Cybersecurity Threats and Opportunities in Latin America

Slides:



Advertisements
Similar presentations
1 Title Goes Here Canadas Maritime Security Threats and Responses.
Advertisements

International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
Cyber Crime in the Digital Age
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Creating an Effective Information Security Training, Education and Awareness Programme Annual ISACA Kampala Chapter Information Security Workshop Prof.
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014.
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
You Are Not Alone: Pooling Regional Resources to Enhance Information Security Training Kris Monroe, CISA, CISSP Information Security Officer Ithaca College.
Cybersecurity nexus (CSX)
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
OVERVIEW OF CYBER TERRORISM IN INDONESIA PRESENTED BY: SUPT. DRS. BOY RAFLI AMAR SPECIAL DETACHMENT 88 AT – INP ARF SEMINAR ON.
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
2 Ensuring safety and security 1.ENSURING SAFETY AND SECURITY Actions for achieving this goal: Attending to emergencies and safeguarding critical crime.
ISSP Information Systems Security Partners | GiTi: 2015 Transforming IT Security Strategy: shifting focus from technologies to business process Artem Mykhailov.
Fundamental Digital Electronics
A Unique Challenge INTERNATIONAL ORGANIZED CRIME.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
By. Andrew Largent COSC-480. Upstream Intelligence (UI) is data about IP’s, domains and Autonomous System Numbers (ASN) acting or representing the presence.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
Principles Identified - UK DfT -
ANSI – ESOs meeting Washington February 2017
General information Targeted topics
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
3 Do you monitor for unauthorized intrusion activity?
Johannesburg, South Africa
Lessons from the Field: 7 Steps to Proactive Cybersecurity
Cybersecurity, competence and preparedness
Information Technology Sector
Cyber Security: State of the Nation
The Internal Audit Role in assessing Cybersecurity
The Police: Organization, Role, and Function
Board Concerns About Cyber Security
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
General information Organisation logo Targeted topics
CSI Survey 2007 Tiffany Gorman
THE POWER OF INFORMATION SHARING AMONG BANKING INSTITUTIONS
I have many checklists: how do I get started with cyber security?
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Andy Hall – Cyber & Tech INSURANCE Specialist
General information Targeted topics
Michael Nawrocki, Vice President of Technology and Solutions ATIS
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Cybersecurity: The State Regulators’ Perspective
Cyber-security and IEC International Standards
Cybersecurity: the consumer perspective
Csilla Farkas Cybersecurity Csilla Farkas
Cybersecurity in Elections Infrastructure: Risks and Mitigations
Securing the Threats of Tomorrow, Today.
PGE Chris Nolke, Director of Cybersecurity
Cyber Security Culture
Cybersecurity ATD technical
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Strategic threat assessment
National Information Assurance (NIA) Policy
LO1 - Know about aspects of cyber security
Emerging Management Issues in E-Government Janak Basnet Janak Dangi Msc ISE 3 rd Semester.
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Presentation transcript:

Cybersecurity Threats and Opportunities in Latin America Andre Salgado, CISA CISSP CRISC

In a cyber-world

Could we have considered this?

How about this?

Car maintenance beyond oil and tire

Know your adversaries

Some cases

An attack will happen. It is only a matter of when. Even if an attacker fails 99 times out of 100, it is a success. Likewise, an organization that fails to protect itself 1 time out of 100 is considered a failure in regards to cyber security. Prevention is key in order to make your company a less attractive target. Detection and response are key elements for any cybersecurity plan.

The Risks. The Risks Lack of leadership and technical talent Significant share of Latin America population is not aware of cybersecurity risks Most countries are fighting digital crime with “analogic” laws Outdated / unlicensed software Organizations have not been successful at detecting attacks Existence of Shadow IT in many organizations. Process outsourcing solely focused on cost reduction.

The Threats. Ransomware Destructive Malware Electronic fraud Data Leakage Electronic fraud Business partner connections

The Opportunities An intelligence-led approach is fundamental Collaboration is an effective way to gather intelligence Latin America governments must start discussing cyber security with the general population Initial focus should be on privacy Discussion should evolve towards cyber-crime laws and regulations Law enforcement agents must be trained to operate in this new context Cyber crime has no boundaries. Nations must cooperate to legislate and fight it accordingly

Thank you! Slide 173: Thank you! Contact information: www.linkedin.com/in/andrealsalgado andre.salgado@citi.com