EIC – Jornada ciberatacs cyber risk outlook June 2016.

Slides:



Advertisements
Similar presentations
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
Advertisements

A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING Reducing your Risk Profile MIDWEST DATA RECOVERY INC.
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
Brussels June Cyber-Security Cyber-Protection Cyber-Sustainability.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Cyber Security & Fraud – The impact on small businesses.
Cyber Security Nevada Businesses Overview June, 2014.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
IT Controls Global Technology Auditing Guide 1.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Human Factors in Cyber Security: A Review for Research & Education P. Vigneswara Ilavarasan, PhD 1.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cyber Security – An Existential Threat? (IIC, Singapore)
Information Security Program
Information Security – Current Challenges
ISSeG Integrated Site Security for Grids WP2 - Methodology
Careers in Cyber Security
Liberty International Underwriters
Information Technology Sector
Business At the Speed of Cyber
Cyber Security: State of the Nation
Hot Topics:Mobility in the Cloud
COMPUTER AIDED LOGISTICS & SECURITY
Cyber Security Challenges & Opportunities.
CSI Survey 2007 Tiffany Gorman
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
Andy Hall – Cyber & Tech INSURANCE Specialist
Challenges and Opportunities
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
E-Commerce Security and Fraud Issues and Protections
Securing the Threats of Tomorrow, Today.
Cybersecurity compliance for attorneys
Ofcom’s role in cyber security
Security for Safety: Enabling Digitalization of Railway Systems
Cyber Risk & Cyber Security
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Strategic threat assessment
Information Services Security Management
The Secure Contingency Plan
Session 8: Innovative Uses of Captives: Cyber and Beyond
Figuring out CyberSecurity Return On Investment
SECURITY IN THE DIGITAL AGE
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Global Identity and Access Management Market Worth Over $20 bn by 2025:
Presentation transcript:

EIC – Jornada ciberatacs cyber risk outlook June 2016

EIC – Jornada ciberatacs movies big companies motivation technical (not business) not me cyber security top 5 myths

EIC – Jornada ciberatacs

EIC – Jornada ciberatacs Ramnicu Valcea (Romania)

EIC – Jornada ciberatacs Hackerville

EIC – Jornada ciberatacs motivations behind a cyber attack Source: HACKMAGEDDON march 2016HACKMAGEDDON organized cyber crime

EIC – Jornada ciberatacs cybercrime automation >50% Internet traffic is not human

EIC – Jornada ciberatacs world’s biggest data breaches

EIC – Jornada ciberatacs they want your credentials Source: Skyhigh Networks july 2015Skyhigh Networks

EIC – Jornada ciberatacs attackers target large and small businesses Source: Symantec april 2016

EIC – Jornada ciberatacs CEO fraud – social engineering

EIC – Jornada ciberatacs main target sectors Source: IBM 2016

EIC – Jornada ciberatacs global risks landscape 2016 Source: WEF jan 2016

EIC – Jornada ciberatacs this is about risk

EIC – Jornada ciberatacs and this is about cost Source: ???

EIC – Jornada ciberatacs how to reduce your risk? Risk = Threat x Vulnerability x Consequence Threat is an external factor, are out of organizations control Consequence of a security incident depens on each case and organization Risk mitigation is only achieved by controlling and reducing the Vulnerability of our critical digital assets (CDAs)

EIC – Jornada ciberatacs risk-adjusted return profit => income - expense risk

EIC – Jornada ciberatacs risk-adjusted return for the cybercrime profit => income - expense risk digital asset value attack cost being caught

EIC – Jornada ciberatacs digital transformation cloud computing | mobile BYOD | IOT | big data social networks organized cyber crime regulation and laws cyber ignorance complexity lack of professionals

EIC – Jornada ciberatacs be aware (sensitization) assess your digital risk compare to physical world implement some measures part of your [digital] strategy cyber security top5 recommendations

EIC – Jornada ciberatacs next steps ???

EIC – Jornada ciberatacs Mingo Olmos (+34)