SlideShare a Scribd company logo
The ever-
increasing threat
of Cyber Crime
Prepared By: Nathan Desfontaines
27 March 2014
Information Protection &
Business Resilience
1© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
Agenda
Who am I... And How did we get here?
■ Me, in a CMD-shell
■ Evolution of computers
Video Time
■ Microsoft Europe – Cyber Security
World’s biggest data breaches
■ World’s Biggest Data Breaches (Graphic)
What should you care about?
■ Cyber Security Threats for 2013/2014
■ Cyber Security Threats: New Platforms
■ Cyber Security Threats: Exploit Kits
■ Cyber Security Threats: Targeted Attacks
Video Time
■ 10 Infamous Computer Hackers
Questions?
Who am I… And how
did we get here?
3© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
Who am I… And how did we get here? (cont.)
Do you remember “back in the day”?
4© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
Who am I… And how did we get here? (cont.)
Apple II
Sinclair ZX-81 Timex Sinclair 1000Sinclair ZX Spectrum
Kaypro 4-84 Tandy 1000EX
KIM-1
Tandy 102
Digi-Comp
Magitronic 286
Atari 800XL
Z-180
Commodore PET
Microsoft Europe –
Cyber Security
6© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
Microsoft Europe – Cyber Security
Source: YouTube.com
World's Biggest Data
Breaches
8© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
World's Biggest Data Breaches
Source: informationisbeautiful.net
What should you care
about?
10© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about?
1. Widespread use of new platforms
Cyber Security Threats for 2013/2014
Three significant reasons as to why cyber security will
remain a key concern for IT managers:
3. Attacks are becoming more sophisticated and have
specific targets
2. Increasingly available and simple to use exploit kits
11© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Mobile Devices
Cyber Security Threats: New Platforms
• Rapid increase in the use of mobile devices
• Improved functionality of smartphones and tablets
• Mobile devices make for an interesting point of attack
• Existence of “apps” as a source of malware
• Increase of cyber attacks on the iOS platform
• Increased use of ‘Bring Your Own Device’ (BYOD) policies in the workplace
12© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Mobile Devices
Cyber Security Threats: New Platforms
Impersonation
• SMS Redirection
• Sending Email Messages
• Posting to Social Media
Financial
• Sending premium rate SMS Messages
• Stealing Transaction Authentication Numbers (TANs)
• Extortion via Ransomware
• Fake Antivirus
• Making Expensive Calls
Data Theft
• Account Details
• Contracts
• Call Logs
• Phone Number
• Stealing Data via Application Vulnerabilities
• Stealing International Mobile Equipment Identity Numbers (IMEI)
Surveillance
• Audio
• Camera
• Call Logs
• Location
• SMS Messages
13© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Cyber Security Threats: New Platforms
The Cloud
• A single point of entry that can be accessed from almost anywhere
• This access can be abused in different ways:
• Theft or destruction of data
• DoS attacks
• Hijacking of cloud service traffic and redirecting
it to other sources of malicious content
Attacks can cause significant disruption to businesses
14© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Cyber Security Threats: New Platforms
Social Media
• Easy access to personal information
• One entry point provides a trusted voice to reach others
• “Check-ins” can provide malicious users access to possible transactions:
• Fraudulent bank transactions
• Identity theft situations
15© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Cyber Security Threats: Exploit Kits
Exploit Kits
• The “For Dummies” series equivalent in the world of cyber security
• Uses pre-written code to target applications with a history of known
security exploits or users who fail to update software
• Can be purchased by anyone and requires no knowledge of how
an exploit works
• Roughly 70% of exploit kits
originate from Russia
► Neutrino 24%
► Unknown Kit 21%
► Redkit 19%
► SweetOrange 11%
► Styx 10%
► Glazunov/Sibhost 5%
16© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Cyber Security Threats: Targeted Attacks
Targeted & Sophisticated Attacks
• Higher payoff makes cyber attacks more of an enterprise
• “Hacktivists”: Groups of cyber criminals
and/or protestors that target government
and corporate websites to bring awareness
to their cause
• “Cyberwarfare”: Nation-state
sponsored attacks
• Advanced Persistent Threat (APT)
• Zero-Day-Forever
17© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
Zero-Day-Forever
Zero-Day-Forever
Legacy Windows users are bracing for Microsoft’s April
8, 2014 deadline to end security updates on Windows
XP and Office 2003.
18© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Cyber Security Threats: Targeted Attacks
Targeted & Sophisticated Attacks
• Malware
• Ransomware: Common iteration referred to as Cryptolocker.
Ransomware has been around for nearly a quarter-century, the
latest version uses very strong encryption to make users’ files
inaccessible and extort cash from them.
• Spyware
• Adware
• Scareware: Software that appears to be something legit
(usually masquerading as some tool to help fix your computer)
but when it runs it tells you that your system is either infected or
broken in some way. This message is generally delivered in a
manner that is meant to frighten you into doing something.
19© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
What should you care about? (cont.)
Cyber Security Threats: Targeted Attacks
Targeted & Sophisticated Attacks
• Viruses
• Boot Sector Virus
• Direct Action Virus
• Browser Hijacker
• File Infector Virus
• Macro Virus
• Multipartite Virus
• Polymorphic Virus
• Resident Virus
• Web Scripting Virus
10 Infamous
Computer Hackers
21© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
10 Infamous Computer Hackers
Source: YouTube.com
22© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no
services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved.
Questions?
Thank you
Nathan Desfontaines
• nathan.desfontaines@kpmg.co.za
• 082 719 2426
© 2014 KPMG International. KPMG International is a
Swiss cooperative of which all KPMG firms are
members. KPMG International provides no services to
clients. Each member firm is a separate and
independent legal entity and each describes itself as
such. All rights reserved.
The KPMG name, logo and “cutting through
complexity” are registered trademarks or trademarks
of KPMG International.
Disclaimer:
1) This presentation has been prepared by KPMG Services (Pty) Ltd
(“KPMG”) and is exclusively for the benefit, information and internal use of
“McDonald Butler” for the exclusive purposes of/in order to present at the
“CSO Summit”. Under the terms of KPMG Services (Pty) Ltd, neither this
presentation nor its content thereof may be used for any other purposes
without KPMG’s prior written consent.
2) This presentation should be viewed solely in conjunction with a
KPMG Services (Pty) Ltd representative.
3) In preparing this presentation, KPMG has relied upon and assumed,
without independent verification, the accuracy and completeness of any
information provided to, and/or gathered by KPMG whether from public
sources or otherwise, and accordingly KPMG express no opinion or make
any representation concerning the accuracy and completeness of any such
information contained in this presentation.
4 ) KPMG’s finding shall not in any way constitute advice or
recommendations and/or regarding any other commercial decisions
associated with this presentation. All relevant issues may not have been
identified, and only those issues that have been identified as part of our
review are included in this presentation.
5) The information contained in this presentation reflects prevailing
conditions and KPMG’s view as at 27 March 2014. KPMG has not
undertaken to nor shall KPMG be under any obligation in any circumstances
to update the presentation or revise the information contained in the
presentation for events or circumstances arising after the 27th of March 2014
and the presentation or any information contained in the presentation shall
not amount to any form of guarantee that KPMG have determined or
predicted future events or circumstances.
6 ) This presentation cannot be copied, published, quoted, referred to or
disclosed by “McDonald Butler” to any other third party, without KPMG’s prior
written consent. No party, other than “McDonald Butler”, may rely on the
presentation and/or its contents thereof, either in whole or in part. KPMG
and/or KPMG Inc including its directors, employees and agents, and any
body or entity controlled by or owned by or associated with KPMG or KPMG
Inc (collectively “KPMG”) accepts no liability or responsibility whatsoever,
resulting directly or indirectly from the disclosure or referral of the
presentation and/or its contents thereof to any third party and/or the reliance
of any third party on the presentation and/or its contents thereof, either in
whole or in part and “McDonald Butler” agrees to indemnify and hold KPMG
harmless in this regard from and against any and all claims from any person
or party whatsoever, expenses, liability, loss or damages arising from or in
connection thereto in this respect.

More Related Content

What's hot

Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
seadeloitte
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
Rohan Sehgal
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
Chris Stallard
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
NIIT Technologies
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
John Ryan
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
Morgan Jones
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
Alex Rudie
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye, Inc.
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
seadeloitte
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
topseowebmaster
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
seadeloitte
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
- Mark - Fullbright
 

What's hot (20)

Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Financier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual reviewFinancier Worldwide - Cyber Security annual review
Financier Worldwide - Cyber Security annual review
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 

Viewers also liked

Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Gerard Keenan
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
Viral Parmar
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
April Mardock CISSP
 
Cyber Crime & Big Data Webinar -- 10-16-13
Cyber Crime & Big Data  Webinar -- 10-16-13Cyber Crime & Big Data  Webinar -- 10-16-13
Cyber Crime & Big Data Webinar -- 10-16-13
MedillNSZ
 
2016 Canadian CEO Outlook
2016 Canadian CEO Outlook2016 Canadian CEO Outlook
2016 Canadian CEO Outlook
Stradablog
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
ITCamp
 
IT Security Myths
IT Security MythsIT Security Myths
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Honeywell
 
Cybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryCybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryTunde Ogunkoya
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
Niki Upadhyay
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
CA Technologies
 
Big Data in Cyber Security
Big Data in Cyber SecurityBig Data in Cyber Security
Big Data in Cyber Security
Napier University
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
David Zaizar
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Knowledge Group
 

Viewers also liked (18)

Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Cyber Crime & Big Data Webinar -- 10-16-13
Cyber Crime & Big Data  Webinar -- 10-16-13Cyber Crime & Big Data  Webinar -- 10-16-13
Cyber Crime & Big Data Webinar -- 10-16-13
 
2016 Canadian CEO Outlook
2016 Canadian CEO Outlook2016 Canadian CEO Outlook
2016 Canadian CEO Outlook
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
 
IT Security Myths
IT Security MythsIT Security Myths
IT Security Myths
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
 
Cybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryCybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas Industry
 
Cloud with Cyber Security
Cloud with Cyber SecurityCloud with Cyber Security
Cloud with Cyber Security
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
 
Big Data in Cyber Security
Big Data in Cyber SecurityBig Data in Cyber Security
Big Data in Cyber Security
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 

Similar to The ever increasing threat of cyber crime

KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
Rose Valley Groups
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
Sarah Freemantle
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformation
Sebastien JARDIN
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
IBM Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
John Palfreyman
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM Security
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
Cyber Watching
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
John Palfreyman
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM Security
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
Prathan Phongthiproek
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
Prathan Phongthiproek
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
IBM Sverige
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber Security
BizSmart Select
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
AVG Technologies AU
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
John Palfreyman
 

Similar to The ever increasing threat of cyber crime (20)

KPMG-converted.pptx
KPMG-converted.pptxKPMG-converted.pptx
KPMG-converted.pptx
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
IBM Security - Successful digital transformation
IBM Security - Successful digital transformationIBM Security - Successful digital transformation
IBM Security - Successful digital transformation
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet Ola Wittenby - Hotlandskapet på Internet
Ola Wittenby - Hotlandskapet på Internet
 
How to Protect your Business with Cyber Security
How to Protect your Business with Cyber SecurityHow to Protect your Business with Cyber Security
How to Protect your Business with Cyber Security
 
The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 

Recently uploaded

Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 

Recently uploaded (16)

Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 

The ever increasing threat of cyber crime

  • 1. The ever- increasing threat of Cyber Crime Prepared By: Nathan Desfontaines 27 March 2014 Information Protection & Business Resilience
  • 2. 1© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. Agenda Who am I... And How did we get here? ■ Me, in a CMD-shell ■ Evolution of computers Video Time ■ Microsoft Europe – Cyber Security World’s biggest data breaches ■ World’s Biggest Data Breaches (Graphic) What should you care about? ■ Cyber Security Threats for 2013/2014 ■ Cyber Security Threats: New Platforms ■ Cyber Security Threats: Exploit Kits ■ Cyber Security Threats: Targeted Attacks Video Time ■ 10 Infamous Computer Hackers Questions?
  • 3. Who am I… And how did we get here?
  • 4. 3© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. Who am I… And how did we get here? (cont.) Do you remember “back in the day”?
  • 5. 4© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. Who am I… And how did we get here? (cont.) Apple II Sinclair ZX-81 Timex Sinclair 1000Sinclair ZX Spectrum Kaypro 4-84 Tandy 1000EX KIM-1 Tandy 102 Digi-Comp Magitronic 286 Atari 800XL Z-180 Commodore PET
  • 7. 6© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. Microsoft Europe – Cyber Security Source: YouTube.com
  • 9. 8© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. World's Biggest Data Breaches Source: informationisbeautiful.net
  • 10. What should you care about?
  • 11. 10© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? 1. Widespread use of new platforms Cyber Security Threats for 2013/2014 Three significant reasons as to why cyber security will remain a key concern for IT managers: 3. Attacks are becoming more sophisticated and have specific targets 2. Increasingly available and simple to use exploit kits
  • 12. 11© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Mobile Devices Cyber Security Threats: New Platforms • Rapid increase in the use of mobile devices • Improved functionality of smartphones and tablets • Mobile devices make for an interesting point of attack • Existence of “apps” as a source of malware • Increase of cyber attacks on the iOS platform • Increased use of ‘Bring Your Own Device’ (BYOD) policies in the workplace
  • 13. 12© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Mobile Devices Cyber Security Threats: New Platforms Impersonation • SMS Redirection • Sending Email Messages • Posting to Social Media Financial • Sending premium rate SMS Messages • Stealing Transaction Authentication Numbers (TANs) • Extortion via Ransomware • Fake Antivirus • Making Expensive Calls Data Theft • Account Details • Contracts • Call Logs • Phone Number • Stealing Data via Application Vulnerabilities • Stealing International Mobile Equipment Identity Numbers (IMEI) Surveillance • Audio • Camera • Call Logs • Location • SMS Messages
  • 14. 13© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Cyber Security Threats: New Platforms The Cloud • A single point of entry that can be accessed from almost anywhere • This access can be abused in different ways: • Theft or destruction of data • DoS attacks • Hijacking of cloud service traffic and redirecting it to other sources of malicious content Attacks can cause significant disruption to businesses
  • 15. 14© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Cyber Security Threats: New Platforms Social Media • Easy access to personal information • One entry point provides a trusted voice to reach others • “Check-ins” can provide malicious users access to possible transactions: • Fraudulent bank transactions • Identity theft situations
  • 16. 15© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Cyber Security Threats: Exploit Kits Exploit Kits • The “For Dummies” series equivalent in the world of cyber security • Uses pre-written code to target applications with a history of known security exploits or users who fail to update software • Can be purchased by anyone and requires no knowledge of how an exploit works • Roughly 70% of exploit kits originate from Russia ► Neutrino 24% ► Unknown Kit 21% ► Redkit 19% ► SweetOrange 11% ► Styx 10% ► Glazunov/Sibhost 5%
  • 17. 16© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Cyber Security Threats: Targeted Attacks Targeted & Sophisticated Attacks • Higher payoff makes cyber attacks more of an enterprise • “Hacktivists”: Groups of cyber criminals and/or protestors that target government and corporate websites to bring awareness to their cause • “Cyberwarfare”: Nation-state sponsored attacks • Advanced Persistent Threat (APT) • Zero-Day-Forever
  • 18. 17© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. Zero-Day-Forever Zero-Day-Forever Legacy Windows users are bracing for Microsoft’s April 8, 2014 deadline to end security updates on Windows XP and Office 2003.
  • 19. 18© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Cyber Security Threats: Targeted Attacks Targeted & Sophisticated Attacks • Malware • Ransomware: Common iteration referred to as Cryptolocker. Ransomware has been around for nearly a quarter-century, the latest version uses very strong encryption to make users’ files inaccessible and extort cash from them. • Spyware • Adware • Scareware: Software that appears to be something legit (usually masquerading as some tool to help fix your computer) but when it runs it tells you that your system is either infected or broken in some way. This message is generally delivered in a manner that is meant to frighten you into doing something.
  • 20. 19© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. What should you care about? (cont.) Cyber Security Threats: Targeted Attacks Targeted & Sophisticated Attacks • Viruses • Boot Sector Virus • Direct Action Virus • Browser Hijacker • File Infector Virus • Macro Virus • Multipartite Virus • Polymorphic Virus • Resident Virus • Web Scripting Virus
  • 22. 21© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. 10 Infamous Computer Hackers Source: YouTube.com
  • 23. 22© 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. Questions?
  • 24. Thank you Nathan Desfontaines • nathan.desfontaines@kpmg.co.za • 082 719 2426
  • 25. © 2014 KPMG International. KPMG International is a Swiss cooperative of which all KPMG firms are members. KPMG International provides no services to clients. Each member firm is a separate and independent legal entity and each describes itself as such. All rights reserved. The KPMG name, logo and “cutting through complexity” are registered trademarks or trademarks of KPMG International. Disclaimer: 1) This presentation has been prepared by KPMG Services (Pty) Ltd (“KPMG”) and is exclusively for the benefit, information and internal use of “McDonald Butler” for the exclusive purposes of/in order to present at the “CSO Summit”. Under the terms of KPMG Services (Pty) Ltd, neither this presentation nor its content thereof may be used for any other purposes without KPMG’s prior written consent. 2) This presentation should be viewed solely in conjunction with a KPMG Services (Pty) Ltd representative. 3) In preparing this presentation, KPMG has relied upon and assumed, without independent verification, the accuracy and completeness of any information provided to, and/or gathered by KPMG whether from public sources or otherwise, and accordingly KPMG express no opinion or make any representation concerning the accuracy and completeness of any such information contained in this presentation. 4 ) KPMG’s finding shall not in any way constitute advice or recommendations and/or regarding any other commercial decisions associated with this presentation. All relevant issues may not have been identified, and only those issues that have been identified as part of our review are included in this presentation. 5) The information contained in this presentation reflects prevailing conditions and KPMG’s view as at 27 March 2014. KPMG has not undertaken to nor shall KPMG be under any obligation in any circumstances to update the presentation or revise the information contained in the presentation for events or circumstances arising after the 27th of March 2014 and the presentation or any information contained in the presentation shall not amount to any form of guarantee that KPMG have determined or predicted future events or circumstances. 6 ) This presentation cannot be copied, published, quoted, referred to or disclosed by “McDonald Butler” to any other third party, without KPMG’s prior written consent. No party, other than “McDonald Butler”, may rely on the presentation and/or its contents thereof, either in whole or in part. KPMG and/or KPMG Inc including its directors, employees and agents, and any body or entity controlled by or owned by or associated with KPMG or KPMG Inc (collectively “KPMG”) accepts no liability or responsibility whatsoever, resulting directly or indirectly from the disclosure or referral of the presentation and/or its contents thereof to any third party and/or the reliance of any third party on the presentation and/or its contents thereof, either in whole or in part and “McDonald Butler” agrees to indemnify and hold KPMG harmless in this regard from and against any and all claims from any person or party whatsoever, expenses, liability, loss or damages arising from or in connection thereto in this respect.