1 FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida
2 Overview Cyber Threats FBI Mission FBI Response
3 Terrorism remains the FBI s top priority. But in the not too distant future, we anticipate that the cyber threat will pose the number one threat to our country.
4 Cyber Threat Verizon 2012 Data Breach Investigations Report - Exploitable weakness v. targeted attack Key questions compliance officers should ask about cyber security practices in their organizations: 1. How do we track the information leaving our company and its destination? 2. How do we know who is really logging into our networks and from where? 3. How do we control the software running on our various devices? 4. How can we limit information that is voluntarily made available to a cyber adversary?
5 Cyber Threat SEC Guidance10/13/11 - Costs of successful cyber attacks: - Remediation Costs - Increased cyber security protection costs - Lost revenues - Litigation - Reputational damage - Potential duty to disclose cyber security risks and cyber incidents - Evaluate cyber security risks - account for prior cyber incidents severity/frequency State Data Breach Laws
6 FBI Core Values Rigorous Obedience to the Constitution Respect Compassion Fairness Integrity Accountability Leadership
7 Cyber Division Cyber Division Strategy Identify and disrupt the most significant individuals, groups and foreign powers conducting computer intrusions, the dissemination of malicious code, or other nefarious computer supported network operations. Identify and disrupt online predators or groups that sexually exploit and endanger children for personal or financial gain. Identify and disrupt operations targeting U.S. intellectual property. Identify and disrupt the most significant perpetrators of Internet fraud..
9 Cyber Division Cyber Partnerships and Alliances NCIJTF Cyber Crime Task Forces InfraGard Internet Crime Complaint Center (IC3) Cyber Initiative and Resource Fusion Unit (CIRFU)
10 Cyber Division InfraGard Member represent businesses, academic institutions, state and local law enforcement agencies. Managed locally by volunteer members across 86 national chapters who meet regularly with members promote dialogue with the FBI Member chapters are geographically linked to local FBI Field Offices and are supported directly by FBI SA InfraGard Coordinators, as well as nationally by FBI HQ Public Private Alliance Unit and the InfraGard National Members Alliance. Better understand emerging trends Open to US citizens and legal resident aliens 18 years and older from the private sector. All applications undergo an FBI vetting process. 50,000+ members individual are members, not the organization to which they belong. Web portal:
12 Criminal Threats to Internet Users Cyber Extortion Individuals threaten to use Social Networking power Extortion-based DDoS attacks Scareware/Fraudulent Antivirus Software Phishing Ongoing case with major bank, 350 subjects identified, over 50 in a cooperating foreign country 2000 phishing transactions totaling $4 million Botnets Enable other criminal activity, Spam, distribution of additional Malware (Keyloggers, DNSChanger etc.)
13 One type of Cyber Extortion a. These things, unless you honor the below claim, WILL HAPPEN on March 8, b. As you have denied my claim I can only respond in this way. You no longer have a choice in the matter, unless of course you want me to continue with this outlined plan. I have nothing to lose, you have everything to lose. c. My demand is now for $198, This amount is NOT negotiable, you had your chance to make me an offer, now I call the shots. d. I have 6 MILLION s going out to couples with children age 25-40, this campaign is ordered and paid for. 2 million go out on the 8th and every two days 2 million more for three weeks rotating the list. Of course it is spam, I hired a spam service, I could care less, The damage [sic] will be done. e. I am a huge social networker, and I am highly experienced. 200,000 people will be directly contacted by me through social networks, slamming your integrity and directing them to this website within days. f. I think you get the idea, I am going to drag your company name and reputation, through the muddiest waters imaginable. This will cost you millions in lost revenues, trust and credibility not to mention the advertising you will be buying to counter mine. Sad thing is it s almost free for me! g. The process is in motion and will be released on March 8th, If you delay and the site goes live, The price will then be $3,000,
14 DDoS Extortions Recent trend targeting online product retailers Company receives an extortion threat via , online chat or their telephone number Demand to pay $,$$$ within five minutes or your website will be shut down Many go unreported Victims appear to be targets of opportunity These tend to roll into Botnet investigations
15 Scareware also a form of Cyber Extortion
16 Criminal Threats to Internet Users Cyber Extortion Individuals threaten to use Social Networking power Extortion-based DDoS attacks Scareware/Fraudulent Antivirus Software Phishing Comes in different flavors Botnets Enable other criminal activity, Spam, distribution of additional Malware (Keyloggers, DNSChanger etc.)
17 Example of Phishing s Sent to Customers of U.S.-based Bank
18 Criminal Threats to Internet Users Cyber Extortion Recent trend in Health Care Services Industry Threatening to use Social Networking power Scareware/Fraudulent Antivirus Software Phishing Ongoing case with major U.S. banks, 350 subjects identified, over 50 in a cooperating foreign country 2000 phishing transactions totaling $4 million Botnets Enable other criminal activity, Spam, distribution of additional Malware (Keyloggers, DNSChanger etc.)
19 Coreflood Theft of private personal information from innocent users, including users on corporate computer networks Actions taken to mitigate the threat posed by Coreflood were the first of their kind in the United States DOJ/FBI working with Internet Service providers around the country
20 Example of Pervasive Malware Keylogger Distributed via spam , scareware or video codecs using social engineering techniques Records all keystrokes of victim Captures usernames, passwords, credit card numbers that victims type into webpages Information is stored in a hidden text file, compressed and retrieved by hacker
21 Example of Non-Pervasive Malware DNS Changer Also can be distributed via spam , scareware or social engineering techniques Modifies victims trusted Domain Name System (DNS) settings Victim computers then unwittingly get their domain name resolution from a DNS server controlled by the bad guy Bad guy then directs victim computers to his servers running lookalike web pages (i.e., a counterfeit online banking webpage) Victim unknowingly enters his banking credentials to what he thinks is the real web page
22 Criminal Threats to Internet Users Automated Clearing House (ACH) Transaction Fraud Anyone with authority to pay, transfer funds, manage, control, or effect banking activity can be a victim
23 Financial Services Intrusion Scope of the Scheme 15,730 attempted transactions worth $10.2M 14,544 successful transactions worth $9.7M $9.4M (97%) was withdrawn on Nov ,136 ATM terminals were accessed in over 28 countries
24 Cyber Terrorism No full-scale cyber attacks. DDoS Defacements Growing presence of terrorist organizations on the internet. Internet being used not to just recruit or radicalize, but to incite. Growing use of social networking sites to collaborate and promote violence.
25 Counterintelligence and Economic Espionage Espionage used to be spy vs. spy. Today our adversaries can sit on the other side of the globe and have access to an entire network at their fingertips. Who are they? Nation-State Actors Mercenaries for Hire Rogue Hackers Transnational Criminal Syndicates
26 Counterintelligence and Economic Espionage What are they after? Technology Intelligence (Policy-maker decisions) Intellectual Property Military Weapons Military Strategy They have everything to gain; we have a great deal to lose.
27 Primary Intrusion Vectors The exploitation of Trust The trusted inbound . The publicly available trusted web site of appropriate business interest. The download of trusted code from a trusted and authorized vendor. The trusted outward facing server. The necessary trust of the internal network The connections with trusted business partners.
28 FBI RESPONSE 56 Field Offices with Cyber Squads. 75 FBI Legal Attaché Offices and sub-offices around the world. Cyber Trained Agents embedded with foreign police agencies.
29 FBI RESPONSE National Cyber Investigative Joint Task Force Cyber Action Team Threat Focus Cells that are focusing on key threats and trends. These groups consist of agents, officers, and analysts from different agencies. Financial TFC, ICS TFC, Romanian TFC, Botnet TFC, Forums TFC
30 Threat Focus Cells FBI-led government-level working groups targeting high-threat issues, with a view towards the following: Identify the Infrastructure Understand the mechanics behind the Cyber threat Victim Profiling Assess how and why specific victims are targeted Subject Identification Identify malicious actors, methods, criminal histories Consumer Identification Malicious actors may be subcontractors Operational Development Mitigation strategies
31 FBI RESPONSE What the FBI won t do Take over your systems. Repair your systems. Share proprietary information with competitors. Provide investigation-related information to the media or shareholders.
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM COMMITTEE ON JUDICIARY UNITED STATES SENATE ENTITLED:
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON
http://www.fbi.gov/news/testimony/cyber-security-threats-to-the-financial-sector Gordon M. Snow Assistant Director, Cyber Division Federal Bureau of Investigation B Statement before the House Financial
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
FBI: Taking down Botnets - Testimony Joseph Demarest Assistant Director, Cyber Division Federal Bureau of Investigation Statement Before the Senate Judiciary Committee, Subcommittee on Crime and Terrorism
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Cyber Security Threat Briefing Special Agent Ryan R. Ormond FBI Detroit Cyber Task Force Cyber Threats Cyber is not a thing, it is a vector. Because we as Americans have connected our entire lives to the
STATEMENT OF GORDON M. SNOW ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOUSE FINANCIAL SERVICES COMMITTEE SUBCOMMITTEE ON FINANCIAL INSTITUTIONS AND CONSUMER CREDIT ENTITLED
STATEMENT OF ROBERT ANDERSON, JR. EXECUTIVE ASSISTANT DIRECTOR CRIMINAL, CYBER, RESPONSE, AND SERVICES BRANCH FEDERAL BUREAU OF INVESTIGATION DEPARTMENT OF JUSTICE BEFORE THE COMMITTEE ON HOMELAND SECURITY
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON BANKING, HOUSING, AND URBAN AFFAIRS UNITED STATES SENATE ENTITLED CYBERSECURITY:
NATIONAL CRIME PREVENTION COUNCIL What is Cybercrime? A crime committed or facilitated via the Internet is a cybercrime. Cybercrime is any criminal activity involving computers and networks. It can range
STATEMENT OF ROBERT S. MUELLER, III DIRECTOR OF THE FEDERAL BUREAU OF INVESTIGATION BEFORE THE UNITED STATES HOUSE OF REPRESENTATIVES COMMITTEE ON APPROPRIATIONS SUBCOMMITTEE ON COMMERCE, JUSTICE, SCIENCE
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Personal Identifiable Information current and previous addresses name/ssn credit info family info Medical Insurance info professional & personal relationships email address phone & fax # 1 Implications
UNCLASSIFIED//FOUO Current Threat to the U.S. from Cyber Espionage & Cyberterrorism Presented by SSA Elvis Chan FBI San Francisco Overall Classification: UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOUO
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India email@example.com Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Detection, analysis, and understanding of threat
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
FERPA: Data & Transport Security Best Practices April 2013 Mike Tassey Privacy Technical Assistance Center FERPA and Data Security Unlike HIPAA and other similar federal regulations, FERPA does not require
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Product Summary: The Infoblox Secure DNS Solution mitigates attacks on DNS servers by intelligently recognizing various attack types and dropping attack traffic while responding only to legitimate queries.
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS David Glockner, Managing Director strozfriedberg.com Overview The big picture: what does cybercrime look like today and how is it evolving? What
DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5500 companies in 26 countries around the world
Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state
Preventing Corporate Account Takeover Fraud Joe Potuzak Senior Vice President Payment Solutions Risk Manager Member FDIC 1 About Our Speaker Joe Potuzak is the Risk Manager for BB&T s Payment Solutions
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Author: Examining the Creation, Distribution, and Function
Statement for the Record Worldwide Cyber Threats House Permanent Select Committee on Intelligence James R. Clapper Director of National Intelligence September 10, 2015 STATEMENT FOR THE RECORD Worldwide
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : firstname.lastname@example.org
The Evolution of Data Breaches 2015 Data Privacy & Security Summit June 29, 2015 Mark Shelhart Incident Response & Forensics Retail Data Security recent victims The Largest Cyber Risks to your Organization
SAMPLE ASSESSMENT MATERIAL Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security Date Morning/Afternoon Time Allowed: 1 hour You must have: The Insert (clean copy case study)
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and
1. Nomination Form Information: Category: Title of Nomination Project Manager: Job Title: Agency: Department: Address: City: State: Information Security and Privacy Security 2.0: Next Generation Security
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Protecting Your Employees from Identity Theft Date: May 16, 2016 Presentation Outline Data breach Identity Theft Impact on public employers, employees Risk management considerations GALLAGHER BENEFIT SERVICES,
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
O B S I D I A N C Y B E R S E C U R I T Y O C C A S I O N A L P A P E R Working with the Federal Government on Cybersecurity Preparation is Key to Success December 5, 2013 Table of Contents CONSIDER THIS...
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
National Cybersecurity Awareness Campaign About Stop.Think.Connect. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department of Homeland Security with creating an ongoing
A WHITE PAPER SDX Technologies Today s Cybersecurity Technology: Is Your Business Getting Full Protection? 1 Today s Cybersecurity Technology EXECUTIVE SUMMARY Information technology has benefited virtually
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
CYBER SECURITY THREAT REPORT Q1 Moving Forward Published by UMC IT Security April 2015 0 U.S. computer networks and databases are under daily cyber-attack by nation states, international crime organizations,
Cyber Security Strategies for the Small Business Market Solutions for Small Business Reports are designed to demonstrate how new technologies enabled by cable providers help small business owners and managers
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL email@example.com DNW, BSNL 1 Agenda Importance of Network Security
Session 30 IT Security: Threats, Vulnerabilities and Countermeasures Phillip Loranger, DoED CISO Robert Ingwalson, FSA CISO New Cyber Security World New threats New tools and services to protect New organization
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional
How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges