22

The Cybersecurity Kill Chan - myth or threat

Embed Size (px)

Citation preview

Today’s Menu

Few words on backgroundAnd of course… a disclaimer!

Moving from IT Security to CybersecurityIs it just a “wording” change?

The Cybersecurity Kill ChainWhat’s this?

So… Threat or Myth?Obvious answer?

If threats there are…what are the scariest ones? Trends / Tendencies?!?!... Not really!

To counter-attack you have to think like…You already know the answer! Or maybe…

Background

And Disclaimer!

I express my own opinion as a Cybersecurity expert!

&My legal department did not review my slides!

&Yes, I know “a bit” about Cybersecurity!

butI learn everyday so please… give me inputs!

From IT Security to…

Cybersecurity

What was IT Security

Cybersecurity = Paradigm shift

Cybersecurity Kill ChainDefinition

Hackers’ way!

Exploitation“Hacking”

Post exploitation & maintaining access

Reconnaissance ScanningCovering

tracks

Cyber kill chain

Exploitation“Hacking”

Post exploitation & maintaining access

Reconnaissance ScanningCovering

tracks

Cyber kill chain

Evaluate TreatIdentify AnalyzeMonitor and

communicate

IT & Information Risks chain

The Kill Chain - 101

So… Threat or Myth?

I know, it’s an obvious one!

“About 110 million Americans — equivalent to about 50% of U.S. adults — have had their personal data exposed in some form in the past year”

Tim Pawlenty, president of the Financial Services Roundtable and the former governor of Minnesota.

The Truth is out there!But it’s bigger than you think…

APT Silent but…

EVIL

Future targets or just Hackers’ dreams?

Counter-attack?!?!

Develop new approaches!

Fear as a toolis going blunt rapidly

Think once, act manyCreate practices inherently more

secure

Have your people win the gameEducation,

gamification, out-of-the-

box creativity