SlideShare a Scribd company logo
1 of 10
FRAUD and Cybersecurity
- How are they related?
Hoo Chuan Wei CISSP, CISA, CFE, BCCE
Chief CybersecurityTechnology Officer
ST Engineering Electronics
Human asset or risk
Over 70%of companies
say humans are their greatest
vulnerability
- security analyst submit
http://www.humanresourcesonline.net/developing-leaders-weakest-link-emerging-asia/
The FRAUD triangle
The FRAUD Diamond
Source:ACFE.com
Capability = the know-how
https://rcloud.dstl.gov.uk/capability-area/HC
Catch-22
• We are getting ourselves
equipped with cybersecurity
knowledge to protect and
defend
• With the new found knowledge,
we are also able to do “bad”
things; bypass the controls, etc.
http://blogs.iac.gatech.edu/unreliable/2013/10/07/hellers-catch-22/
The CIA AAA SAM pyramids
Confidentiality Integrity
Availability
IT
IoT/OT
Safety
Maintainability
Authentication,Authorisation,Auditing
Domains
expertise
Deep
engineering
mindset
System
assurance
Detect Respond
Protect
Authentication-
determining whether
someone or something
is, in fact, who or what it
is declared to be.
Keeping your
information
asset safe and
secret and share
with people you
trust.
It provides
assurance that
the information
asset is
trustworthy
and accurate.
It is a guarantee
that reliable
access to the
information asset
is available for
authorized
usage.
Auditing - to ascertain
the sequence of events
to present a true and
fair view of the concern.
Authorisation- to determine
user/client privileges or
access levels related to
system resources.
The
probabilityof
performing a
successful
repair action
within a given
time.
The condition of
being protected
from or unlikely
to cause danger,
risk, or threat of
harm and injury.
If an opportunity presents itself, take it
Security is as
strong as the
weakest link
Defense in-
depth
No
perfect
security
Risk
management
What is planned may not be what is exercised
Security circular problem
Conduct frequency?
Frequency of risk assessment?
Cyber-
physical
Complexities
Integration
Enterprise
Architecture
Technology (UBA vs UEBA)
• User Behaviour Analytics (UBA)
• Monitoring human behaviour patterns
• Using algorithms to detect behaviour anomalies
• User and Entity BehaviourAnalytics (UEBA)
• UBA + environmental variables (devices, applications, IT
computing)
The End
https://iteachwithipads.net/2012/12/29/weve-only-just-begun/just-beginning/

More Related Content

What's hot

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
 
11. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber5111. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber51
Doree Garcia, CCNA, OSWP
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
Marco Morana
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
caca1009
 

What's hot (20)

How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
11. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber5111. wireless-penetration-testing-training-cyber51
11. wireless-penetration-testing-training-cyber51
 
Security researcher
Security researcherSecurity researcher
Security researcher
 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyberskills shortage:Where is the cyber workforce of tomorrowCyberskills shortage:Where is the cyber workforce of tomorrow
Cyberskills shortage: Where is the cyber workforce of tomorrow
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your business
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1Owasp atlanta-ciso-guidevs1
Owasp atlanta-ciso-guidevs1
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
Ethical hacking course.
Ethical hacking course.Ethical hacking course.
Ethical hacking course.
 

Similar to Fraud and Cybersecurity: How are they Related?

Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
Muddasarahmed5
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
OllieShoresna
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 

Similar to Fraud and Cybersecurity: How are they Related? (20)

Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Human_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptxHuman_Factors_KA_webinar_-_slides.pptx
Human_Factors_KA_webinar_-_slides.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief inCYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
CYBER SECURITY PRIMERCYBER SECURITY PRIMERA brief in
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
White hat march15 v2.2
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 

More from Institute of Singapore Chartered Accountants

More from Institute of Singapore Chartered Accountants (16)

The Digital CFO
The Digital CFO The Digital CFO
The Digital CFO
 
Unlocking the Full Potential of Supply Chain Finance by Leveraging Technology
Unlocking the Full Potential of Supply Chain Finance by Leveraging TechnologyUnlocking the Full Potential of Supply Chain Finance by Leveraging Technology
Unlocking the Full Potential of Supply Chain Finance by Leveraging Technology
 
Document Management Software, a Worthwhile Investment?
Document Management Software, a Worthwhile Investment? Document Management Software, a Worthwhile Investment?
Document Management Software, a Worthwhile Investment?
 
Digital Innovation for the Intelligent Enterprise - How digital investments i...
Digital Innovation for the Intelligent Enterprise - How digital investments i...Digital Innovation for the Intelligent Enterprise - How digital investments i...
Digital Innovation for the Intelligent Enterprise - How digital investments i...
 
Achieving Automation through Cognitive Technologies - Deloitte
Achieving Automation through Cognitive Technologies - DeloitteAchieving Automation through Cognitive Technologies - Deloitte
Achieving Automation through Cognitive Technologies - Deloitte
 
Transform your Practice's Document Management and Collaboration with Dropbox ...
Transform your Practice's Document Management and Collaboration with Dropbox ...Transform your Practice's Document Management and Collaboration with Dropbox ...
Transform your Practice's Document Management and Collaboration with Dropbox ...
 
Beyond Automation: How Your Company Drives Business Value from Spend Management
Beyond Automation: How Your Company Drives Business Value from Spend ManagementBeyond Automation: How Your Company Drives Business Value from Spend Management
Beyond Automation: How Your Company Drives Business Value from Spend Management
 
Combining Data, AI and Humans to Fundamentally Shift the Audit Proposition
Combining Data, AI and Humans to Fundamentally Shift the Audit PropositionCombining Data, AI and Humans to Fundamentally Shift the Audit Proposition
Combining Data, AI and Humans to Fundamentally Shift the Audit Proposition
 
From Data to Insights
From Data to Insights From Data to Insights
From Data to Insights
 
Automating Data Extraction from Suppliers - Receipt Bank
Automating Data Extraction from Suppliers - Receipt BankAutomating Data Extraction from Suppliers - Receipt Bank
Automating Data Extraction from Suppliers - Receipt Bank
 
Financial Audit using AI: Risk-based Approach - My FinB
Financial Audit using AI: Risk-based Approach - My FinBFinancial Audit using AI: Risk-based Approach - My FinB
Financial Audit using AI: Risk-based Approach - My FinB
 
Digitalising Tax Advisory with Natural Language Processing
Digitalising Tax Advisory with Natural Language ProcessingDigitalising Tax Advisory with Natural Language Processing
Digitalising Tax Advisory with Natural Language Processing
 
The Digital Evolution of Finance Professionals: Eliminating the Mundane, Empo...
The Digital Evolution of Finance Professionals: Eliminating the Mundane, Empo...The Digital Evolution of Finance Professionals: Eliminating the Mundane, Empo...
The Digital Evolution of Finance Professionals: Eliminating the Mundane, Empo...
 
Checking infacebook step-by-step screenshots
Checking infacebook step-by-step screenshotsChecking infacebook step-by-step screenshots
Checking infacebook step-by-step screenshots
 
The Future of Auditor Reporting Forum - Shaping Communication and What It Mea...
The Future of Auditor Reporting Forum - Shaping Communication and What It Mea...The Future of Auditor Reporting Forum - Shaping Communication and What It Mea...
The Future of Auditor Reporting Forum - Shaping Communication and What It Mea...
 
The Future of Auditor Reporting Forum - Overview of IAASB Auditor Reporting P...
The Future of Auditor Reporting Forum - Overview of IAASB Auditor Reporting P...The Future of Auditor Reporting Forum - Overview of IAASB Auditor Reporting P...
The Future of Auditor Reporting Forum - Overview of IAASB Auditor Reporting P...
 

Recently uploaded

Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
JohnnyPlasten
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
MarinCaroMartnezBerg
 

Recently uploaded (20)

April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 

Fraud and Cybersecurity: How are they Related?

  • 1. FRAUD and Cybersecurity - How are they related? Hoo Chuan Wei CISSP, CISA, CFE, BCCE Chief CybersecurityTechnology Officer ST Engineering Electronics
  • 2. Human asset or risk Over 70%of companies say humans are their greatest vulnerability - security analyst submit http://www.humanresourcesonline.net/developing-leaders-weakest-link-emerging-asia/
  • 4. The FRAUD Diamond Source:ACFE.com Capability = the know-how https://rcloud.dstl.gov.uk/capability-area/HC
  • 5. Catch-22 • We are getting ourselves equipped with cybersecurity knowledge to protect and defend • With the new found knowledge, we are also able to do “bad” things; bypass the controls, etc. http://blogs.iac.gatech.edu/unreliable/2013/10/07/hellers-catch-22/
  • 6. The CIA AAA SAM pyramids Confidentiality Integrity Availability IT IoT/OT Safety Maintainability Authentication,Authorisation,Auditing Domains expertise Deep engineering mindset System assurance Detect Respond Protect Authentication- determining whether someone or something is, in fact, who or what it is declared to be. Keeping your information asset safe and secret and share with people you trust. It provides assurance that the information asset is trustworthy and accurate. It is a guarantee that reliable access to the information asset is available for authorized usage. Auditing - to ascertain the sequence of events to present a true and fair view of the concern. Authorisation- to determine user/client privileges or access levels related to system resources. The probabilityof performing a successful repair action within a given time. The condition of being protected from or unlikely to cause danger, risk, or threat of harm and injury.
  • 7. If an opportunity presents itself, take it
  • 8. Security is as strong as the weakest link Defense in- depth No perfect security Risk management What is planned may not be what is exercised Security circular problem Conduct frequency? Frequency of risk assessment? Cyber- physical Complexities Integration Enterprise Architecture
  • 9. Technology (UBA vs UEBA) • User Behaviour Analytics (UBA) • Monitoring human behaviour patterns • Using algorithms to detect behaviour anomalies • User and Entity BehaviourAnalytics (UEBA) • UBA + environmental variables (devices, applications, IT computing)