SlideShare a Scribd company logo
1 of 22
Today’s Menu
 Few words on background
And of course… a disclaimer!
 Moving from IT Security to Cybersecurity
Is it just a “wording” change?
 The Cybersecurity Kill Chain
What’s this?
 So… Threat or Myth?
Obvious answer?
 If threats there are…what are the scariest ones?
Trends / Tendencies?!?!... Not really!
 To counter-attack you have to think like…
You already know the answer! Or maybe…
Background 
And Disclaimer!
I express my own opinion as a Cybersecurity expert!
&
My legal department did not review my slides!
&
Yes, I know “a bit” about Cybersecurity!
but
I learn everyday so please… give me inputs!
From IT Security to…
Cybersecurity
What was IT Security
Cybersecurity = Paradigm shift
Cybersecurity Kill Chain
Definition
Hackers’ way!
Exploitation
“Hacking”
Post exploitation &
maintaining access
Reconnaissance Scanning
Covering
tracks
Cyber kill chain
Exploitation
“Hacking”
Post exploitation &
maintaining access
Reconnaissance Scanning
Covering
tracks
Cyber kill chain
Evaluate TreatIdentify Analyze
Monitor and
communicate
IT & Information Risks chain
The Kill Chain - 101
So… Threat or Myth?
I know, it’s an obvious one!
“About 110 million Americans
— equivalent to about 50% of
U.S. adults — have had their
personal data exposed in
some form in the past year”
Tim Pawlenty, president of the Financial Services Roundtable
and the former governor of Minnesota.
The Truth is out there!
But it’s bigger than you think…
APT  Silent but…
EVIL
Future targets or just Hackers’ dreams?
Counter-attack?!?!
Develop new approaches!
Fear as a tool
is going blunt rapidly
Think once, act many
Create practices inherently more secure
Have your people win the game
Education,
gamification,
out-of-the-box creativity
The Cybersecurity Kill Chan - myth or threat
The Cybersecurity Kill Chan - myth or threat

More Related Content

Viewers also liked

CONFERENCE PROGRAMME 2012
CONFERENCE PROGRAMME 2012CONFERENCE PROGRAMME 2012
CONFERENCE PROGRAMME 2012Dr Andrew Clegg
 
Environment campaign framework
Environment campaign frameworkEnvironment campaign framework
Environment campaign frameworkEn Ramel
 
stephaniejahnsenweek5ipmkt680
stephaniejahnsenweek5ipmkt680stephaniejahnsenweek5ipmkt680
stephaniejahnsenweek5ipmkt680Stephanie Jahnsen
 

Viewers also liked (6)

Diah Eka Ratna
Diah Eka RatnaDiah Eka Ratna
Diah Eka Ratna
 
CONFERENCE PROGRAMME 2012
CONFERENCE PROGRAMME 2012CONFERENCE PROGRAMME 2012
CONFERENCE PROGRAMME 2012
 
Environment campaign framework
Environment campaign frameworkEnvironment campaign framework
Environment campaign framework
 
Куприянов Иван Михайлович
Куприянов Иван МихайловичКуприянов Иван Михайлович
Куприянов Иван Михайлович
 
SRIDEVI MALINDA
SRIDEVI MALINDASRIDEVI MALINDA
SRIDEVI MALINDA
 
stephaniejahnsenweek5ipmkt680
stephaniejahnsenweek5ipmkt680stephaniejahnsenweek5ipmkt680
stephaniejahnsenweek5ipmkt680
 

Similar to The Cybersecurity Kill Chan - myth or threat

How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer SaraPia5
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillFrode Hommedal
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaEdureka!
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of InformationAna Meskovska
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
Red Teaming and the Supply Chain
Red Teaming and the Supply ChainRed Teaming and the Supply Chain
Red Teaming and the Supply ChainOllie Whitehouse
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Harry Gunns
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008Anton Chuvakin
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackMSR Buzz
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemSecurityStudio
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoTMONICA-Project
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 

Similar to The Cybersecurity Kill Chan - myth or threat (20)

How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer How to be a Security Wingman by Dominique Singer
How to be a Security Wingman by Dominique Singer
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information1 The Notion Information And Basic Types Of Information
1 The Notion Information And Basic Types Of Information
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Security for Thinkers
Security for ThinkersSecurity for Thinkers
Security for Thinkers
 
Red Teaming and the Supply Chain
Red Teaming and the Supply ChainRed Teaming and the Supply Chain
Red Teaming and the Supply Chain
 
Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...Not becoming the next cybersecurity headline is difficult, very difficult - S...
Not becoming the next cybersecurity headline is difficult, very difficult - S...
 
1st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 20081st Russian CSO Summit Trends 2008
1st Russian CSO Summit Trends 2008
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Computer Security.ppt
Computer Security.pptComputer Security.ppt
Computer Security.ppt
 
Unveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity HackUnveiling the Enigma Can Cybersecurity Hack
Unveiling the Enigma Can Cybersecurity Hack
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 

More from SogetiLabs

Paul Mason - Post Capitalism
Paul Mason - Post CapitalismPaul Mason - Post Capitalism
Paul Mason - Post CapitalismSogetiLabs
 
Mike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetMike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetSogetiLabs
 
Menno van Doorn - Computer Says No
Menno van Doorn - Computer Says NoMenno van Doorn - Computer Says No
Menno van Doorn - Computer Says NoSogetiLabs
 
Marcel Krom - When Are You @Home
Marcel Krom - When Are You @HomeMarcel Krom - When Are You @Home
Marcel Krom - When Are You @HomeSogetiLabs
 
Luciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from MachinesLuciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from MachinesSogetiLabs
 
John Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is EverywhereJohn Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is EverywhereSogetiLabs
 
James McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous MachinesJames McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous MachinesSogetiLabs
 
Gregory Ericson - Machine Intelligence
Gregory Ericson - Machine IntelligenceGregory Ericson - Machine Intelligence
Gregory Ericson - Machine IntelligenceSogetiLabs
 
Goran Sandahl - Machine Learning. Literally.
Goran Sandahl - Machine Learning. Literally.Goran Sandahl - Machine Learning. Literally.
Goran Sandahl - Machine Learning. Literally.SogetiLabs
 
Steve Mills - Your Cognitive Future
Steve Mills - Your Cognitive FutureSteve Mills - Your Cognitive Future
Steve Mills - Your Cognitive FutureSogetiLabs
 
Data Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentationData Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentationSogetiLabs
 
Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)SogetiLabs
 
Cyber security the cybersecurity kill chan - myth or threat
Cyber security   the cybersecurity kill chan - myth or threatCyber security   the cybersecurity kill chan - myth or threat
Cyber security the cybersecurity kill chan - myth or threatSogetiLabs
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategiesSogetiLabs
 
SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things SogetiLabs
 
Sogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT TestingSogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT TestingSogetiLabs
 

More from SogetiLabs (16)

Paul Mason - Post Capitalism
Paul Mason - Post CapitalismPaul Mason - Post Capitalism
Paul Mason - Post Capitalism
 
Mike Hearn - Beyond Tradenet
Mike Hearn - Beyond TradenetMike Hearn - Beyond Tradenet
Mike Hearn - Beyond Tradenet
 
Menno van Doorn - Computer Says No
Menno van Doorn - Computer Says NoMenno van Doorn - Computer Says No
Menno van Doorn - Computer Says No
 
Marcel Krom - When Are You @Home
Marcel Krom - When Are You @HomeMarcel Krom - When Are You @Home
Marcel Krom - When Are You @Home
 
Luciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from MachinesLuciano Floridi - Intelligence from Machines
Luciano Floridi - Intelligence from Machines
 
John Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is EverywhereJohn Bronskill - Machine Learning Is Everywhere
John Bronskill - Machine Learning Is Everywhere
 
James McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous MachinesJames McQuivey - The Inevitability of Autonomous Machines
James McQuivey - The Inevitability of Autonomous Machines
 
Gregory Ericson - Machine Intelligence
Gregory Ericson - Machine IntelligenceGregory Ericson - Machine Intelligence
Gregory Ericson - Machine Intelligence
 
Goran Sandahl - Machine Learning. Literally.
Goran Sandahl - Machine Learning. Literally.Goran Sandahl - Machine Learning. Literally.
Goran Sandahl - Machine Learning. Literally.
 
Steve Mills - Your Cognitive Future
Steve Mills - Your Cognitive FutureSteve Mills - Your Cognitive Future
Steve Mills - Your Cognitive Future
 
Data Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentationData Driven Decisions for Healthcare presentation
Data Driven Decisions for Healthcare presentation
 
Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)Talk different roe-20150615-v2-0 (3)
Talk different roe-20150615-v2-0 (3)
 
Cyber security the cybersecurity kill chan - myth or threat
Cyber security   the cybersecurity kill chan - myth or threatCyber security   the cybersecurity kill chan - myth or threat
Cyber security the cybersecurity kill chan - myth or threat
 
Cloud migration strategies
Cloud migration strategiesCloud migration strategies
Cloud migration strategies
 
SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things SogetiLabs Webinar: The Experience of Things
SogetiLabs Webinar: The Experience of Things
 
Sogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT TestingSogetilabs webinar: Uniting Robotics and IT Testing
Sogetilabs webinar: Uniting Robotics and IT Testing
 

The Cybersecurity Kill Chan - myth or threat

Editor's Notes

  1. Hackers inside… hackers outside… what should we do… Teaching Cybersecurity is also a fundamental issue… Did it work  Results in 2016...
  2. Geekland, Challenges, Whitehats V.S. Blackhats. Security world was quite “simple”…challenging the traditional IT world with STANDARD tools and CONVENTIONAL weapons.
  3. No more challenges  Business first! Hackers moved from the Whitehats V.S. Blackhats fights to a “next-generation” cybermob style. Money is driving but we are currently seeing a drastic change into the threat landscape: Ransomeware and Cryptolockers Zero-Day black-market Contract-based attacks State-sponsored attacks IoT Security Etc. From a pure evolution perspective, Security is just going through its own digital transformation You have to classify your incidents… You have to align with risks
  4. And so many others… waiting for so many more…
  5. Real threats = targeted attacks and state-sponsored attack. Cloud for sure! Already happened. Car hacking is already there. Nuclear plant??? Challenges are Silent attacks… APTs…
  6. Path is easy to describe but the roads to take are a mess. Attacks are complex…leave to complexity to hackers… Focus on pragmatism and simplification. Keep it simple Keep IT simple Keep IT simple and stupid Keep IT simple and secure