How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
The novel coronavirus (COVID-19) has changed the way human think and live. COVID-19 has forced people to embrace new practices such as social distancing and remote working.
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
Ransomware. The very word strikes fear into the hearts of admins, backup specialists, and security pros. Backup software vendors know if all your data is not protected, there is a good chance that if (when?) ransomware hits, you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
First presented at Cybersecurity for Maritime Summit 2017 in Oct 2017. Subsequently presented at Temasek Polytechnic ISACA Day in Nov 2017. Audience comprises of cybersecurity professionals in the maritime sector and also cybersecurity students who are keen to learn more about cybersecurity considerations in a shipping port environment.
Threat Landscape Lessons from IoTs and Honeynets
This talk is aimed at arming IT professionals with insight into WatchGuard’s latest threat security research.
Oh... that's ransomware and... look behind you a three-headed MonkeyStefano Maccaglia
A funny presentation me and Marco Faggian held for ISACA seminar in November 2020 related to our investigation of some Ransomware cases... stay tuned... oh... look behind you a three-headed monkey!...
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
The novel coronavirus (COVID-19) has changed the way human think and live. COVID-19 has forced people to embrace new practices such as social distancing and remote working.
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
Ransomware. The very word strikes fear into the hearts of admins, backup specialists, and security pros. Backup software vendors know if all your data is not protected, there is a good chance that if (when?) ransomware hits, you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?
Future-proofing maritime ports against emerging cyber-physical threatsSteven SIM Kok Leong
First presented at Cybersecurity for Maritime Summit 2017 in Oct 2017. Subsequently presented at Temasek Polytechnic ISACA Day in Nov 2017. Audience comprises of cybersecurity professionals in the maritime sector and also cybersecurity students who are keen to learn more about cybersecurity considerations in a shipping port environment.
Threat Landscape Lessons from IoTs and Honeynets
This talk is aimed at arming IT professionals with insight into WatchGuard’s latest threat security research.
Oh... that's ransomware and... look behind you a three-headed MonkeyStefano Maccaglia
A funny presentation me and Marco Faggian held for ISACA seminar in November 2020 related to our investigation of some Ransomware cases... stay tuned... oh... look behind you a three-headed monkey!...
Threat hunting is the best, proactive approach. But, excelling at threat hunting, discovering adversaries takes time, patience, planning, and some serious skills. Mature beyond the basics of hunting and evolve your program!
The numbers are shocking: 69% of enterprise security executives report having experienced insider threats over one year. At the same time, 62% of business users report having access to data they should not see. Making matters worse? 43% of business say it takes at least a month (if not longer) to detect employees viewing files and emails they’re not authorized to access.*
With its comprehensive suite of flexible, simple, efficient solutions, Cisco Security offers a seamless approach designed to ease the burden on your IT team while strengthening your security posture. That includes Cisco Stealthwatch, a network visibility and security analytics system. Using NetFlow, Stealthwatch helps you use your network as a security sensor and enforcer to detect and remediate attacks, ultimately improving your threat defense—including time to detection and response.
Today, nearly a third of organizations lack the ability to prevent or deter insider threats.* Don’t let your agency be one of them.
I used to get questions on what it takes to have a career in Information Security. Here are my thoughts on building a career in Security touching points like skills, job titles, are certifications needed etc
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
A close look at how leveraging backup and recovery principals with Infrascale can help organizations beat ransomware attacks. Very cool technology which also augments DR/BC preparedness.
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardHITCON GIRLS
2017年12月10日 - Birds of a Feather ( 簡稱BoF ),語意上是指鳥類會與相同類型的鳥群一起飛翔,之後衍伸為讓志同道合的人們聚集在一起或舉辦非正式聚會。
https://hitcon-girls.blogspot.tw/2017/12/Birds-of-a-Feather.html
An overview of why knowing programming can make you a better cyber security professional, a look at the most popular languages and some pitfalls to avoid
-
As German defense minister, Ursula von der Leyen can attest, fingerprints can be hacked. So can facial and other biometrics. Why, then, is biometric-based authentication so fashionable? Why did one of the largest insurance companies just announce it is rolling out fingerprint and facial recognition for its customers (while it uses Symantec VIP for internal employees)? Did product management and marketing conduct a study that concluded customers feel safer with fingerprint and facial?
Apple’s Touch ID, and VISA’s integration with it are shaping the fashionable trend faster than a Milan runway. Hopefully these short hemlines will fade soon. Apple’s senior vice president, Dan Riccio, irresponsibly claims, “Fingerprints are one of the best passwords in the world.” He probably understands it is easy to reset a password. He probably does not understand how hard it is to reset his fingerprints. Truly the inmates are running the asylum.
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
With recent attacks on hospital data catching headlines, we wanted to provide some best practices in this webinar to keep your systems safe and sound! We will be co-presenting this webinar with our partners at Intellisuite IT Solutions.
What you will learn:
How-to use an Intranet to educate staff on IT security
How-to Engage staff in pro-active thinking about IT and patient privacy with a social Intranet tools.
How a proactive IT plan and an Intranet can help keep an organization safe from Ransomware Attacks
How-to publish and ensure readership on HITECH, HIPPA and other IT policies across the entire hospital using a web based Policy Manager
How an Intranet can alert staff of an attack and train staff on ways to prevent attacks
How to leverage layered security to prevent ransomware attack
Important elements of a layer security approach
What to do if ransomware attack evades the initial layer
Risks of vulnerable or unprotected system
Organization’s recourse for getting back to production are restoring from backup or paying the ransom
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
Are Cybersecurity threats increasing? Learn about protecting your business with a security program and understanding ransomware threats. Join us as Google's Biodun Awojobi and Wade Walters join us to discuss "Security Programs and Ransomware in the Cloud." We expect to have additional Cybersecurity events in future to cover security posture, Zero Trust, Google's Cybersecurity products & more!
#cybersecurity #ransomware #google #gdg #gdgcloudsouthlake
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
In our modern world, we’ve learned to take for granted the universal availability of things like running water and electricity, and more recently, the Internet. As technology progresses, we are rapidly approaching a future in which nearly everything is digitally connected to nearly everything else. At the same time, we are learning to accept that all digital devices are broken from a security perspective. How we respond and adapt to this reality could well determine whether our future is utopian or dystopian. In In this interactive session, we will explore novel avenues of attack using digital “soft-targets”, and discuss how we might hold things together in the face of persistent vulnerability.
While advancements in technology have greatly improved the speed, efficiency and capability of investment advisers’ and broker-dealers’ systems and workflows, these developments have also significantly increased operational and reputational risk. An isolated system intrusion can have dramatic consequences for a SEC or FINRA registrant including financial loss, ongoing liability to clients and investors and potential regulatory enforcement action. In today’s environment, if a “hacked” SEC or FINRA registrant has any hope of avoiding a regulatory enforcement action, it is imperative they can demonstrate that they have adequate policies and procedures to identify and test potential cybersecurity vulnerabilities and weaknesses. Such policies must also address the experience, security vetting process and the location of any external party performing such tests.
Ransomware has not gone away. In fact, ransomware criminals have evolved their malware so they can encrypt more data before detection and increase the likelihood you will pay their ransom.
Slide Griffin - Practical Attacks and MitigationsEnergySec
Over the past few years, penetration testing has gotten easier. What used to take a week of scanning, analysis, and exploit research now happens in one day on average in a common IT environment. The efficiency of compromise has increased based on several factors including increased knowledge sharing, more robust computing, and automated exploitation tools. OT environments are often utilizing the same operating systems and are prone to many of the same attacks. The main differences are the presence of custom protocols, embedded systems, and lack of formal security programs to address the gaps created by two-way data communication networks.
This talk will show the most common attacks which our team currently uses to gain access and control over the networks and systems we test. More importantly, we will discuss the “top 10” things an organization can do to mitigate, remediate, and have active visibility into critical systems.
2016, A new era of OS and Cloud SecurityTudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
Threat hunting is the best, proactive approach. But, excelling at threat hunting, discovering adversaries takes time, patience, planning, and some serious skills. Mature beyond the basics of hunting and evolve your program!
The numbers are shocking: 69% of enterprise security executives report having experienced insider threats over one year. At the same time, 62% of business users report having access to data they should not see. Making matters worse? 43% of business say it takes at least a month (if not longer) to detect employees viewing files and emails they’re not authorized to access.*
With its comprehensive suite of flexible, simple, efficient solutions, Cisco Security offers a seamless approach designed to ease the burden on your IT team while strengthening your security posture. That includes Cisco Stealthwatch, a network visibility and security analytics system. Using NetFlow, Stealthwatch helps you use your network as a security sensor and enforcer to detect and remediate attacks, ultimately improving your threat defense—including time to detection and response.
Today, nearly a third of organizations lack the ability to prevent or deter insider threats.* Don’t let your agency be one of them.
I used to get questions on what it takes to have a career in Information Security. Here are my thoughts on building a career in Security touching points like skills, job titles, are certifications needed etc
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
A close look at how leveraging backup and recovery principals with Infrascale can help organizations beat ransomware attacks. Very cool technology which also augments DR/BC preparedness.
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardHITCON GIRLS
2017年12月10日 - Birds of a Feather ( 簡稱BoF ),語意上是指鳥類會與相同類型的鳥群一起飛翔,之後衍伸為讓志同道合的人們聚集在一起或舉辦非正式聚會。
https://hitcon-girls.blogspot.tw/2017/12/Birds-of-a-Feather.html
An overview of why knowing programming can make you a better cyber security professional, a look at the most popular languages and some pitfalls to avoid
-
As German defense minister, Ursula von der Leyen can attest, fingerprints can be hacked. So can facial and other biometrics. Why, then, is biometric-based authentication so fashionable? Why did one of the largest insurance companies just announce it is rolling out fingerprint and facial recognition for its customers (while it uses Symantec VIP for internal employees)? Did product management and marketing conduct a study that concluded customers feel safer with fingerprint and facial?
Apple’s Touch ID, and VISA’s integration with it are shaping the fashionable trend faster than a Milan runway. Hopefully these short hemlines will fade soon. Apple’s senior vice president, Dan Riccio, irresponsibly claims, “Fingerprints are one of the best passwords in the world.” He probably understands it is easy to reset a password. He probably does not understand how hard it is to reset his fingerprints. Truly the inmates are running the asylum.
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
With recent attacks on hospital data catching headlines, we wanted to provide some best practices in this webinar to keep your systems safe and sound! We will be co-presenting this webinar with our partners at Intellisuite IT Solutions.
What you will learn:
How-to use an Intranet to educate staff on IT security
How-to Engage staff in pro-active thinking about IT and patient privacy with a social Intranet tools.
How a proactive IT plan and an Intranet can help keep an organization safe from Ransomware Attacks
How-to publish and ensure readership on HITECH, HIPPA and other IT policies across the entire hospital using a web based Policy Manager
How an Intranet can alert staff of an attack and train staff on ways to prevent attacks
How to leverage layered security to prevent ransomware attack
Important elements of a layer security approach
What to do if ransomware attack evades the initial layer
Risks of vulnerable or unprotected system
Organization’s recourse for getting back to production are restoring from backup or paying the ransom
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
Are Cybersecurity threats increasing? Learn about protecting your business with a security program and understanding ransomware threats. Join us as Google's Biodun Awojobi and Wade Walters join us to discuss "Security Programs and Ransomware in the Cloud." We expect to have additional Cybersecurity events in future to cover security posture, Zero Trust, Google's Cybersecurity products & more!
#cybersecurity #ransomware #google #gdg #gdgcloudsouthlake
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
In our modern world, we’ve learned to take for granted the universal availability of things like running water and electricity, and more recently, the Internet. As technology progresses, we are rapidly approaching a future in which nearly everything is digitally connected to nearly everything else. At the same time, we are learning to accept that all digital devices are broken from a security perspective. How we respond and adapt to this reality could well determine whether our future is utopian or dystopian. In In this interactive session, we will explore novel avenues of attack using digital “soft-targets”, and discuss how we might hold things together in the face of persistent vulnerability.
While advancements in technology have greatly improved the speed, efficiency and capability of investment advisers’ and broker-dealers’ systems and workflows, these developments have also significantly increased operational and reputational risk. An isolated system intrusion can have dramatic consequences for a SEC or FINRA registrant including financial loss, ongoing liability to clients and investors and potential regulatory enforcement action. In today’s environment, if a “hacked” SEC or FINRA registrant has any hope of avoiding a regulatory enforcement action, it is imperative they can demonstrate that they have adequate policies and procedures to identify and test potential cybersecurity vulnerabilities and weaknesses. Such policies must also address the experience, security vetting process and the location of any external party performing such tests.
Ransomware has not gone away. In fact, ransomware criminals have evolved their malware so they can encrypt more data before detection and increase the likelihood you will pay their ransom.
Slide Griffin - Practical Attacks and MitigationsEnergySec
Over the past few years, penetration testing has gotten easier. What used to take a week of scanning, analysis, and exploit research now happens in one day on average in a common IT environment. The efficiency of compromise has increased based on several factors including increased knowledge sharing, more robust computing, and automated exploitation tools. OT environments are often utilizing the same operating systems and are prone to many of the same attacks. The main differences are the presence of custom protocols, embedded systems, and lack of formal security programs to address the gaps created by two-way data communication networks.
This talk will show the most common attacks which our team currently uses to gain access and control over the networks and systems we test. More importantly, we will discuss the “top 10” things an organization can do to mitigate, remediate, and have active visibility into critical systems.
2016, A new era of OS and Cloud SecurityTudor Damian
The global security landscape is changing, now more than ever. With cloud computing gaining momentum and advanced persistent threats becoming a common occurrence, the industry is taking a more focused and serious approach when it comes to security, especially after some of last years’ heavily publicized incidents. Join this session for a discussion on what Microsoft is doing to protect against these new security threats with fresh approaches taken both at the server & client OS level, as well as in Azure.
Presentation restaurant De Rand Van Havelte, Drenthe, the NetherlandsRen van Stekelenborg
In order to raise awareness and attract new visitors to this beautiful and honest restaurant, I was asked to point out my views on communications and marketing tactics on and offline.
Cyber attacks have been hitting the headlines for years; but in spite of the risks, the reputational damage and the rising cost of fines, there is still an endless stream of businesses being exposed for security failings.
The scale of the problem is vast: Accenture’s recent 2016 Global Security Report highlighted “an astounding level of breaches” with the organisations surveyed facing more than 80 targeted attacks every year, of which a third were successful. Much has been made of the evolving threat landscape and increasing sophistication of attacks. But whilst there is evidence to support the growing complexity of the challenge, all too often the analysis of these high-profile attacks determines basic, foundational security principles were ignored.
Some commentators argue that the persistence of failings is a direct reflection of organisational priorities, and that while businesses may talk a good game, security is not yet given the attention that it requires at board level. This leaves CISOs and IT leaders fighting a losing battle to secure adequate attention and investment for an area of the business which does not generate revenue.
This conference will look at raising security standards across the business, exploring some of the most persistent problems from IT infrastructure to staff engagement. Amidst a backdrop of perpetual media hysteria, turbulent markets and looming regulatory change, it can prove difficult to establish a coherent picture of the threat, never mind what action to take. The conference will help contextualise the challenging landscape and discuss how to deliver meaningful improvements and end to end organisational resilience.
How underground markets for stolen data and hacking tools are driving cybercrime today, and some of the possible security responses, defenses, and strategies
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
There's a data explosion underway and it's a lucrative market for cyber criminals. Charities with their complex contexts and valuable data are an obvious target and so it's essential Cyber threats are addressed in Charities' risk strategies.
This presentation set outs the current situation, what the potential consequences are and who could be impacted before explaining what can be done about it and how to approach the challenge.
Presentation to representatives from the UK Charities sector at the Charity Finance Group's annual IT, Data, Insights and Cyber Security Conference.
How can we we ensure the continuous protection of the enterprises mission critical IT systems, information and business processes from emerging threats? How prepared are we?
Brochure of International College For Security Studies , Learn and Get Trained by Professional Experts and Discover the Cyber Security Industry ,
For More Visit us at https://icssindia.org
https://cyber.icssindia.org
What is Information Security and why you should care ...James Mulhern
An interactive introduction to Information Security and Cyber Security for BTEC students studying IT at Swindon College in the UK. The session illustrates the breadth and diversity of the subject and opportunities it can offer. The session illustrates things might not always be as they seem and the impacts can be far more reaching than at first imagined.
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
In order to effectively defend your organization, you must think about the offensive strategy as well. But before we get ahead of ourselves let’s talk briefly about the building blocks of a good offense. First is an architecture that is built around a security policy that is aligned with the business risk. Risk must be understood and a cookie cutter approach must be avoided here because again every organization is different and so are their risks.
Malware in the Wild: Evolving to Evade DetectionLastline, Inc.
Lastline co-founder and chief architect Engin Kirda presents new insights into malware in the wild including new research coming out of Lastline Labs on high resolution dynamic analysis of Windows kernel root kits at SXSW Interactive.
EverSec + Cyphort: Big Trends in CybersecurityCyphort
Advanced threats are changing so often it is getting harder and harder to keep up! In addition to new attacks, hackers are reinventing older ones, making it even more difficult to detect. In this webinar, we will discuss at a high-level some of biggest cybersecurity threats happening right now, including:
--The Resurgence of Ransomware - Locky and other new cryptolockers
--Malvertising, oh My! - No website is safe from unknowingly spreading malware to visitors
--I have RATs - How to defend against Remote Access Trojans stealing your data
With more than 50,000 new malware created every day organisations can no longer afford to risk the financial and reputational impacts of a security or data breach, which can be too much for a business to recover from. Because of this, IT managers face increasing scrutiny and pressure from CEOs, managing directors and boards to prove that they are keeping the organisation secure.
The changing threat landscape means organisations need to be vigilant and smarter about security. While businesses still face threats from infected devices and malware, attackers have also moved beyond that. For example, there is an increasing number of targeted email attacks with cyber criminals spending time to monitor communications so they can imitate emails that are so sophisticated that even relatively savvy users will open them.
This webinar will explore the building blocks required to ensure you have the roadmap required to best protection against cyber attacks. We will provide you with a high level view of the following topics:
· Audit and discovery – What are your weaknesses and are you compliant?
· Education – Do your employees know when not to open that attachment?
· Policy – Do you have the right policies for your industry?
· Technology – Where to start and what has changed?
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
In this presentation from their joint webinar, security experts and trainers at CQURE, Greg Tworek and Mike Jankowski-Lorek, help you put on your hacker cap to better identify dangerous vulnerabilities, strengthen your systems, and STOP the data breaches that litter the news sites today. They will also demonstrate how to exploit systems and how (from the hacker perspective) this can be proactively mitigated.
Catch the full on-demand webinar here:
https://www.beyondtrust.com/resources/webinar/hackers-playbook-think-like-cybercriminal-reduce-risk/?access_code=de936e36f25bb91acaae7593959af3c1
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
In this presentation from his webinar, IoT Security Expert Rob Black, CISSP, Founder and Managing Principal of Fractional CISO, discusses the common thread of many of today's cyberattacks. Key themes covered include:
- Post-mortem analysis of recent cybersecurity attacks and how you could mitigate against similar threats
- Evaluation of password breakdowns in protecting your organization
- Review of a high level threat model of privileged accounts
- How Privilege Access Management can significantly reduce your attack surface and improve your cybersecurity posture
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24
Our security experts present how to step up your cyber hygiene best practice to prevent targeted hacking attempts from remote code execution to network exploitation.
With more than 50,000 new malware created every day organisations can no longer afford to risk the financial and reputational impacts of a security or data breach, which can be too much for a business to recover from. Because of this, IT managers face increasing scrutiny and pressure from CEOs, managing directors and boards to prove that they are keeping the organisation secure.
The changing threat landscape means organisations need to be vigilant and smarter about security. While businesses still face threats from infected devices and malware, attackers have also moved beyond that. For example, there is an increasing number of targeted email attacks with cyber criminals spending time to monitor communications so they can imitate emails that are so sophisticated that even relatively savvy users will open them.
This webinar will explore the building blocks required to ensure you have the roadmap required to best protection against cyber attacks. We will provide you with a high level view of the following topics:
· Audit and discovery – What are your weaknesses and are you compliant?
· Education – Do your employees know when not to open that attachment?
· Policy – Do you have the right policies for your industry?
· Technology – Where to start and what has changed?
The Summit will consider the role of leadership within the technology domain. Amidst a backdrop of uncertainty and disruption, the conference will discuss how you can help your organisation navigate change, overcome problems and accelerate innovation.
The programme will feature insights from an impressive array of technologists, founders, researchers and transformation specialists; contextualising the biggest challenges facing the industry and sharing practical advice, guidance and best-practice on how you can maximise your impact within your team.
Now in its seventh year, the Summit has established itself as the largest annual leadership event for Scotland’s Technology community, and an invaluable forum for knowledge exchange, discussion and high-level networking.
Core themes:
Trends: Digitalisation, agility, disruption and hybrid teams
Evolution: The changing nature of technology as a discipline
Leadership: Strategy, empowerment, communication, motivation and empathy
Culture: Creating a culture of inclusion, innovation and exploration
Impact: Technology as a driver of growth, innovation and improvement
The North of Scotland is in the midst of a full-scale transformation. Building on a well-established reputation as a global energy hub, the North is fast becoming a key destination for emerging innovation across an increasing range of sectors.
The DIGIT North Summit is designed to bring IT and Digital leaders together and drive practical innovation through shared learning. The event will facilitate cross pollination between key industries, from traditional sectors like Oil & Gas and Agriculture to high-growth fields like: Life Sciences, Biotech, Gaming, Fintech and Space.
The programme will contextualise the key emerging technologies and industry disruptors, and consider the vital role that IT and Digital leaders will play in ensuring organisations can thrive amid a backdrop of market change and economic volatility.
Organisations are changing, the rapid pace of the digital world has necessitated a fundamental shift in mindset. Digital has disintermediated markets; disrupted organisational structures, created new risks and new revenue streams and fundamentally altered the way businesses engage with their customer.
The most influential companies of our age share a common ability to understand two things effectively: people and technology. In these turbulent times, success is increasingly defined by the ability to respond to the fast-changing landscape, and exceed the expectations of the people we serve.
DT 2021 will contextualise the key technology trends and industry disruption amidst a backdrop of significant socio-economic upheaval. The event will also consider the role of IT and Digital leaders in driving positive transformation, exploring how we can help support operations, drive innovation, overcome challenges, and deliver tangible business benefits.
Core themes:
• Landscape: Uncertainty, Recovery, Sustainability, Remote Teams
• Process: Strategy, Structure, Optimisation, Agile, DevOps
• Design: Customer Centricity, UX, Functionality, Simplification
• Technology: Remote Tools, Data Analytics, AI, ML, RPA, Cloud
• People: Culture, Collaboration, Leadership, Diversity, Empowerment
The national Scot-Secure Summit is the largest annual Cyber Security event in Scotland: the event brings together senior IT leaders and Information Security personnel, providing a unique forum for knowledge exchange, discussion and high-level networking.
The conference programme is focused on promoting best-practice cyber security; looking at the current trends, the key threats - and offering practical advice on improving resilience and implementing effective security measures.
The conference will contextualise the changing regulatory landscape, considering the business impact of the GDPR and DPA (2018) and how it is changing policy and process in practice.
When GDPR came into force in May 2018 it significantly raised the bar of obligation and accountability, ensuring that all organisations who handle personal data adhere to strict regulations around privacy, security and consent. 18 months on from implementation, the conference will consider how data protection procedure has moved on, with insight from frontline practitioners reflecting on how practices within their organisation have changed.
The event will also provide an update from the regulator; exploring regulatory action policy, decision making for fines and penalties, and clarifying some of the most prominent areas of misconception and non-compliance.
Core conference topics include:
• Key legal issues and obligations
• Data security and encryption
• Privacy Impact Assessments
• Databases, data mapping and classification
• Privacy by design
• Practical strategy implementation
SCOTLAND’S MUST-ATTEND IT & DIGITAL EVENT
The expo is the largest annual enterprise technology event run in Scotland, and a must-attend for senior technologists, digital innovators and IT leaders.
SCOTLAND’S LARGEST VENDOR SHOWCASE
DIGITExpo hosts Scotland’s largest exhibition of technology and solution providers, spanning: Cyber Security, Networking, Infrastructure, Cloud, Data & Analytics, Managed IT Services, Telecoms, Connectivity and much more.
TOP SPEAKERS AND INDUSTRY INSIGHT
Keynote and seminar theatres will host leading thinkers and innovators from some of the best known companies in the world. 2018 speakers include: Google, Twitter, Mclaren, RSB, Hill & Knowlton, CYBG, IBM, EasyJet and AmTrust.
SCOTLAND’S MUST-ATTEND IT & DIGITAL EVENT
The expo is the largest annual enterprise technology event run in Scotland, and a must-attend for senior technologists, digital innovators and IT leaders.
SCOTLAND’S LARGEST VENDOR SHOWCASE
DIGITExpo hosts Scotland’s largest exhibition of technology and solution providers, spanning: Cyber Security, Networking, Infrastructure, Cloud, Data & Analytics, Managed IT Services, Telecoms, Connectivity and much more.
TOP SPEAKERS AND INDUSTRY INSIGHT
Keynote and seminar theatres will host leading thinkers and innovators from some of the best known companies in the world. 2018 speakers included: Google, Twitter, Mclaren, RSB, Hill & Knowlton, CYBG, IBM, EasyJet and AmTrust.
Emerging technology is having a profound impact on the Financial Services sector; from mobile payments, APIs and Open Platforms to Machine Learning, Robo Investment and AI Chatbots.
The Summit will explore technological innovation across the financial services sector, from developments in established institutions to the disruptive innovators within the start-up community that are reshaping the FS market.
Core conference topics:
• Landscape: Trends, Culture, Trust, Transparency, Geo-political Climate
• Regulation: GDPR, MiFID II, PSD2, Open Banking, APIs
• Customer Strategy: Engagement, UX, Data Insight, Marketing & ML
• Emerging Tech: Blockchain, Analytics, AI, Payments, Automation
• National Strategy: Skills, Funding, Collaboration, Cyber Security
• Infrastructure: IT, Digital, Cloud, Mobile, XaaS
The modern enterprise is becoming an increasingly automated environment: technological advancements in AI, Machine Learning and RPA are allowing organisations to strip out layers of inefficiency, optimise process and enhance productivity. Right across the enterprise, operations are changing in line with new automation tools, from low-level administrative tasks to self-regulating Industrial IoT systems and customer service chatbots.
This conference will contextualise the role of intelligent automation within the enterprise, looking at how the increasing sophistication of AI, RPA and IoT technologies are transforming operations. The conference is geared towards senior IT and digital leaders, providing an insightful peer-led environment and a crucial forum for knowledge exchange, engagement and high-level networking
As technology has evolved IT has transitioned from a background support function to a core driver of value creation and competitive edge. This shift has placed senior technologists at the heart of the organisation where they are increasingly critical to decision making, strategy and leadership.
The DIGIT Leader Summit will explore the evolution of the IT & Digital profession, considering the key technology and business trends and the profound impact they are having on the role. The programme will also examine the crucial components of leadership, looking at culture; team building, upskilling and communication.
The Summit is geared for senior IT & Digital leaders, and designed to provide an opportune forum for practitioners to share their experiences, learn from their peers and discuss best-practice approaches to leadership.
Core topics
Trends: Key technology trends and business trends
IT Evolution: How the IT and Digital role is changing and evolving
Leadership: Empowering, engaging, motivating and inspiring teams
Culture: Creating a culture of inclusion, innovation and exploration
Impact: Technology as a driver of innovation, improvement and problem solving
IT Management: Investment, ITAM, cost control, vendor management
The Conference
The Energy sector is changing: the challenging economic landscape has forced businesses to scrutinise their operations in pursuit of greater productivity and asset efficiency. Meanwhile, the market is growing increasingly diverse as renewables mature and new entrants emerge.
Against this backdrop, digital is becoming increasingly pervasive as companies turn to technology to modernise processes and deliver competitive advantage; from remote monitoring and automation, to data analytics, Machine Learning, asset visualisation and HPC.
Now in its 6th year, the conference has established itself as the largest annual Digital Energy summit in the country: the event brings together senior IT, Digital and business leaders, providing a unique forum for knowledge exchange, discussion and high-level networking. The programme will explore the use of Information Technology in driving tangible outcomes across the organisation, looking at key trends and providing practical insight from an array of industry leaders.
Core Themes
Landscape: maximising economic recovery and cross industry collaboration
IT & Digital as a driver of efficiency, business improvement and problem solving
Analytics, data-driven decision making and business intelligence
Asset visibility: performance, conditioning, remote monitoring
Digitising processes and innovating on top of legacy systems
Emerging technologies, AI, IoT, Robotics, Drones, Blockchain
Infrastructure: SCADA, Cloud, hybrid architecture, managed services
Cyber Security, information governance, GDPR
The national Scot-Secure Summit is the largest annual Cyber Security Conference in Scotland: the event brings together senior IT leaders and Information Security personnel, providing a unique forum for knowledge exchange, discussion and high-level networking.
The conference programme is focussed on promoting best-practice cyber security; looking at the current trends, the key threats - and offering practical advice on improving resilience and implementing effective security measures.
The national Scot-Secure Summit is the largest annual Cyber Security Conference in Scotland: the event brings together senior IT leaders and Information Security personnel, providing a unique forum for knowledge exchange, discussion and high-level networking.
The conference programme is focused on promoting best-practice cyber security; looking at the current trends, the key threats - and offering practical advice on improving resilience and implementing effective security measures.
Business is changing: digital technology has permeated every facet of the enterprise, completely transforming the way we work. Digital has disintermediated markets, disrupted organisational structures, created new risks and new revenue streams, while fundamentally altering the way businesses engage with their customer.
There is no coincidence that the most influential companies of our age share a common ability to harness technology effectively. In these exciting and turbulent times, success is increasingly defined by the ability to respond to the fast changing digital landscape, it has become a key distinguisher between growth and obscurity.
DT 2019 contextualised key digital trends and explored the underlying process of organisational change. The conference was geared towards senior technologists and digital leaders, providing an insightful peer-led environment and a crucial forum for knowledge exchange, discussion and high-level networking.
This is the largest annual Digital Transformation conference held in Scotland - with over 300 attendees in 2018. The event is supported by ScotlandIS and is free for qualifying delegates to attend.
The conference will contextualise the changing regulatory landscape, considering the business impact of the GDPR and DPA (2018) and how it is changing policy and process in practice.
When GDPR came into force in May it significantly raised the bar of obligation and accountability, ensuring that all organisations who handle personal data adhere to strict regulations around privacy, security and consent. 6 months on from implementation, the conference will consider how data protection procedure has moved on, with insight from frontline practitioners reflecting on how practices within their organisation have changed.
The event will also provide an update from the regulator; exploring regulatory action policy, decision making for fines and penalties, and clarifying some of the most prominent areas of misconception and non-compliance.
Core conference topics include:
• Key legal issues and obligations
• Data security and encryption
• Privacy Impact Assessments
• Databases, data mapping and classification
• Privacy by design
• Practical strategy implementation
Technology is completely changing the face of financial services, driving disruption, displacement and disintermediation within the sector. This has lowered the barriers to entry, opened the door to new market entrants and created fertile ground for innovation and growth.
These market disruptions have also forged new alliances between start-ups and incumbents, blurring the lines of distinction between finance and technology and creating a wave of cross-sector collaboration.
Fintech 2018 will explore technological innovation across the financial services sector, from developments in established tier-1 firms to the disruptive innovators within the start-up community that are reshaping the FS market.
Core conference topics will include:
• Landscape: Trends, Culture, Trust, Transparency, Geo-political Climate
• Regulation: GDPR, MiFID II, PSD2, Open Banking, APIs
• Customer Strategy: Engagement, UX, Data Insight, Marketing & ML
• Emerging Tech: Blockchain, Analytics, AI, Payments, Automation
• National Strategy: Skills, Funding, Collaboration, Cyber Security
• Infrastructure: IT, Digital, Cloud, Mobile, XaaS
This conference will contextualise the evolution of IT, examining the changing role of technology within the business and the inherent implications for IT personnel. The event is geared for senior IT, business and finance leaders, providing a unique forum for knowledge exchange, discussion and high-level networking.
Core topics
• IT Evolution: the changing role of IT within the business
• Leadership: strategy, culture and collaboration
• XaaS: the shift from asset to service-based consumption
• ITAM: IT Asset Management and procurement
• Managed Services: vendor management and Service Level Agreements
• Governance: information security, GDPR and data protection
• DevOps: Agile process, faster delivery, greater collaboration
Now in its 5th year, the conference has established itself as the largest annual Digital Energy summit in the country: the event brought together senior IT, Digital and business leaders, providing a unique forum for knowledge exchange, discussion and high-level networking. The programme explored the use of Information Technology in driving tangible outcomes across the organisation, looking at key trends and providing practical insight from an array of industry leaders.
Now in its 5th year, the conference has established itself as the largest annual Digital Energy summit in the country: the event brought together senior IT, Digital and business leaders, providing a unique forum for knowledge exchange, discussion and high-level networking. The programme explored the use of Information Technology in driving tangible outcomes across the organisation, looking at key trends and providing practical insight from an array of industry leaders.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
7. Agenda
Scottish , UK & Global Perspective!
The current threat landscape!
Incident Planning & Response!.
Prevention.
“cotla d’s future.
Signposting.
8. Key questions that all CEOs and CISOs should
be asking this week?
• "Are we vulnerable to SQL injection, ransomware or DDoS
ased atta ks?
• "What assurance activity have we done to confirm that
e are ot ul era le?
• "If we were compromised, would an attacker be able to
gai a ess to u e r pted se siti e data?
• "What assurance activity have we done to confirm this
position?"
• What is our o pa posture o se urit ?
15. SOC
CYBER
ATTACKS
VOLUME
CYBERCRIME
• International highly skilled cyber-criminals, often working
together
• Responsible for 262,000 UK infections and losses > £500m
• Distributed Denial of Service (DDoS) – BBC, HSBC)
• Ransomware (Police Scotland, SPA)
• Data Theft and extortion (TalkTalk, Ashley Madison)
• 2.5 million cybercrimes in the UK annually
• Economic Crime
• Extortion
• Offences against children (CSE)
27. Five key cyber crime threats
• Malware targeting businesses & individual users for fraud.
APT s, ‘AT“,
• Network intrusion ('hacking') DDoS, XSS. Spear-phishing.
• Enablers of cyber dependent crime (e.g. money laundering /
digital currencies / anonymisation).
• C er ri e 'as a ser i e
• Targeted disruption of access to UK networked systems and
services (e.g. DDOS / Ransomware)
28. Old bugs come home to roost…
SHELLSHOCK – HEARTBLEED – DRIDEX –
CRYPTOWALL - POODLE… LOCKY
38. Reporting of Cyber Incidents
• Incident evaluation and early reporting.
• Police Scotland 101 – Incident No. & Action Fraud.
• Business continuity and impact our prime consideration.
• ICT response and mitigation. Scene preservation?
• Where possible preserve original copies of emails, attachments,
device images and logs.
• Is there a mandatory obligation to report?
• Report to Cert UK / GovCert UK .
• Report to Scottish Government if appropriate.
• Identify point of contact for law enforcement to facilitate enquiries
and evidence gathering.
• Submit attack details to CISP platform if appropriate share.cisp.org.uk
(can assist with mitigation and fix)
39.
40. Cyber Essentials &
Cyber Essential Plus
Cyber Essentials concentrates on five key controls.
These are:
1. Boundary firewalls and internet gateways
2. Secure configuration
3. Access control
4. Malware protection
5. Patch management
48. Applying probabilistic mathematics and machine learning to
cyber threat discovery
Sam Alderman-Miller
Account Manager
Sam.alderman-miller@darktrace.com
49.
50.
51.
52.
53.
54. Enterprise Immune System Approach
Self-learning
Develops mathematical models of normal
behavior
Understands behaviour
For every individual user, device and the
enterprise as a whole
Adaptive
Constantly calculates probabilities based on
evolving evidence
Real-time
Detects threats as they happen
55. Conclusion
• Sophisticated Threat Detection
• Threat is inside and always will be
• Traditional approaches are insufficient
• Threats are constantly evolving
• Using Machine Learning for ‘Immune System’ Defence
• Does not need to know what ‘bad’ looks like in advance
• Learns normal and abnormal behaviours in real time
• Detects threats that bypass traditional security controls
• Provides complete visibility into your network
104. Who are ZoneFox?
• Cyber Security focussed on directly
monitoring and protecting your data
• Customers in Software Gaming, Asset
Management, Hi-Tech Manufacturing
and Online Gambling…........
107. Did I mention
that I am leaving
next week?
I e just ee
offered job with
our biggest
competitor
I reall
annoyed that I
did t get that
promotion
Your top-performing team…..
108. Sssshhhhh – Don’t tell anybody but I have
this embarrassing problem
• Vormetric Insider Threat Report –
• Only 11% of respondents felt that their
organization was not vulnerable to insider
attacks
• Globally, 89% of respondents felt that their
organization was now more at risk from an
insider attack
• 34% felt very or extremely vulnerable.
109. What and where are people stealing data
• Top theft locations
• Databases (49%)
• File Servers (39%)
• Top Data stolen
• Customer Lists
• Contracts
• Sensitive commercial data
• R&D
110. Leavers – this is hypothetical, right?
• Leavers are insiders and therefore you
have an insider threat challenge
• Mostly existing security is “Outward-
looking”
• Has it worked?
111. The Cost of a Breach
• Cost of a breach comes from two things:
- Time taken to discover it
- Cost of investigating and remediating
• Verizon Data Breach Report 2015 – “growing
‘detection deficit’ between attackers and
defenders.”
• This ‘detection deficit’ means that a typical breach
will take ~200 days to discover
• If you discovered that, how much effort would
have to be spent investigating?
112. But Breaches are a US thing…......
90%large organisations breached (up from 81%)
74%smaller organisations (up from 60%)
113. Cost of a breach
£1.46 - £3.14M
large organisation (was £600k – £1.15M)
£75 - £311ksmaller organisation (was £65k - £115k)
114. Staff related security breaches
(source PWC/BIS’ 2015 Information Security Breaches Survey)
75%large organisations
31%smaller organisations
115. But I have a load of defences….....
External Protection
Who?
When?
Why did ’t
I know at
the time?
?
? ?
My Organisation
116. Why Gardening Leave (and what is it?)
• “an employee's suspension
from work …typically to
prevent them from
…accessing confidential
information.”
• Use it to protect from
‘poaching’ of customers, etc
118. The Financial Costs of Insider Data Theft
£30,000
Research from the legal firm EMW indicated that small
businesses typically incur this cost for legal work in a insider
theft (2012 research)
?
The value of the data stolen
The number of High Court cases relating to the theft of
confidential information by insiders (employees)
increased by 250% between 2010 and 2012.
121. What did they try to steal
• 182,000 Files:
• Results of confidential product testing
• CAD designs for prototypes and new products
• Bills of Materials for new designs
• Printed Circuit board designs
• Contracts and agreements with research and
manufacturing partners.
• The value?
£10 million
122. What went wrong?
• Technical controls and HR Processes broke
down
• Lack of visibility of the endpoint
• Leaving processes (including gardening
leave) were too late
• Stolen data was collected in advance of
submitting resignation.
123. What are the alternatives?
External Protection
My Organisation
124. Incident Response for a leaver
• Global company
• Unusual behaviour – times, locations, volumes, etc
• Theft followed by taking laptop home
• Senior Legal.
• Incident response ~4 hours
How long would it
take you?
125. Key takeaways
- Compromise is highly likely
- People steal data before they
resign
- Protect your inside too - the
threat is as likely (if not more
likely) to come from inside your
organisation.
- Focus on reducing cost by
detecting threats sooner and
responding quickly
128. The New European Framework
for Data Protection
- state of play?
Per Johansson
Edinburgh, 21 April 2016
129. Who am I?
– Swedish lawyer
– Industry consultant
– European Data Protection Supervisor (EDPS)
– European Parliament - Scotland
130. The European Parliament in the
Member States
The European Parliament operates an ‘Information Office’ in
the national capitals of all 28 EU Member States.
Since 1999, it has also operated a smaller 'branch' office in
the larger Member States, opening offices in Barcelona,
Edinburgh, Marseilles, Milan, Munich & Wrocław (2011).
131. The European Parliament Office in Scotland
aims to increase awareness of the
Parliament and the impact of its activities in
Scotland, as well as highlighting the work
of the six Scottish Members of the European
Parliament (MEPs).
132. General remarks
Reasons for reform
• Technological change
• Legal certainty
• Harmonisation in the internal market
• Need for change in the area of police and judicial
cooperation
• Global dimension
→ Regulation for general principles
Directive for law enforcement
133. The EU DP reform:
Enhances harmonisation of data protection
Reinforces position and rights of data subject
Strengthens responsibility of data controller
Strengthens supervision and enforcement
General remarks
134. • The “Ordinary” legislative procedure
– Commission proposals – January 2012
– Joint legislative responsibility between European Parliament and
Council of Ministers
– “Readings”
– Negotiations between three institutions
= Changes all the way
The legislative procedure
135. Where are we now?
• Council (final) agreement October 2015
• Plenary vote EP 14 April 2016 = LAW
• Entry into force 20 days after publication in the EU
Official Journal
• Regulation – MS law 2 years after entry into force.
• Directive – 2 year period of implementation dead-line
for MS
• Directive only applicable to those measures where
the UK has opted in.
136. Scope
Territorial scope:
- An establishment of a controller or processor
within EU, regardless of where the processing
takes place
- ‘Offering of goods and services to’ or ‘monitoring
behaviour of’ data subjects in the EU
137. Data controllers/processors
Security of processing (32)
Implementation of appropriate tech and org measures
such as...
Pseudonymisation and encryption
Systems functionality, restoration and regular testing
Assessment of the security level
Risks
138. Data controllers/processors
Designation of data protection officers (37 onwards)
Where:
- Public authority or body
- Core activity = regular and systematic monitoring of data
subjects
- large scale of special categories of data
Tasks:
- Inform and advise
- Monitor the implementation
- Contact point
139. Data controllers/processors
Notification of data breaches (33)
Controller notification to the supervisory authority
within 72 hours
Processor shall notify controller
Data protection Impact assessment (35)
New tech, high risk to rights and freedoms to natural
persons
140. Data controllers/processors
Strengthen responsibilities of the controller
→ Accountability (24 onwards):
- “measures to ensure and demonstrate
compliance with the Regulation”
- Where proportionate “implementation of appropriate data
protection policies”
141. Data controllers/processors
Information and communication
- Concise, transparent, intelligible, easily accessible, clear
and plain language (12)
- Procedures and mechanisms (12)
- Content of the information (13, 14)
142. Data controllers/processors
Data protection by design and by default (25)
Documentation – Records in writing (electronic form)
(30)
Processors – Records of processing activities (30)
143. Supervision and Enforcement
– One stop shop – ‘main establishment’ (4(16), 56)
– Consistency mechanism (63 onwards)
• Cooperation between authorities and COM
– European Data Protection Board (68)
– Sanctions (83)
• Up to € 20M or 4% of annual worldwide turnover
144. Data subjects
Definition of consent (7)
- Controller burden of proof - demonstrate
- Distinguishable – in plain language
- Withdrawal
145. Data subjects
“Right to be forgotten” (17)
– Erasure without undue delay
– Reasonable steps to inform other controllers
» Available tech and cost of implementation
146. Data subjects
Profiling (22)
Only if:
- Performance of a contract + safeguards
- Union or Member State law
- Explicit Consent of the data subject +
safeguards
And : not based solely on special categories of
data
147. Thank you for your attention
epedinburgh@ep.europa.eu
EDPS website on DP reform:
http://www.edps.europa.eu/EDPSWEB/edps/cache/off/
Consultation/Reform_package
160. Scott Barnett
Cyber & Fraud
Intelligence Lead
how threat intelligence can
prevent data breaches and
other cyber attacks – and how
you can get and apply some of
this stuff
Cyber Crystal Balls
162. 164
a tool for decision
making
information
+ analysis
+ inferences
=
Planning –
Intelligence
Requirements
Collection – of
information
and monitoring
for triggers
Analysis –
turning
information
into
intelligence
Dissemination
– delivering to
the right
people at the
right time
Feedback – re-
evaluating
requirements,
taking stock
what is intelligence?
Our mission: to provide forewarning of security threats to RBS
to minimise harm to our customers, staff, and business
163. Exposure
VulnerabilityCapability
Intent
what is a threat?
har ful age ts’
intentions
+
tools, tactics and
procedures (TTPs)
INHERENT THREAT
how exposed your
business is to these
actions
+
any vulnerability
that makes harmful
outcomes more
likely
RESIDUAL THREAT
har ful outco es resulti g fro a e tity’s actio s i pursuit of its goals
Source: CBEST framework
165
164. • Provide a forecast
of the a k s
strategic threat
landscape
Forecast
• Join the dots
between strategic
and operational
threats
Link
• Co te tualise ig
ti ket e e ts i
terms of what they
mean for RBS – so
hat?
Context
• Identify new and
emerging threats
and attack
techniques
Identify
• Collect external
information and
fuse it with
internal sources
Collect
• Proportionate,
timely, actionable
intelligence
Deliver
what can threat intelligence do
for you?
166
197. $ WHOAMI
MIKEY & KYLE
▸ 2nd BSc Ethical Hacking @ Abertay University, Dundee
▸ Work for Scottish Business Resilience Centre (SBRC)
▸ OSINT, Footprinting, Outreach
▸ Mikey: Cryptography, Defence, Counter-terrorism
▸ Kyle: OSINT, Footprinting, Counter-terrorism
198. THE ORDER, UNLESS WE GET SIDETRACKED
WHAT’S ALL THIS THEN?
1. Staying Updated
2. Data Protection, Encryption & Backups
3. Passwords
4. Phishing Emails & Malicious Websites
5. Social Media
199. SECURITY IS A PROCESS, NOT
A PRODUCT.
Bruce Schneier, April 2000
THREAT MODEL 101
203. DON’T BE AN EASY TARGET
UPDATES MATTER
▸ Will protect you against a lot of threats
▸ low effort > high reward
▸ Windows 10, 8.1, 8, 7 get security updates
▸ Windows XP doesn’t get any updates
▸ OS X 10.11 (El Capitan), 10.10 (Yosemite), 10.9
(Mavericks) get security updates
208. BACKUP THE BACKUPS
BACKUPS WILL SAVE YOUR BUSINESS
▸ Will save you time & money
▸ Onsite & Offsite backup
▸ Daily, Weekly, Monthly
▸ Easy to restore in event of a disaster
224. MASK ATTACK
JULIA1984
‣ (26 + 26 +10) = 629
= 1315 = 13 Quadrillion @ 100M/s
‣ The above password matches a simple but common
pattern. A name and year appended to it.
‣ We can also configure the attack to try the upper-case
letters only on the first position.
http://hashcat.net/wiki/doku.php?id=mask_attack
225. MASK ATTACK
JULIA1984
‣ (26 + 26 +10) = 629
= 1315 = 13 Quadrillion @ 100M/s
‣ The above password matches a simple but common
pattern. A name and year appended to it.
‣ We can also configure the attack to try the upper-case
letters only on the first position.
‣ Down to 370 Billion combinations @ 100M/s
http://hashcat.net/wiki/doku.php?id=mask_attack
227. REDUCE THE NUMBER OF PASSWORDS YOU NEED TO KNOW
PASSWORD MANAGERS
▸ Last Pass (all platforms) (cloud based)
▸ 1Password (all platforms, best on Apple) (Dropbox sync)
▸ Demo!
228. REDUCE THE NUMBER OF PASSWORDS YOU NEED TO KNOW
PASSWORD MANAGERS
▸ Last Pass (all platforms) (cloud based)
▸ 1Password (all platforms, best on Apple) (Dropbox sync)
▸ Demo!
▸ Auto fill, in the browser Chrome, Firefox, Safari
▸ Generate unique long passwords for each site
229. IF YOU DO ANYTHING, PLEASE DO THIS!
TWO FACTOR AUTHENTICATION (2FA)
▸ twofactorauth.org
▸ Google Authenticator
▸ Authy
▸ YubiKeys
234. SCOT-SECURE
REAL OR FAKE
▸ Padlock
▸ URL
▸ How did you get there?
▸ Apply common sense
▸ Browser extensions
▸ HTTPS Everywhere
▸ uBlock Origin
Safari
Chrome
Chrome
Firefox
239. PASS THESE ON
THINK ABOUT THESE THINGS, PLEASE?
▸ Update, backup and encrypt your devices
▸ Encrypt the most critical sensitive information
▸ If you can encrypt it all, Full Disk Encryption
▸ Long passwords, don't worry about complexity
▸ Get a password manager (LastPass & 1Password)
▸ Use Google Chrome, if you can
▸ Think about how you got to the site, did you expect the email?
240. LAST CHANCE
THE LINKS
▸ Chrome security usability: youtu.be/XfFjde0UPbY
▸ Very strong passwords: theintercept.com/2015/03/26/
passphrases-can-memorize-attackers-cant-guess/
▸ Which sites use Two Factor Auth: twofactorauth.org