Upload
sogetilabs
View
40
Download
2
Embed Size (px)
Citation preview
Today’s Menu
Few words on backgroundAnd of course… a disclaimer!
Moving from IT Security to CybersecurityIs it just a “wording” change?
The Cybersecurity Kill ChainWhat’s this?
So… Threat or Myth?Obvious answer?
If threats there are…what are the scariest ones? Trends / Tendencies?!?!... Not really!
To counter-attack you have to think like…You already know the answer! Or maybe…
Background
And Disclaimer!
I express my own opinion as a Cybersecurity expert!
&My legal department did not review my slides!
&Yes, I know “a bit” about Cybersecurity!
butI learn everyday so please… give me inputs!
From IT Security to…
Cybersecurity
What was IT Security
Cybersecurity = Paradigm shift
Cybersecurity Kill ChainDefinition
Hackers’ way!
Exploitation“Hacking”
Post exploitation & maintaining access
Reconnaissance ScanningCovering
tracks
Cyber kill chain
Exploitation“Hacking”
Post exploitation & maintaining access
Reconnaissance ScanningCovering
tracks
Cyber kill chain
Evaluate TreatIdentify AnalyzeMonitor and
communicate
IT & Information Risks chain
The Kill Chain - 101
So… Threat or Myth?
I know, it’s an obvious one!
“About 110 million Americans — equivalent to about 50% of U.S. adults — have had their personal data exposed in some form in the past year”
Tim Pawlenty, president of the Financial Services Roundtable and the former governor of Minnesota.
The Truth is out there!But it’s bigger than you think…
APT Silent but…
EVIL
Future targets or just Hackers’ dreams?
Counter-attack?!?!
Develop new approaches!
Fear as a toolis going blunt rapidly
Think once, act manyCreate practices inherently more
secure
Have your people win the gameEducation,
gamification, out-of-the-
box creativity