“When out of ammo, Reload” CYBERSECURITY CHALLENGES AND THREATS Ahmed Husain Managing Director.

Slides:



Advertisements
Similar presentations
IGF Hyderabad 2008 Dimensions of Cyber Security & Cyber Crime Michael Lewis, Carnegie Mellon University & Deputy Director, Q-CERT.
Advertisements

IMPROVING THE INTERNATIONAL COMPARABILITY OF STATISTICS PRODUCED BY CSIRTs Developing Cybersecurity Risk Indicators panel 26 th Annual FIRST Conference.
Security and Protection of Information 2009 BUILDING CIRC CAPABILITIES IN THE CZECH ARMY 6/5 2009, BRNO IDET 2009 LtCol. Roman SEKANINA, Cpt. Milan DANĚK.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
© 2003 Carnegie Mellon University slide 1 Building CSIRT Capabilities and the State of the Practice Georgia Killcrece CSIRT Development Team CERT ® Training.
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
You’ve been hacked, now what? By Wild Wild West. Agenda Overview What we did do Alternative Solutions Best solution: CSIRT.
Remarks: Roadmapping and Hard Problems Sally E. Howe, Ph.D. Associate Director National Coordination Office for Networking and Information Technology Research.
Joel Maloff Phone.com February, 2012.
APCERT : APNIC Meeting 2014’ International Collaboration for Regional Cybersecurity Risk Reduction - APCERT Collaboration with Stakeholders Yurie Ito Chair,
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Resources to Support Training Programs for CSIRTs.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Experience to create and manage Computer Security Incident Response Team in Latvia Egils Stūrmanis DDIRV (VITA CSIRT) manager State Joint Stock Company.
computer
UKI ROC/GridPP/EGEE Security Mingchao Ma Oxford 22 October 2008.
Cyber-security policy to encourage CSIRTs activities Yasuhiro KITAURA Ministry of Economy, Trade and Industry, JAPAN.
Enterprise Cybersecurity Strategy
Adding SubtractingMultiplyingDividingMiscellaneous.
The First Step in Cybersecurity. Past Threats and Incident of Cybersecurity 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Chronic Workload Problems in Computer Security Incident Response Teams Johannes Wiik, Jose J. Gonzalez University of Agder, Norway Pål I. Davidsen University.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Sofia, 09 June Sofia, 09 June 2010 MINISTRY OF TRANSPORT, INFORMATION TECHNOLOGY AND COMMUNICATIONS Executive Agency “Electronic Communication Networks.
SSO Challenge s Implementing Identity Management: ADFS and Azure AD Hugh Valentine Head of Business Development Cloud Point Steve Rastall Managing Director.
CISC 849 : Applications in Fintech Vaishnavi Gandra Dept of Computer & Information Sciences University of Delaware Extracting Cybersecurity Related Linked.
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
Copyright © 2014 INTEC Inc. All rights reserved. Introducing JPCERT/CC’s activity for securing IPv6 gears draft-jpcert- ipv6vullnerability-check-01 INTEC,
Handling Alerts & Advisories By Spilker Wiredu, Analyst, CERT-GH CERT-GH Information Sharing Workshop CERT-GH Information Sharing Workshop 24 May 2016.
Issue Date: Revision: APNIC Outreach Activities in Cyber Security Adli Wahid Security Specialist
ExoGENI GENI Going Forward Tasks Ilya Baldin RENCI Director for Network Research and Infrastructure.
April 19 th, 2016 Governors Homeland Security and All-Hazards Cyber Security Sub-Committee.
Hurricanes, Earthquakes, and Threat Intelligence
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Security Testing Methods
Governors Homeland Security and All-Hazards Cyber Security Sub-Committee April 19th, 2016.
Responding to Intrusions
LCG/EGEE Incident Response Planning
Preserving a balanced CSIRT constituency
Your Company’s cyber security assessment Hands-on session using CyberWISER Light [Anže Žitnik, XLAB, WISER Team] #CyberSecPractice.
The Forum of Incident Response and Security Teams (FIRST)
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
Cyber Security coordination in Europe CERT-EU’s perspective
Securing Cisco Networks with Threat Detection and Analysis practice-questions.html.
The Forum of Incident Response and Security Teams (FIRST)
Team 1: 32 responses Team 2: 55 responses Team 3: 29 responses
CIS 359 Innovative Education-- snaptutorial.com
CIS 359 Possible Is Everything/snaptutorial.com
CIS 359 Education for Service-- snaptutorial.com.
SEC 103 Enthusiastic Studysnaptutorial.com
CIS 359 Teaching Effectively-- snaptutorial.com
Role of CERT in fighting against cyber crime
How to approach a top-down call topic in Horizon 2020?
We want to hear from you! chime16.org/evals
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
گروه پاسخگویی به فوریتهای رایانه ای Computer Emergency Response Team (CERT) سیدمحمدرضا رشتی اسفندماه
By Arisara Sangsopapun
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Unit 2: Fundamentals of Computer Systems
STORE MANAGER RESPONSIBILITIES.
Computer Emergency Response Team
Cyber Security Accelerator for trusted SMEs IT Ecosystems
Adding with 9’s.
Adding with 10’s.
Moderator Mohamed M. K. Elhaj
Adding ____ + 10.
The Forum of Incident Response and Security Teams (FIRST)
To Pay or Not to Pay? Intelligent Ransomware Response
Computer System Security
Calgary Cybersecurity Services
Presentation transcript:

“When out of ammo, Reload” CYBERSECURITY CHALLENGES AND THREATS Ahmed Husain Managing Director

 Attack length  Vectors  Source

 Why has a major fundamental change in attack characteristics left IT organizations unprepared?

 Computer Security Incident Response Team (CSIRT)  is responsible for receiving, reviewing, and responding to computer security incident reports and activity.  Their services are usually performed for a defined constituency  A CSIRT can be a formalized team or an ad hoc team.

 Keep an eye on how your data moves, how it is stored, and how it is destroyed.