RCCU www.swCyberCrimeUnit.co.uk Zephyr South West Regional Cyber Crime Unit.

Slides:



Advertisements
Similar presentations
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Advertisements

English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Threats and Attacks Principles of Information Security, 2nd Edition
Bank Crime Investigation Techniques by means of Forensic IT
Unit 4 – Impact of the use of IT on Business Systems.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
December 11 th 2015 Intelligence Briefing NOT PROTECTIVELY MARKED.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Regional Cyber Crime Unit
Friday 22nd April 2016 DS Chris Greatorex SEROCU
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Securing Information Systems
Risk Outlook James Dipple-Johnstone Paul Hastings Dr Debra Malpass
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Cyber Security Zafar Sadik
Executive Director and Endowed Chair
Comprehensive Security and Compliance at an Affordable Price.
Careers in Cyber Security
Cyber Crime What’s all the fuss about?
Tackling Cyber threats together
Cybersecurity EXERCISE (CE) ATD Scenario intro
Protect Your Computer Against Harmful Attacks!
Securing Information Systems
Information Security based on International Standard ISO 27001
Panel Discussion Can We Handle an Advanced Cyber Threat?
Cyber defense management
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Crime Today we will look at: Different types of cyber-crime
Threat Landscape for Data Security
Cyber Trends and Market Update
Reconnaissance Report Trillium Technologies
Staying safe on the internet
E-Commerce Security and Fraud Issues and Protections
Prepared By : Binay Tiwari
Chapter 9 E-Commerce Security and Fraud Protection
Keeping your data, money & reputation safe
Cyber Security Culture
Faculty of Science IT Department By Raz Dara MA.
Tackling Cyber threats together
Anatomy of a Large Scale Attack
Cybersecurity ATD Scenario conclusion
Business Compromise and Cyber Threat
Tackling Cyber threats together
Strategic threat assessment
Cybersecurity EXERCISE (CE) ATD Scenario questions
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Accounting Information Systems & Computer Fraud
Thames Valley Chamber / Claire Logic
Presentation transcript:

RCCU www.swCyberCrimeUnit.co.uk Zephyr South West Regional Cyber Crime Unit

National Cyber Security Strategy. Oct 2016 Zephyr RCCU Businesses and organisations must also understand that, if they are the victim of a cyber attack, they are liable for the consequences. With technological transformation comes the responsibility to safeguard the assets which they hold. National Cyber Security Strategy. Oct 2016

Why should I care as a business? Prevent loss of life/serious harm Legal and regulatory compliance Financial Loss Reputational Loss Loss of Privacy/Intellectual property rights Commercial Advantage

What do businesses have to protect? Personally Identifiable Information Intellectual Property Card Data Employee Data Financial Records Commercial Contracts & Agreements Strategies

What threats? RCCU Phishing/Spear-Phishing Banking Trojans Ransomware Zephyr Zephyr What threats? RCCU Phishing/Spear-Phishing Banking Trojans Ransomware CEO Fraud / Social Engineering DDOS – Organised Crime Groups and kids! ‘Spoofed’ websites

Prevention is better than cure! Zephyr RCCU

Prevention is better than cure! Zephyr RCCU

NATIONAL CYBER SECUIRTY STRATEGY - 1st November 2016 Prevention is better than cure! Zephyr RCCU “7 out of 10 attacks involved viruses, spyware or malware that might have been prevented using the government’s Cyber Essentials scheme” NATIONAL CYBER SECUIRTY STRATEGY - 1st November 2016

Useful websites Zephyr RCCU

Zephyr Reporting RCCU

Questions? RCCU Ed Heath Detective Inspector South West Zephyr Questions? RCCU Ed Heath Detective Inspector South West Regional Cyber Crime Unit   www.swcybercrimeunit.co.uk   Tel: 0117 3720153   Mob: 07889 656908   E-mail: edward.heath@avonandsomerset.police.uk CiSP is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and dynamic environment, increasing situational awareness and reducing the impact on UK business.