SlideShare a Scribd company logo
1 of 38
On-premises /
Private cloud
devices datausers apps
THE WORLD BEFORE
MOBILITY & CLOUD
On-premises /
Private cloud
CLOUD APPS & SAAS SERVICES
THE WORLD
TODAY
On-premises /
Private cloud
MOBILE AND PERSONAL DEVICES
On-premises /
Private cloud
ORGANIZATION & SOCIAL IDENTITIES
On-premises /
Private cloud
GDPR
Compliance
Fort Eben Emael
THE WORLD HAS CHANGED
TURBULENT TIMES
Economic Crimes in the World
TOP FOUR
Cybercrime is Now One of the
Security in a cloud enabled world
Cloud service provider responsibility
Tenantresponsibility
Your responsibility for security is based on the type
of cloud service selected.
Cybersecurity threats make security more
challenging – however the public cloud makes it
easier for you to manage as the security load
shifts to the service provider.
Who is looking to attack you?
Script kiddie
Hacktivist
Malicious insiders
Hackers
Cybercrime Syndicates
Nation state sponsored hackers
Top 5 Threats today
Azure ATPMicrosoft Defender ATP
Identity protectionEnd Point protection
Office 365 ATP
Windows Defender AV
User browses to a
website
Phishing
mail
Opens
attachment
Clicks on a URL
+
Exploitation
&
Installation
Command
&
Control
Brute force account or
use stolen account credentials
User account
is compromised
Attacker
attempts
lateral
movement
Privileged
account
compromised
Domain
compromised
Attacker accesses
sensitive data
Exfiltrate data
Phishing kill chain -
Attacker
performs
Reconnaissance
Next Gen AV
Email protection
Cloud App Security
Extends protection & conditional
access to other cloud apps
Azure AD Identity Protection
Identity protection &
conditional access
HELP ??
Traditional Role-based Access Control
user role resource
Access
IF
Privileged user?
Credentials found in public?
Accessing critical app?
(Un)managed device?
Malware detected?
IP detected in Botnet?
Impossible travel?
Anonymous client?
High
Medium
Low
User risk
10TB
per day
THEN
Require MFA
Allow access
Deny access
Force password reset******
Limit access
High
Medium
Low
Session risk
AZURE AD
CONDITIONAL
ACCESS
User
Device
Apps
Location
Some cases out of the field
1) De ‘huis-tuin & keuken’ hack = phishing attempt
2) Targeted Ransomware attack
sabrina@in-deed.be
6 people @ customer
CASE 1: Phase 1: Initial User compromise through Phishing
Person 1
Phase 1: Initial User compromise through Phishing
• Person1







 9990
Phase 2: Use compromised User for further phishing
Phase 2: timeline Phish campaign
0
200
400
600
800
1000
1200
1400
1600
1800
Phase 3: Further compromise other users clicking Phish URL
(+ 100)
0
1
2
3
4
5
6
7
8
9
10
11:09
13:05
13:06
13:07
13:08
13:09
13:10
13:11
13:12
13:13
13:14
13:15
13:16
13:17
13:18
13:19
13:20
13:21
13:22
13:23
13:24
13:25
13:26
13:27
13:28
13:29
13:30
13:32
13:33
13:34
13:37
13:38
13:39
13:41
13:48
13:49
14:01
14:04
14:05
14:09
14:16
14:37
(blank)
Click rate to phishing URL
•

•
• Person 1

•

•

•
•
Response Actions
CASE 2: Targeted Ransomware attack
CASE 2: Response Actions
➢ IAM is your new first line of defense: Strong Identity & Access management
(Conditional Access, MFA,…)
➢ Threat detection & protection across the kill chain (Endpoints n°1)
➢ Detect Cloud Shadow IT
➢ Security awareness / security hygiene
➢ Follow-up on Security Operations
➢ Cyber Remediation playbooks & IT best practices
HOW CAN WE HELP YOU?
Security & Risk
Assessment
Audit the AS IS security &
compliance set-up, needs
and pains
Set-up
consultancy
Pilot POC
A to Z implementation
services, coaching &
guidance
Security Blueprint &
Roadmap
Design of the best-practice
TO BE security architecture
& roadmap forward
Monitor
24/7 monitoring, alert
analysis, remediation
support
A t o Z G U I D A N C E
Contact us:
cloudsecurity@secwise.be
Gaston Geenslaan 311 - B4
3000 – Leuven
www.SecWise.be
Koen Jacobs
Koen.Jacobs@secwise.be
M: +32 473/ 784 295
THANK YOU!

More Related Content

Similar to Openbar Leuven // Safety first... in the Cloud by Koen Jacobs

Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationAboutSSL
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportSymantec
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015RapidSSLOnline.com
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessessSensePost
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber AttacksVenafi
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416Anthony Arrott
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 

Similar to Openbar Leuven // Safety first... in the Cloud by Koen Jacobs (20)

Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud GenerationFour Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat ReportTECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
TECHNICAL WHITE PAPER▶ Symantec Website Security Threat Report
 
Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015Symantec Website Threat Report Part-1 2015
Symantec Website Threat Report Part-1 2015
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Security threats facing SA businessess
Security threats facing SA businessessSecurity threats facing SA businessess
Security threats facing SA businessess
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Volume And Vectors 090416
Volume And Vectors 090416Volume And Vectors 090416
Volume And Vectors 090416
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
 

More from Openbar

Openbar Kontich Online // The Competences of the future: how we applied AI to...
Openbar Kontich Online // The Competences of the future: how we applied AI to...Openbar Kontich Online // The Competences of the future: how we applied AI to...
Openbar Kontich Online // The Competences of the future: how we applied AI to...Openbar
 
Openbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
Openbar Kontich Online // The Legal reality of VR and AR - Kris SeyenOpenbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
Openbar Kontich Online // The Legal reality of VR and AR - Kris SeyenOpenbar
 
Openbar Leuven Online // Launching in Digital Space - Seb De Roover
Openbar Leuven Online // Launching in Digital Space - Seb De RooverOpenbar Leuven Online // Launching in Digital Space - Seb De Roover
Openbar Leuven Online // Launching in Digital Space - Seb De RooverOpenbar
 
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...Openbar
 
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...Openbar
 
Openbar Kontich // The key to successful entrepreneurship
Openbar Kontich // The key to successful entrepreneurshipOpenbar Kontich // The key to successful entrepreneurship
Openbar Kontich // The key to successful entrepreneurshipOpenbar
 
Openbar Leuven // Science fiction and AI
Openbar Leuven // Science fiction and AIOpenbar Leuven // Science fiction and AI
Openbar Leuven // Science fiction and AIOpenbar
 
Openbar Leuven // Ethics in technology - Laurens Somers
Openbar Leuven // Ethics in technology - Laurens Somers Openbar Leuven // Ethics in technology - Laurens Somers
Openbar Leuven // Ethics in technology - Laurens Somers Openbar
 
Openbar Kontich // How to create intelligent & personal conversational AI - W...
Openbar Kontich // How to create intelligent & personal conversational AI - W...Openbar Kontich // How to create intelligent & personal conversational AI - W...
Openbar Kontich // How to create intelligent & personal conversational AI - W...Openbar
 
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van BeeckOpenbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van BeeckOpenbar
 
Openbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
Openbar Leuven // Edge-Computing: On-device AI // Nick DestryckerOpenbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
Openbar Leuven // Edge-Computing: On-device AI // Nick DestryckerOpenbar
 
Openbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert WaltnielOpenbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert WaltnielOpenbar
 
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...Openbar
 
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram ThysOpenbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram ThysOpenbar
 
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...Openbar
 
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...Openbar
 
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...Openbar
 
Openbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
Openbar Leuven // Less is more. Working with less data in NLP by Yves PeirsmanOpenbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
Openbar Leuven // Less is more. Working with less data in NLP by Yves PeirsmanOpenbar
 
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...Openbar
 
Openbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De Meyer
Openbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De MeyerOpenbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De Meyer
Openbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De MeyerOpenbar
 

More from Openbar (20)

Openbar Kontich Online // The Competences of the future: how we applied AI to...
Openbar Kontich Online // The Competences of the future: how we applied AI to...Openbar Kontich Online // The Competences of the future: how we applied AI to...
Openbar Kontich Online // The Competences of the future: how we applied AI to...
 
Openbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
Openbar Kontich Online // The Legal reality of VR and AR - Kris SeyenOpenbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
Openbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
 
Openbar Leuven Online // Launching in Digital Space - Seb De Roover
Openbar Leuven Online // Launching in Digital Space - Seb De RooverOpenbar Leuven Online // Launching in Digital Space - Seb De Roover
Openbar Leuven Online // Launching in Digital Space - Seb De Roover
 
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
 
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
 
Openbar Kontich // The key to successful entrepreneurship
Openbar Kontich // The key to successful entrepreneurshipOpenbar Kontich // The key to successful entrepreneurship
Openbar Kontich // The key to successful entrepreneurship
 
Openbar Leuven // Science fiction and AI
Openbar Leuven // Science fiction and AIOpenbar Leuven // Science fiction and AI
Openbar Leuven // Science fiction and AI
 
Openbar Leuven // Ethics in technology - Laurens Somers
Openbar Leuven // Ethics in technology - Laurens Somers Openbar Leuven // Ethics in technology - Laurens Somers
Openbar Leuven // Ethics in technology - Laurens Somers
 
Openbar Kontich // How to create intelligent & personal conversational AI - W...
Openbar Kontich // How to create intelligent & personal conversational AI - W...Openbar Kontich // How to create intelligent & personal conversational AI - W...
Openbar Kontich // How to create intelligent & personal conversational AI - W...
 
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van BeeckOpenbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
 
Openbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
Openbar Leuven // Edge-Computing: On-device AI // Nick DestryckerOpenbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
Openbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
 
Openbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert WaltnielOpenbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert Waltniel
 
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
 
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram ThysOpenbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
 
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
 
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
 
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
 
Openbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
Openbar Leuven // Less is more. Working with less data in NLP by Yves PeirsmanOpenbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
Openbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
 
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
 
Openbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De Meyer
Openbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De MeyerOpenbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De Meyer
Openbar Kontich // A Gentle Introduction to Quantum Computing by Deevid De Meyer
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Openbar Leuven // Safety first... in the Cloud by Koen Jacobs

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. On-premises / Private cloud devices datausers apps THE WORLD BEFORE MOBILITY & CLOUD
  • 7. On-premises / Private cloud CLOUD APPS & SAAS SERVICES THE WORLD TODAY
  • 8. On-premises / Private cloud MOBILE AND PERSONAL DEVICES
  • 12. THE WORLD HAS CHANGED TURBULENT TIMES
  • 13. Economic Crimes in the World TOP FOUR Cybercrime is Now One of the
  • 14.
  • 15. Security in a cloud enabled world Cloud service provider responsibility Tenantresponsibility Your responsibility for security is based on the type of cloud service selected. Cybersecurity threats make security more challenging – however the public cloud makes it easier for you to manage as the security load shifts to the service provider.
  • 16. Who is looking to attack you? Script kiddie Hacktivist Malicious insiders Hackers Cybercrime Syndicates Nation state sponsored hackers
  • 17. Top 5 Threats today
  • 18.
  • 19. Azure ATPMicrosoft Defender ATP Identity protectionEnd Point protection Office 365 ATP Windows Defender AV User browses to a website Phishing mail Opens attachment Clicks on a URL + Exploitation & Installation Command & Control Brute force account or use stolen account credentials User account is compromised Attacker attempts lateral movement Privileged account compromised Domain compromised Attacker accesses sensitive data Exfiltrate data Phishing kill chain - Attacker performs Reconnaissance Next Gen AV Email protection Cloud App Security Extends protection & conditional access to other cloud apps Azure AD Identity Protection Identity protection & conditional access
  • 21. Traditional Role-based Access Control user role resource Access
  • 22. IF Privileged user? Credentials found in public? Accessing critical app? (Un)managed device? Malware detected? IP detected in Botnet? Impossible travel? Anonymous client? High Medium Low User risk 10TB per day THEN Require MFA Allow access Deny access Force password reset****** Limit access High Medium Low Session risk AZURE AD CONDITIONAL ACCESS User Device Apps Location
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Some cases out of the field 1) De ‘huis-tuin & keuken’ hack = phishing attempt 2) Targeted Ransomware attack
  • 28. sabrina@in-deed.be 6 people @ customer CASE 1: Phase 1: Initial User compromise through Phishing
  • 29. Person 1 Phase 1: Initial User compromise through Phishing
  • 30. • Person1         9990 Phase 2: Use compromised User for further phishing
  • 31. Phase 2: timeline Phish campaign 0 200 400 600 800 1000 1200 1400 1600 1800
  • 32. Phase 3: Further compromise other users clicking Phish URL (+ 100) 0 1 2 3 4 5 6 7 8 9 10 11:09 13:05 13:06 13:07 13:08 13:09 13:10 13:11 13:12 13:13 13:14 13:15 13:16 13:17 13:18 13:19 13:20 13:21 13:22 13:23 13:24 13:25 13:26 13:27 13:28 13:29 13:30 13:32 13:33 13:34 13:37 13:38 13:39 13:41 13:48 13:49 14:01 14:04 14:05 14:09 14:16 14:37 (blank) Click rate to phishing URL
  • 34. CASE 2: Targeted Ransomware attack
  • 35. CASE 2: Response Actions
  • 36. ➢ IAM is your new first line of defense: Strong Identity & Access management (Conditional Access, MFA,…) ➢ Threat detection & protection across the kill chain (Endpoints n°1) ➢ Detect Cloud Shadow IT ➢ Security awareness / security hygiene ➢ Follow-up on Security Operations ➢ Cyber Remediation playbooks & IT best practices
  • 37. HOW CAN WE HELP YOU? Security & Risk Assessment Audit the AS IS security & compliance set-up, needs and pains Set-up consultancy Pilot POC A to Z implementation services, coaching & guidance Security Blueprint & Roadmap Design of the best-practice TO BE security architecture & roadmap forward Monitor 24/7 monitoring, alert analysis, remediation support A t o Z G U I D A N C E
  • 38. Contact us: cloudsecurity@secwise.be Gaston Geenslaan 311 - B4 3000 – Leuven www.SecWise.be Koen Jacobs Koen.Jacobs@secwise.be M: +32 473/ 784 295 THANK YOU!