SlideShare a Scribd company logo
1 of 15
Download to read offline
Cybersecurity
CHALLENGES AND OPPORTUNITY
Karel Obluk
Cybersecurity – Segments
• Global
• Critical infrastructure
• Geo-political
Cybersecurity – Segments
• Global
• Personal
• Money
• Privacy – stealing
your info & identity
Cybersecurity – Segments
• Global
• Personal
• Data
• Personal,
company sensitivedata
Global – Infrastructure
• Espionage
• Snowden,China
• Cyber Warfare
• Estonia,Georgia, Iran
• Critical infrastructure
• US North-East blackout
• Emergency systems
• Typically state-sponsored
Global – Economy
• Target, Sony, TalkTalk
• massive attacks, lots of sensitive data, trade secrets
• company value, significant economical impact
• Aetna, Anthem, BlueCross
• Bangladesh central bank / SWIFT
• WHO?
• Criminals, hacktivists, bored geeks
• Also state sponsored?
Personal
• Stealing money from your bank account, ransomware
• guessing passwords, sending money elsewhere
• Electronic currencies, virtual valuables
• Games, virtual objects– World of Warcraft,...
• Who andWhy?
• Criminals
• Obtaining tools and means
for other attacks
Identity
Identity
• Social Networks
• Fake Facebook, LinkedIn accounts
• intelligence, constructing spear-headed attacks
• Social engineering
• Pictures, relationships
• Dating sites, sensitive info
• Even cost lives!
Personal Information
• Location
• Behaviour - patterns
• IoT, Devices
• Amount of info collected
• Security (or lack of it)
• Value of data
Data
• The good
• Product recommendations
• Predictions and forecasting
• But also the bad!
• Manipulating stock
• Ad-business
• Wait!
Data
• The good
• Product recommendations
• Predictions and forecasting
• Ad-business
• But also the bad!
• Manipulating stock
• Ad-business
Opportunity
• Education and Training
• Shortage ofsecurity experts
• Test systems, “labs”,simulation - for experts
• Basic training,education,certification - for normal users
• Security Tools and Frameworks
• Securing protocolsand applications
• Virtualisation,device management
• Exploit detection,attack detection and prevention
• Back-end systems,web applications- strengthening,
Opportunity
• Network infrastructure
• Deception tools and frameworks
• Using data analytics to identify good or bad
• Network, endpoints, mobile devices, access to resources
• SIEM / log analysis
• User Behaviour Analysis
• Anomalies, suspicious activity - spotting new trends, …
• Authentication
• Passwords = cockroaches of the web…
Questions?

More Related Content

What's hot

Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilitiesPeter Henley
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskSurfWatch Labs
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Theko Moima
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesLancope, Inc.
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINTAdam Compton
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and lattecoffeeandlatte
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Facundo Mauricio
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
 
Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1vincentleone
 

What's hot (20)

Tips memulai karir di cybersecurity
Tips memulai karir di cybersecurityTips memulai karir di cybersecurity
Tips memulai karir di cybersecurity
 
Hackers
HackersHackers
Hackers
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party RiskUsing SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
Using SurfWatch Labs' Threat Intelligence to Understand Third-Party Risk
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
OSINT
OSINTOSINT
OSINT
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
 
Hacking-Basics
Hacking-BasicsHacking-Basics
Hacking-Basics
 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
 
NRF Presentation v2
NRF Presentation v2NRF Presentation v2
NRF Presentation v2
 
Bsides Knoxville - OSINT
Bsides Knoxville - OSINTBsides Knoxville - OSINT
Bsides Knoxville - OSINT
 
Hacking-coffee and latte
Hacking-coffee and latteHacking-coffee and latte
Hacking-coffee and latte
 
Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
IT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of WikileaksIT Risk Management In The Age of Wikileaks
IT Risk Management In The Age of Wikileaks
 
Hacking
HackingHacking
Hacking
 
Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1
 

Viewers also liked

Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)  Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez) Ed Valdez
 
моторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологиеймоторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологиейВалерия Кулеш
 
Flaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First CustomersFlaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First CustomersTechsylvania
 
Wallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + FashionWallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + FashionTechsylvania
 
Dmfa let's talk production final.
Dmfa let's talk production final.Dmfa let's talk production final.
Dmfa let's talk production final.Nonprofit_Education
 
Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"rizkyadhechurnia
 
Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014NiemieckaSofa
 
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...Techsylvania
 
поделка «подсолнух» с использование природного
поделка «подсолнух» с использование природногоподелка «подсолнух» с использование природного
поделка «подсолнух» с использование природногоВалерия Кулеш
 
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New MarketsJon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New MarketsTechsylvania
 
Cristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on RailsCristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on RailsTechsylvania
 
Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2pshelk
 
Unscramble the words
Unscramble the wordsUnscramble the words
Unscramble the wordsolga31_2014
 
7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtual7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtualCONEXION TIENS
 
Scraps for bronze with a strong background for business
Scraps for bronze with a strong background for businessScraps for bronze with a strong background for business
Scraps for bronze with a strong background for businessPedro Gonzalez, PMP®
 
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...muddledreferee887
 

Viewers also liked (20)

Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)  Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
Are You Prepared? Cybersecurity Trends & Opportunities (Ed Valdez)
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
моторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологиеймоторное развитие дошкольников с речевой патологией
моторное развитие дошкольников с речевой патологией
 
Flaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First CustomersFlaviu Simihaian (iMedicare) - How to Sell your First Customers
Flaviu Simihaian (iMedicare) - How to Sell your First Customers
 
Wallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + FashionWallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
Wallace Wu (Misfit) - Wearable 2.0: Tech + Fashion
 
Dmfa let's talk production final.
Dmfa let's talk production final.Dmfa let's talk production final.
Dmfa let's talk production final.
 
FORCE
FORCEFORCE
FORCE
 
Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"Album csr adirect "Sahur Goes To Panti"
Album csr adirect "Sahur Goes To Panti"
 
Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014Prace konkursowe - Niemiecka Sofa - lipiec 2014
Prace konkursowe - Niemiecka Sofa - lipiec 2014
 
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
Thomas Roth-Berghofer (University of West London) – Artificial Intelligence -...
 
поделка «подсолнух» с использование природного
поделка «подсолнух» с использование природногоподелка «подсолнух» с использование природного
поделка «подсолнух» с использование природного
 
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New MarketsJon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
Jon Soberg (Expansive Ventures) – Expansive Horizons - Taking on New Markets
 
Cristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on RailsCristiano Betta (PayPal) – Hackathons on Rails
Cristiano Betta (PayPal) – Hackathons on Rails
 
Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2Агрегатор проверок. Demo day#2
Агрегатор проверок. Demo day#2
 
Unscramble the words
Unscramble the wordsUnscramble the words
Unscramble the words
 
цветочная фея
цветочная феяцветочная фея
цветочная фея
 
7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtual7 errores financieros capacitacion virtual
7 errores financieros capacitacion virtual
 
Scraps for bronze with a strong background for business
Scraps for bronze with a strong background for businessScraps for bronze with a strong background for business
Scraps for bronze with a strong background for business
 
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
Garcinia cambogia: nuovo estratto miracoloso per perdere peso velocemente. Tu...
 
Bab 1 (1)
Bab 1 (1)Bab 1 (1)
Bab 1 (1)
 

Similar to Cybersecurity Challenges and Opportunities in Critical Infrastructure

OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application SecurityBruce Abernethy
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityantitree
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Forensics intro
Forensics introForensics intro
Forensics introtest tt
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iotST_World
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actorsOWASP EEE
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursMotherGuardians
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxFarzanMansoor1
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 

Similar to Cybersecurity Challenges and Opportunities in Critical Infrastructure (20)

OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Fun with Application Security
Fun with Application SecurityFun with Application Security
Fun with Application Security
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Forensics intro
Forensics introForensics intro
Forensics intro
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors[Bucharest] Catching up with today's malicious actors
[Bucharest] Catching up with today's malicious actors
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Threats
ThreatsThreats
Threats
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

More from Techsylvania

Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTechsylvania
 
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Techsylvania
 
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Techsylvania
 
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPAarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPTechsylvania
 
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Techsylvania
 
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Techsylvania
 
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Techsylvania
 
Jonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsJonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsTechsylvania
 
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationYossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationTechsylvania
 
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Techsylvania
 
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Techsylvania
 
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Techsylvania
 
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Techsylvania
 
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Techsylvania
 
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Techsylvania
 
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsPatrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsTechsylvania
 
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Techsylvania
 
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Techsylvania
 
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Techsylvania
 
Julie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleJulie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleTechsylvania
 

More from Techsylvania (20)

Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models UnlistedTom Mason (Stability AI) - Computing Large Foundational Models Unlisted
Tom Mason (Stability AI) - Computing Large Foundational Models Unlisted
 
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
Sergiu Biris (MultiversX) - Blurring the Lines Between Web 2.0 and Web 3.0
 
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
Conversation w/ Tijana Kovacevic (Happening) - Keeping Your Startup Heart Whi...
 
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCPAarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
Aarik Mudgal (METRO.Digital) - How to Implement DDoS Protection in GCP
 
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
Tudor Mafteianu (Blu Capital Partners) - What Drives the Value of Your Business?
 
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
Andrew O’Neal (Clearbit) - Scaling a Product Vision Through World-Class Team ...
 
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
Andrew Davies (Paddle) - From Zero to $350m Revenue: Finding and Scaling Your...
 
Jonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness ProductsJonathan Oakes (Google) - Powering Health and Fitness Products
Jonathan Oakes (Google) - Powering Health and Fitness Products
 
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI InnovationYossi Matias (Google) - Driving Societal Change Through AI Innovation
Yossi Matias (Google) - Driving Societal Change Through AI Innovation
 
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
Angus Keck (AgUnity) - Mastering Determination, Adaptability, and Storytellin...
 
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
Efi Dahan (PayPal) - From Local to Global: Tips and Trends to Scale Your Busi...
 
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
Amy Varney (Systemiq Capital) - Has Climate Tech Graduated?
 
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
Nima Banai - Vision to Product: Product Design, Development, and Manufacturin...
 
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
Chris Leacock aka Jillionaire - Embracing Diversity Through Interdisciplinary...
 
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
Emil Boc (Mayor of Cluj-Napoca) - Opening Remarks Day 1
 
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed TeamsPatrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
Patrick Poels (Snyk) - The 3 Key Rules of Building Globally Distributed Teams
 
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
Eduard Varvara (Barings, MassMutual) - How Barings is Shaping a Culture of In...
 
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
Cristina Morariu (MassMutual Romania) -How Is Technology & Innovation Shaping...
 
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
Marie Astrid Molina (Scaleway), How to Design for a Product You Understand No...
 
Julie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scaleJulie Xu (Carta) - Designing a product experience vision at scale
Julie Xu (Carta) - Designing a product experience vision at scale
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Cybersecurity Challenges and Opportunities in Critical Infrastructure

  • 2. Cybersecurity – Segments • Global • Critical infrastructure • Geo-political
  • 3. Cybersecurity – Segments • Global • Personal • Money • Privacy – stealing your info & identity
  • 4. Cybersecurity – Segments • Global • Personal • Data • Personal, company sensitivedata
  • 5. Global – Infrastructure • Espionage • Snowden,China • Cyber Warfare • Estonia,Georgia, Iran • Critical infrastructure • US North-East blackout • Emergency systems • Typically state-sponsored
  • 6. Global – Economy • Target, Sony, TalkTalk • massive attacks, lots of sensitive data, trade secrets • company value, significant economical impact • Aetna, Anthem, BlueCross • Bangladesh central bank / SWIFT • WHO? • Criminals, hacktivists, bored geeks • Also state sponsored?
  • 7. Personal • Stealing money from your bank account, ransomware • guessing passwords, sending money elsewhere • Electronic currencies, virtual valuables • Games, virtual objects– World of Warcraft,... • Who andWhy? • Criminals • Obtaining tools and means for other attacks
  • 9. Identity • Social Networks • Fake Facebook, LinkedIn accounts • intelligence, constructing spear-headed attacks • Social engineering • Pictures, relationships • Dating sites, sensitive info • Even cost lives!
  • 10. Personal Information • Location • Behaviour - patterns • IoT, Devices • Amount of info collected • Security (or lack of it) • Value of data
  • 11. Data • The good • Product recommendations • Predictions and forecasting • But also the bad! • Manipulating stock • Ad-business • Wait!
  • 12. Data • The good • Product recommendations • Predictions and forecasting • Ad-business • But also the bad! • Manipulating stock • Ad-business
  • 13. Opportunity • Education and Training • Shortage ofsecurity experts • Test systems, “labs”,simulation - for experts • Basic training,education,certification - for normal users • Security Tools and Frameworks • Securing protocolsand applications • Virtualisation,device management • Exploit detection,attack detection and prevention • Back-end systems,web applications- strengthening,
  • 14. Opportunity • Network infrastructure • Deception tools and frameworks • Using data analytics to identify good or bad • Network, endpoints, mobile devices, access to resources • SIEM / log analysis • User Behaviour Analysis • Anomalies, suspicious activity - spotting new trends, … • Authentication • Passwords = cockroaches of the web…