) • Telecommunication; coordination for successful operations • Others: • Security services/Law Enforcement (police, military) • Economic sector; Goods and services and financial services (banking, clearing);
  • 31. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. • 15 Mins to brainstorm • Each team will be given 5 mins to present • Arrange the Infrastructure by Criticality based on the team’s decision • Explain WHY you arranged it that way • Indicate HELP NEEDED from the Government – Funding, Manpower/Resources, Training/Other Resources • With the limited resources – What can you and your team do?
  • 32. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. CYBERSECURITY IS A SHARED RESPONSIBILITY!
  • 33. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. THANK YOU!
  • 34. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. • https://www.gartner.com/ • https://www.isaca.org/ • https://cipher.com/ • https://techwireasia.com/2023/01/top-5-data- breach-incidents-in-southeast-asia-in-2022/ • https://www.openaccessgovernment.org/cybersecu rity-trends-to-expect-in-2023-digital-technologies- applications-services/150943/ • https://www.securitymagazine.com/articles/98729- 18-cybersecurity-predictions-for-2023 • Credits to online materials and original owners
  • 35. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. ADDITIONAL SLIDES!
  • 36. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization. CAREERS IN CYBERSECURITY CTTO
  • 37. This item's classification is Internal. It was created by and is in property of the Home Credit Group. Do not distribute outside of the organization.

Editor's Notes

  1. Cyber incidents tops the Allianz Risk Barometer for only the second time in the survey’s history (44% of responses), Business interruption drops to a close second (42%) and Natural catastrophes ranks third (25%), up from sixth in 2021. Climate change climbs to its highest-ever ranking of sixth (17%, up from ninth), while Pandemic outbreak drops to fourth (22%).y affected firms in the past year. “