{ Cyber Threat Intelligence: Understanding adversaries to banks in the-GCC and the importance of data sharing. Matt Suiche.

Slides:



Advertisements
Similar presentations
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
Summary of Lecture 1 Security attack types: either by function or by the property being compromised Security mechanism – prevention, detection and reaction.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
SEC835 Database and Web application security Information Security Architecture.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
April 9,  Employers  IS Careers  Business Support  Key Trends  Manage your career  Questions 2.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Enterprise Resource Planning Enterprise Resource Planning Systems is a computer system that integrates application programs in accounting, sales, manufacturing,
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Why does my perfectly working App Crash and Burn in Production? Matt Kramer Project Manager, STL Boeing Scalability Test Lab cell.
Information Warfare Playgrounds to Battlegrounds.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
The Changing World of Endpoint Protection
Application of Machine Learning and Crowdsourcing to Detection of Cyber Threats Jaime G. Carbonell Eugene Fink Mehrbod Sharifi.
Larry Clinton Operations Officer Internet Security Alliance
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Information Warfare Playgrounds to Battlegrounds.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
H UMAN R ESOURCES M ANAGEMENT August 18, O UTLINE Key Results Ensure all stakeholders are well informed of cybersecurity and its financial impact.
DR LEE BUCHANAN Venture Partner PALADIN CAPITAL GROUP.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Developing a Network Security Policy By: Chris Catalano.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
LIZ MOODY OPEN UNIVERSITY. LIZ MOODY OPEN UNIVERSITY.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Vikas Uberoy -Channel Director ANZ
Cyber Security: State of the Nation
Rootkit Detection and Mitigation
Responding to Intrusions
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
WEBINAR The Rise Of Insights Services
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Forensics Week 11.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Infrastructure, Data Center & Managed Services
بهترین راهکار را انتخاب کنید...
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
I have many checklists: how do I get started with cyber security?
Determined Human Adversaries: Mitigations
Cyber Security in the Mortgage Industry
Technology Management- A CIO Perspective
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Threat landscape financial sector
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Penetration Testing Computer Science and Software Engineering
Cybersecurity Threats and Opportunities in Latin America
Cyber Security Culture
Anatomy of a Large Scale Attack
Maintaining order and safety in a city is no small task
Computer Science and Engineering
Strategic threat assessment
Determined Human Adversaries: Mitigations
Cyber Security R&D: A Personal Perspective
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
Overview Presentation
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

{ Cyber Threat Intelligence: Understanding adversaries to banks in the-GCC and the importance of data sharing. Matt Suiche

Who am I? Founder of Comae OPCDE Technical Cybersecurity Conference Advisory Services R&D 1M+ WannaCry infection prevented (variant #2) OPCDE Technical Cybersecurity Conference #2 Edition on April 6-7 2018 Enterprise Memory Forensics Platform Porosity: Ethereum’s Smart Contract Decompiler

What’s Threat Intelligence? Everyone seem to have their own definition of it… Is it an Indicator of Compromise (IOC) threat feed product? We personally define intelligence as: Customer needs-focused capability Not as a product.

Adversaries Lazarus Group or Equation Group… ETERNALBLUE / DOUBLEPULSAR / ETERNALROMANCE Kernel Remote Code Execution for the masses. The challenges of outsourcing IT (totally or partially) Makes resources control harder How many machines or admin accounts do you have? Attracting and retaining talent within your organization

Ransomwares Everybody’s threat. In 2017, they impacted personal computers to global large businesses. Many didn’t have any backups. Attribution? Does not necessarily help to protect your company better.

Banks are big organizations Lots of employees, data control flow is often a problem. Insider jobs can be a problems… Leaked databases… How to ensure data permissions, confidentiality and integrity within large organizations?

Does your organization has enough resources? Active Directory security engineer Incident Response Team Big enough? Recovery plan Are you reachable in case of issues secure@bank.ae ? Is your management supporting your unit? Budget and decisions Culture Not knowing everything is ok. Making mistakes too.