OWASP Ukraine Thomas George presentation

Jun. 29, 2014
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
OWASP Ukraine Thomas George presentation
1 of 32

More Related Content

Slideshows for you

Profile   securitarianProfile   securitarian
Profile securitarianRupesh Verma
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Crew
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
Dark webDark web
Dark webSafwan Hashmi
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser

Viewers also liked

Sample 5 - Informational GuideSample 5 - Informational Guide
Sample 5 - Informational GuideMichael James
Poonam passport applicationPoonam passport application
Poonam passport applicationabhinavsiddhant
Sales promotion by tabish khanSales promotion by tabish khan
Sales promotion by tabish khanTabishkhanjamaliee
Símbolos patriosSímbolos patrios
Símbolos patriosRAYSHACABALLERO
Liliom Liliom
Liliom Vanya Bowden
Sistemas de informacion institucionalSistemas de informacion institucional
Sistemas de informacion institucionaladrianita8620

Similar to OWASP Ukraine Thomas George presentation

CybercrimeCybercrime
CybercrimeTouqeerAhmed30
Insurance  Cyber Risks PresentationInsurance  Cyber Risks Presentation
Insurance Cyber Risks PresentationNeville Cartwright
MobileMiner and NervousNetMobileMiner and NervousNet
MobileMiner and NervousNetkingsBSD
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxNOUREDDINEOUNINISSE
Identity TheftIdentity Theft
Identity TheftSimpletel
awareness.pdfawareness.pdf
awareness.pdfjolag93795

More from uisgslide

Стандарт верифікації безпеки веб-додатків ASVS 3.0Стандарт верифікації безпеки веб-додатків ASVS 3.0
Стандарт верифікації безпеки веб-додатків ASVS 3.0uisgslide
Коментарі до концепції інформаційної безпекиКоментарі до концепції інформаційної безпеки
Коментарі до концепції інформаційної безпекиuisgslide
Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...
Кращи практики з аудиту та підтвердження довіри до інформаційних системи (ITA...uisgslide
Необхідність реформи галузі захисту інформації в УкраїніНеобхідність реформи галузі захисту інформації в Україні
Необхідність реформи галузі захисту інформації в Україніuisgslide
Sandbox kievSandbox kiev
Sandbox kievuisgslide
Comments glib pakharenkoComments glib pakharenko
Comments glib pakharenkouisgslide

Recently uploaded

Automation Suite PPT (2).pptxAutomation Suite PPT (2).pptx
Automation Suite PPT (2).pptxRohitRadhakrishnan8
办美国大学毕业证学位证圣约翰大学毕业证制作|办美国大学毕业证学位证圣约翰大学毕业证制作|
办美国大学毕业证学位证圣约翰大学毕业证制作|vweuwx
【澳洲毕业证】澳大利亚天主教大学毕业证学位证购买【澳洲毕业证】澳大利亚天主教大学毕业证学位证购买
【澳洲毕业证】澳大利亚天主教大学毕业证学位证购买ufmek
澳洲文凭证书快速办理维多利亚大学毕业证学位证书澳洲文凭证书快速办理维多利亚大学毕业证学位证书
澳洲文凭证书快速办理维多利亚大学毕业证学位证书dadot2
美国罗德岛大学毕业证文凭认证 - 购买国外文凭证书美国罗德岛大学毕业证文凭认证 - 购买国外文凭证书
美国罗德岛大学毕业证文凭认证 - 购买国外文凭证书dadot2
原版定制:英国赫尔大学毕业证书案例原版定制:英国赫尔大学毕业证书案例
原版定制:英国赫尔大学毕业证书案例gonksoe

Recently uploaded(20)

OWASP Ukraine Thomas George presentation

  1. “Menschenkenntnis” and Cyber Security Thomas George International Business Manager - cyscon GmbH
  2. Who are Cyscon? • Founded 2001 by Thorsten Kraft • Cyber Security Consulting • Founding Member of Botfrei and ACDC Project. • Official Partner of BSI - German Federal Office for Information Security • 2010 - Conficker Takedown • 2013 - Check & Secure - Private User Initiative
  3. Working Relationships cyscon works with a variety of partners in the IT Security world. These include: • Internet Service Providers, including Vodafone and 1&1 Telecom • Banks, such as Deutsche Bank and Postbank • Law enforcement, including FBI and Europol • NGOs, including Stop.Think.Connect - Funded by the Department of Homeland Security
  4. Knowing your Enemy How cyscon gets its data.
  5. Sinkholing • 80 Million Events per day • 42 Different Types of Malware recognised
  6. Honeypots and Spam Traps • 3.5 Million Spam Emails Per Day • Honeypots installed on real systems by our customers • 40,000 New Malicious URLs Each Day
  7. Web Crawling • Systems Continually Crawling the Web • 16 Different Settings - Chilled to Paranoia • Analysing Behaviour and AV Detection
  8. The Data Toilet • Gathering Data since 2006 • Enriching Data with Meta Data • More than 20,000 Sensors • More than 50 Partners • WHOIS, SSH HOSTKEY, DNS details, etc.
  9. What goes in?
  10. Where Does it All Go? • Data is sent to ISPs • AND / OR • Anonymised and Sent to Law Enforcement, Research or Industry
  11. Internet Service Providers Sensor Sensor Concentrator Concentrator Sensor Sensor Sensor Sensor Sensor Sensor Anonymisation Law Enforcement Agencies Research Industry Detection Supporting
  12. Flushing the Toilet • Okay…we have the data. • Let’s Make Some Money!
  13. Menschenkenntnis in Business Wer keine Menschenkenntnis hat, hat als Kaufmann bereits verloren
  14. Flexibility • Knowing what customers want • Using trust and Existing Relationships • Knowing when to work for free
  15. Banks Its All About the Money
  16. What is Hurting? • Losing Money • Losing More Money • Losing Even More Money • Losing Reputation
  17. How do Banks (and their customers) lose money? • Redirection of Payment • Identity Theft through Trojan Infection • Direct Phishing Scams
  18. Technical Overview - Banking Services Threat Detection, Mitigation, Prevention
  19. Malware Detection • Identification of infected customers • More than 40 Trojan Families - 4000 events per second. • JSON Format - Easy to implement and process • Can be combined with sales of Malware Deletion Product.
  20. Malicious Traffic Mitigation • Access to C-SIRT Database and Cyber Threat Detection Cloud • Database fed by Worldwide sensors of Malicious Traffic • Eliminates Cyber Attacks against banking platforms.
  21. Brand Protection • Fully automated takedown service • Detection, Blocking, Blacklisting • Normal process time, 2 hours • Excellent contacts to ISPs for quick takedowns
  22. Menschenkenntnis in the Community “Love thy Neighbour”
  23. Two Sides of the Story • How much can experts do without end users? • GameOver Zeus Takedown - Pointless? • “Slipping through the net”
  24. The Cyber Vaccination • Appears as analysis system from AV industry. • Protection against MITB attacks and identity theft. • Works on 10 different browsers. • Free to use - One time installation. • Attack interception - Malicious code cannot be executed. • “Panic Switch” when intruder is detected.
  25. HitmanPro: A Second Opinion Scanner • Behavioural analysis - not signature based. • 10MB file, can boot from USB. • Complement to existing AV programs • 30 Day free trial for emergency cases.
  26. Case Study: Cyber Alliance of Switzerland Cyber Alliance of Switzerland How can the “Check & Secure” Technology be Implemented by Banks?
  27. Concept and Goals • Making Switzerland into the “Cleanest Internet Country in the World • Identification and Help for Infected End Users • Support for the deletion of malware and securing of end user systems with Check & Secure and End User Products.
  28. Realisation • Banking Partners: Credit Suisse, Raffeisen, Postfinance and UBS. • Internet Service Partners: Swisscom, Sunrise, UPC • Creation of a shared Malware database. • Planned Launch 1.8.2014.
  29. Thank you for Listening • tgeorge@cyscon.de • +491733853804