SlideShare a Scribd company logo
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•AIPSI, ASSOCIAZIONE ITALIANA PROFESSIONISTI SICUREZZA
INFORMATICA, CAPITOLO ITALIANO DI ISSA, INFORMATION SYSTEMS
SECURITY ASSOCIATION, (WWW.ISSA.ORG) CHE CONTA >>10.000 SOCI,
LA PIÙ GRANDE ASSOCIAZIONE NON-PROFIT DI PROFESSIONISTI DELLA
SICUREZZA ICT NEL MONDO
•AIPSI È IL PUNTO DI AGGREGAZIONE SUL TERRITORIO E DI
TRASFERIMENTO DI KNOW-HOW PER I PROFESSIONISTI DELLA SICUREZZA
DIGITALE, SIA DIPENDENTI SIA LIBERI PROFESSIONISTI ED IMPRENDITORI
DEL SETTORE
•SEDE CENTRALE: MILANO
•SEDI TERRITORIALI : ANCONA-MACERATA, LECCE, TORINO, VERONA-
VENEZIA
•CONTATTI: AIPSI@AIPSI.ORG, SEGRETERIA@AIPSI.ORG
Siamo presenti
per tutti i 3 giorni
di SMAU nella
Area
Community ICT
VIENI A
TROVARCI !
2
• AIUTARE I PROPRI SOCI NELLA CRESCITA PROFESSIONALE E QUINDI NELLA CRESCITA
DEL LORO BUSINESS
• OFFRIRE AI PROPRI SOCI SERVIZI QUALIFICATI PER TALE CRESCITA, CHE INCLUDONO
• CONVEGNI, WORKSHOP, WEBINAR SIA A LIVELLO NAZIONALE CHE
INTERNAZIONALE VIA ISSA
• RAPPORTI ANNUALI E SPECIFICI OAD, OSSERVATORIO ATTACCHI
DIGITALI IN ITALIA NEL NUOVO SITO HTTPS://WWW.OADWEB.IT
• SUPPORTO NELL’INTERO CICLO DI VITA PROFESSIONALE
• FORMAZIONE SPECIALIZZATA E SUPPORTO ALLE CERTIFICAZIONI, IN
PARTICOLARE ECF PLUS (EN 16234-1:2016, IN ITALIA UNI 11506)
• RAPPORTI CON ALTRI SOCI A LIVELLO NAZIONALE (AIPSI) ED INTERNAZIONALI
(ISSA)
• CONTRIBUIRE ALLA DIFFUSIONE DELLA CULTURA E ALLA SENSIBILIZZAZIONE PER LA
SICUREZZA DIGITALE
• COLLABORAZIONE CON VARIE ASSOCIAZIONI ED ENTI PER EVENTI ED INIZIATIVE
CONGIUNTE
Creazione del
Gruppo di lavoro
CSWI,
Cyber Security
Women’s Italy,
aperto anche alle
Signore non Socie
AIPSI
3
A breve disponibile il
nuovo
Rapporto 2018 OAD
UTM SECURITY APPLIANCES
Unified Threat Management
Next Generation Firewall (NGFW)
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
NGFW / UTM
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
authentication systems or methods are based on one or more of these five factors:
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
Another method that is becoming popular is out-of-band authentication.
This is a process whereby the system you are authenticating gets information from public
records and asks you questions to help authenticate you.
For example, the system might retrieve your credit report and then query
you about specific entries in it.
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
YOU START REDUCING SECURITY
SETTINGS TO INCREASE INTEROPERABILITY
WITH OTHER OPERATING SYSTEMS OR
APPLICATIONS, YOU INTRODUCE
WEAKNESSES THAT MAY BE EXPLOITED
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
THREATCROWD.ORG
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
https://pipl.com/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://OPENPHISH.COM
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://OPENPHISH.COM
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://OSINTFRAMEWORK.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SHODAN.IO
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://WPVULNDB.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://HAVEIBEENPWNED.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://PASTEBIN.COM/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/
GOOGLE DORK
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
User Issues
• This issue is best addressed by training and education. An untrained user cannot possibly adhere to
good security practices because he or she is not aware of them. Security training is just as important as
any technology that you can purchase or policy that you can implement.
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
ZERO-DAY EXPLOITS
•
Secure Protocols
• HTTP – HTTPS
• SMTP – SMTPS
• POP3 – POP3S
• SMTP – SMTPS
• IMAP - IMAPS
• FTP – SFTP
• SSH
• DNS – DNSSEC
• LDAP – LDAPS
• RTP - sRTP
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
•
•
SECURITY BY DESIGN
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
•
•
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
• A SOCIAL ENGINEERING ATTACK MAY COME FROM SOMEONE POSING AS A VENDOR, OR IT COULD
TAKE THE FORM OF AN EMAIL FROM A (SUPPOSEDLY) TRAVELING EXECUTIVE WHO INDICATES THAT
THEY HAVE FORGOTTEN HOW TO LOG ON TO THE NETWORK OR HOW TO GET INTO THE BUILDING
OVER THE WEEKEND.
OCCASIONALLY, SOCIAL ENGINEERING IS ALSO REFERRED TO AS WETWARE. THIS TERM
IS USED BECAUSE IT IS A FORM OF HACKING THAT DOES NOT REQUIRE SOFTWARE OR
HARDWARE BUT RATHER THE GRAY MATTER OF THE BRAIN
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SOCIAL ENGINEERING
•
•
•
•
•
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
GREED
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
•
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
•
•
•
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG

More Related Content

What's hot

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
Paul van Heel
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Francis Amaning
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
Charles Mok
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
Yuri Anisimov
 
e-Trust and cyber security
e-Trust and cyber security e-Trust and cyber security
e-Trust and cyber security
OneWebDay, Inc.
 
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in BrightonBuilding an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Bill Harpley
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
Giulio Coraggio
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
U.S. Chamber of Commerce
 
ITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT business
claudiajelea
 
CISA's Privacy Facts
CISA's Privacy FactsCISA's Privacy Facts
CISA's Privacy Facts
U.S. Chamber of Commerce
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Arazim Sheu
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
Marc Gallardo
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
NICVA
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francissegughana
 
All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018
The Drum
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
Parliamentary Yearbook
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
Paul van Heel
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
Exponential_e
 

What's hot (20)

I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCACurbing Cyber Menace  BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
Curbing Cyber Menace BY: Kenneth Adu Amanfoh Deputy Director IT,NCA
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity Singapore. industry 4.0 and cybersecurity
Singapore. industry 4.0 and cybersecurity
 
e-Trust and cyber security
e-Trust and cyber security e-Trust and cyber security
e-Trust and cyber security
 
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in BrightonBuilding an 'Internet of Things' ( IoT ) technology cluster in Brighton
Building an 'Internet of Things' ( IoT ) technology cluster in Brighton
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
 
ITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT business
 
CISA's Privacy Facts
CISA's Privacy FactsCISA's Privacy Facts
CISA's Privacy Facts
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francisCTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
 
All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018All You Need To Know About Data Law Changes in 2018
All You Need To Know About Data Law Changes in 2018
 
Cyber Security For Businesses
Cyber Security For BusinessesCyber Security For Businesses
Cyber Security For Businesses
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 

Similar to Social Engineering and other Foes in the GDPR Year

Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Cori Faklaris
 
Digital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude UmehDigital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude Umeh
Jude Umeh
 
What is next for Technology and Innovation?
What is next for Technology and Innovation?What is next for Technology and Innovation?
What is next for Technology and Innovation?
paul young cpa, cga
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
paul young cpa, cga
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
Data Driven Innovation
 
Data protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPRData protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPR
Maria Stefanouli
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp
 
IR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We MowIR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We Mow
Dr. Mazlan Abbas
 
Blockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationBlockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovation
samossummit
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
PCM
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018
VARINDIA
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
Capgemini
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
Nixu Corporation
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
James Quinlan
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
Kristian Alisasis Pura
 
Infusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensInfusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA Athens
FITMAN FI
 
Introduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text ClassificationIntroduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text Classification
Moch Ari Nasichuddin
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Gosia Fraser
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
 

Similar to Social Engineering and other Foes in the GDPR Year (20)

Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
Digital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude UmehDigital economy and law keynote by Jude Umeh
Digital economy and law keynote by Jude Umeh
 
What is next for Technology and Innovation?
What is next for Technology and Innovation?What is next for Technology and Innovation?
What is next for Technology and Innovation?
 
Global Threats| Cybersecurity|
Global Threats| Cybersecurity| Global Threats| Cybersecurity|
Global Threats| Cybersecurity|
 
Data Analytics for Security Intelligence
Data Analytics for Security IntelligenceData Analytics for Security Intelligence
Data Analytics for Security Intelligence
 
Data protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPRData protection in smart cities application of the EU GDPR
Data protection in smart cities application of the EU GDPR
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
IR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We MowIR 4.0 Transitional Stage - Where Are We Mow
IR 4.0 Transitional Stage - Where Are We Mow
 
Blockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovationBlockchain Technology and its role in the process of public sector innovation
Blockchain Technology and its role in the process of public sector innovation
 
PCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary MigliccoPCM Vision 2019 Keynote: Gary Miglicco
PCM Vision 2019 Keynote: Gary Miglicco
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Infusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA AthensInfusing social innovation in FI for Manufacturing-FIA Athens
Infusing social innovation in FI for Manufacturing-FIA Athens
 
Introduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text ClassificationIntroduction to Machine Learning: How to Create Text Classification
Introduction to Machine Learning: How to Create Text Classification
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 

More from Massimo Chirivì

Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019
Massimo Chirivì
 
DHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioniDHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioni
Massimo Chirivì
 
Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...
Massimo Chirivì
 
Carte di credito contactless: quali i rischi per la privacy e per il portaf...
Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...
Carte di credito contactless: quali i rischi per la privacy e per il portaf...
Massimo Chirivì
 
Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010
Massimo Chirivì
 
Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.
Massimo Chirivì
 
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
Massimo Chirivì
 
SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014
Massimo Chirivì
 
ICT SECURITY E PMI - SMAU Milano 2013
ICT SECURITY E PMI -  SMAU Milano 2013ICT SECURITY E PMI -  SMAU Milano 2013
ICT SECURITY E PMI - SMAU Milano 2013
Massimo Chirivì
 
La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013
Massimo Chirivì
 
Il Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuroIl Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuro
Massimo Chirivì
 
SMAU Milano 2011 - AIPSI
SMAU Milano 2011 - AIPSISMAU Milano 2011 - AIPSI
SMAU Milano 2011 - AIPSI
Massimo Chirivì
 
Adolescenti salentini e social network
Adolescenti salentini e social networkAdolescenti salentini e social network
Adolescenti salentini e social network
Massimo Chirivì
 
SMAU 2011 Bari
SMAU 2011 BariSMAU 2011 Bari
SMAU 2011 Bari
Massimo Chirivì
 

More from Massimo Chirivì (14)

Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019Il sequestro dei dati - Cybercrime e ransomware nel 2019
Il sequestro dei dati - Cybercrime e ransomware nel 2019
 
DHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioniDHCP Server Attack - Metodologie di attacco e soluzioni
DHCP Server Attack - Metodologie di attacco e soluzioni
 
Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...Ransomware Attack nel 2019 Dal file system ai database e non solo...
Ransomware Attack nel 2019 Dal file system ai database e non solo...
 
Carte di credito contactless: quali i rischi per la privacy e per il portaf...
Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...Carte di credito contactless:  quali i rischi per la privacy e  per il portaf...
Carte di credito contactless: quali i rischi per la privacy e per il portaf...
 
Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010Sicurezza Informatica 24 Settembre 2010
Sicurezza Informatica 24 Settembre 2010
 
Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.Cyber Security. Occorre maggiore attenzione.
Cyber Security. Occorre maggiore attenzione.
 
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
 
SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014SVILUPPO WEB E SICUREZZA NEL 2014
SVILUPPO WEB E SICUREZZA NEL 2014
 
ICT SECURITY E PMI - SMAU Milano 2013
ICT SECURITY E PMI -  SMAU Milano 2013ICT SECURITY E PMI -  SMAU Milano 2013
ICT SECURITY E PMI - SMAU Milano 2013
 
La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013La sicurezza delle Web Application - SMAU Business Bari 2013
La sicurezza delle Web Application - SMAU Business Bari 2013
 
Il Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuroIl Cloud computing nel 2012 - il know aziendale è al sicuro
Il Cloud computing nel 2012 - il know aziendale è al sicuro
 
SMAU Milano 2011 - AIPSI
SMAU Milano 2011 - AIPSISMAU Milano 2011 - AIPSI
SMAU Milano 2011 - AIPSI
 
Adolescenti salentini e social network
Adolescenti salentini e social networkAdolescenti salentini e social network
Adolescenti salentini e social network
 
SMAU 2011 Bari
SMAU 2011 BariSMAU 2011 Bari
SMAU 2011 Bari
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Social Engineering and other Foes in the GDPR Year

  • 1. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 2. •AIPSI, ASSOCIAZIONE ITALIANA PROFESSIONISTI SICUREZZA INFORMATICA, CAPITOLO ITALIANO DI ISSA, INFORMATION SYSTEMS SECURITY ASSOCIATION, (WWW.ISSA.ORG) CHE CONTA >>10.000 SOCI, LA PIÙ GRANDE ASSOCIAZIONE NON-PROFIT DI PROFESSIONISTI DELLA SICUREZZA ICT NEL MONDO •AIPSI È IL PUNTO DI AGGREGAZIONE SUL TERRITORIO E DI TRASFERIMENTO DI KNOW-HOW PER I PROFESSIONISTI DELLA SICUREZZA DIGITALE, SIA DIPENDENTI SIA LIBERI PROFESSIONISTI ED IMPRENDITORI DEL SETTORE •SEDE CENTRALE: MILANO •SEDI TERRITORIALI : ANCONA-MACERATA, LECCE, TORINO, VERONA- VENEZIA •CONTATTI: AIPSI@AIPSI.ORG, SEGRETERIA@AIPSI.ORG Siamo presenti per tutti i 3 giorni di SMAU nella Area Community ICT VIENI A TROVARCI ! 2
  • 3. • AIUTARE I PROPRI SOCI NELLA CRESCITA PROFESSIONALE E QUINDI NELLA CRESCITA DEL LORO BUSINESS • OFFRIRE AI PROPRI SOCI SERVIZI QUALIFICATI PER TALE CRESCITA, CHE INCLUDONO • CONVEGNI, WORKSHOP, WEBINAR SIA A LIVELLO NAZIONALE CHE INTERNAZIONALE VIA ISSA • RAPPORTI ANNUALI E SPECIFICI OAD, OSSERVATORIO ATTACCHI DIGITALI IN ITALIA NEL NUOVO SITO HTTPS://WWW.OADWEB.IT • SUPPORTO NELL’INTERO CICLO DI VITA PROFESSIONALE • FORMAZIONE SPECIALIZZATA E SUPPORTO ALLE CERTIFICAZIONI, IN PARTICOLARE ECF PLUS (EN 16234-1:2016, IN ITALIA UNI 11506) • RAPPORTI CON ALTRI SOCI A LIVELLO NAZIONALE (AIPSI) ED INTERNAZIONALI (ISSA) • CONTRIBUIRE ALLA DIFFUSIONE DELLA CULTURA E ALLA SENSIBILIZZAZIONE PER LA SICUREZZA DIGITALE • COLLABORAZIONE CON VARIE ASSOCIAZIONI ED ENTI PER EVENTI ED INIZIATIVE CONGIUNTE Creazione del Gruppo di lavoro CSWI, Cyber Security Women’s Italy, aperto anche alle Signore non Socie AIPSI 3 A breve disponibile il nuovo Rapporto 2018 OAD
  • 4. UTM SECURITY APPLIANCES Unified Threat Management Next Generation Firewall (NGFW) SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 5. NGFW / UTM • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 6. authentication systems or methods are based on one or more of these five factors: • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 7. Another method that is becoming popular is out-of-band authentication. This is a process whereby the system you are authenticating gets information from public records and asks you questions to help authenticate you. For example, the system might retrieve your credit report and then query you about specific entries in it. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 8. YOU START REDUCING SECURITY SETTINGS TO INCREASE INTEROPERABILITY WITH OTHER OPERATING SYSTEMS OR APPLICATIONS, YOU INTRODUCE WEAKNESSES THAT MAY BE EXPLOITED SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 9. THREATCROWD.ORG SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 10. https://pipl.com/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 11. HTTPS://OPENPHISH.COM SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 12. HTTPS://OPENPHISH.COM SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 13. HTTPS://OSINTFRAMEWORK.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 14. SHODAN.IO SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 15. HTTPS://WPVULNDB.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 16. HTTPS://HAVEIBEENPWNED.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 17. HTTPS://PASTEBIN.COM/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 18. HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/ SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 19. HTTPS://WWW.EXPLOIT-DB.COM/GOOGLE-HACKING-DATABASE/ GOOGLE DORK SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 20. • • User Issues • This issue is best addressed by training and education. An untrained user cannot possibly adhere to good security practices because he or she is not aware of them. Security training is just as important as any technology that you can purchase or policy that you can implement. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 21. ZERO-DAY EXPLOITS • Secure Protocols • HTTP – HTTPS • SMTP – SMTPS • POP3 – POP3S • SMTP – SMTPS • IMAP - IMAPS • FTP – SFTP • SSH • DNS – DNSSEC • LDAP – LDAPS • RTP - sRTP SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 22. • • • • • SECURITY BY DESIGN SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 23. • • • • • • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 24. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 25. • • A SOCIAL ENGINEERING ATTACK MAY COME FROM SOMEONE POSING AS A VENDOR, OR IT COULD TAKE THE FORM OF AN EMAIL FROM A (SUPPOSEDLY) TRAVELING EXECUTIVE WHO INDICATES THAT THEY HAVE FORGOTTEN HOW TO LOG ON TO THE NETWORK OR HOW TO GET INTO THE BUILDING OVER THE WEEKEND. OCCASIONALLY, SOCIAL ENGINEERING IS ALSO REFERRED TO AS WETWARE. THIS TERM IS USED BECAUSE IT IS A FORM OF HACKING THAT DOES NOT REQUIRE SOFTWARE OR HARDWARE BUT RATHER THE GRAY MATTER OF THE BRAIN SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 26. • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 27. SOCIAL ENGINEERING • • • • • • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 28. GREED SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 29. • • • • • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 30. • • • SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG
  • 31. SMAU MILANO – 23/10/2018 - Social Engineering and other Foes in the GDPR Year – Massimo Chirivì – www.massimochirivi.net – AIPSI – WWW.AIPSI.ORG