Emerging Challenges to our Privacy and Data Security: What s Next You Ask?
|
|
|
- Blake Powers
- 10 years ago
- Views:
Transcription
1 Emerging Challenges to our Privacy and Data Security: What s Next You Ask? Professor William Butler Director, Critical Infrastructures and Cyber Protection Center (CICPC) [email protected]
2 Data Breaches Congress focuses on U.S. Investigation Services, a contractor that conducted security-clearance background checks, and whose computers were breached in August, exposing data on 25,000 federal employees. ebay has filed a motion to dismiss a class action lawsuit filed against the company in July following a breach earlier this year. Find out why the company says the lawsuit has no merit. Shellshock flaws A $500 million class action lawsuit against Home Depot has been filed in Canada following the disclosure by the retailer that 56 million payment cards were exposed in a data breach. Backoff point-ofsale malware The ice cream and fast food chain Dairy Queen has confirmed that Backoff point-ofsale malware was used in a payment card breach that affected 395 of its 4,500 franchised U.S. locations. Find out how many cards were affected. The restaurant chain Jimmy John's has confirmed a payment card data breach affecting about 216 of its locations in 40 states. The breach stems from the compromise of a "point-ofsale vendor." Source:
3 Norse DarkMatter Platform The DarkMatter platform is a globally distributed "distant early warning" network of millions of dark sensors, honeypots, crawlers, and agents that deliver unique visibility into the Internet and the darknets, where bad actors operate. Processing hundreds of terabytes daily, Norse DarkMatter computes over 1,500 distinct risk factors for millions of IP addresses every day. The platform continuously analyzes traffic to identify the compromised hosts, malicious botnets, anonymous proxies and sources of attack that other solutions miss Click Link for website. Source:
4 Cell Phone Interceptors Law enforcement and Criminals operate these illegal cell devices ESD Crypto Phone detects illegal cell towers Click this link for the video Source: /phony-cell-towers-hacking-phones-in-westernwa/ /
5 The Snowden Effect FBI and USSS see problems Consumers seek more protections: iphone 6 and Android O/S improved encryption Two person integrity for data transfers Foreign Countries trust in U.S. IT Companies has been impacted ($$$ in lost sales contracts) More advanced encryption being developed in general for public use Forbes Magazine, Huffington Post., and the Economist
6 Annual Cyber Crime Studies FBI 2013 Internet Crime Report Source: Poneman 2014 Cost of Data Breach Study Source: cost-of-data-breach-global-analysis Verizon 2014 DATA BREACH INVESTIGATIONS REPORT Source:
7 Verizon 2014 DATA BREACH INVESTIGATIONS REPORT Types of data breaches by victim industry: Point of Sales (PoS) intrusions are on the rise in retail and accommodation s industries!
8 Poneman 2014 Cost of Data Breach Study Root cause of data breaches and costs: 42 % Malicious or Criminal $ per capita cost 30 % Human $ per capita cost 29 % System $ per capita cost Source:
9 FBI 2013 Internet Crime Report Complaint Distribution Internet Crime Prevention Tips Complaints by State: Virginia number 8! Source:
10 How Bad Is It?: More Than Just Getting Credit Information Workers at computers for the California Independent System Operator Corp. in Folsom, California. An attack on the U.S. power grid could cause billions of dollars in damage, and thousands of deaths.
11 Malware Proliferation Malicious actors have created and used malware targeted to mobile devices since at least 2000.(1) EXAMPLE: Ikee B, the first iphone worm created with distinct financial motivation. Educational Response: Teach the effects of jaibreaking a phone Teach identification & eradication of botnets Stress not using default passwords (e.g. alpine for Secure Shell (SSH) operations. (1) U S CERT: Technical Information Paper-TIP Cyber Threats to Mobile Devices.
12 Is It a Business Decision? Kaspersky Lab's report found that in January the number of malicious Android apps out there topped the 10 million mark. Is this a business decision between ROI and the safety of the public? YES = Educational Implications: Need to weave into programs of study The principles of ethics vs. the bottom line Times of India. Feb. 2014
13 Is It Lack of Knowledge? Apple rushed the release of ios on Friday with a patch for a shockingly overlooked SSL encryption issue that leaves iphone, ipad and Mac computer users open to a man-in-the-middle (MITM) attack. Is this because of a lack of knowledge in secure coding? YES = Educational Implications: Need to weave into programs of study The principles of secure coding Carnegie Melon curriculum ZD Net, Feb. 20, 2014
14 Educational Response: Study & Research Trends Around 27% of the detected apps were classified as high risk apps The remaining 73% were classified as malware. Trend Micro: 2013 Mobile Year-end review, 2013
15 It s a Brand New Ball Game Firms can no longer think in terms of the react and defend capabilities developed by on-premise, signature-based technologies. They must instead adopt a more complete security life cycle approach with an emphasis on the ability to predict and prevent. This requires clearly understanding the threat and potential impact of a security event before it impacts the organization through the use of behavioral, emulation and sandboxing technologies necessary to prevent infection and minimize risk. IDC White Paper. Shifting Risks and IT Complexities Create Demands for new Enterprise Security Strategies. IDC# Feb. 2014
16 Then There are the Niche Areas - I TRANSPORTATION RAIL Poland (2008): A teenage boy hacked into the City of Lodz tram system and used it like a giant train set. The boy studies the trams and tracks for a long time and then built a device that looked like a TV remote control and used it to maneuver the trams and the tracks. He had converted the television control into a device capable of controlling all the junctions on the line.(1) AUTO Demonstrating their Pentagon-funded work at the global "DefCon" hackers conference in Las Vegas in August, Charlie Miller and Chris Valasek showed global security experts in attendance how they could take control of a 2010 Toyota Prius and Ford Escape model using just a laptop. They were able to remotely take control of the cars' electronic smart steering, braking, displays, acceleration, engines, horns and lights. They could even make the fuel tanks show a full tank of gas when there wasn't. To top it all, they did all this using an old Nintendo handset. (2) (1) Keeping railways safe and secure in the digital era. Smart Rail World Feb. 18, 2014 (2) CNBC.
17 Niche Areas II MEDICAL Flaws were found with the programming of the wireless transmitters inside the pacemakers and ICDs. Those transmitters monitor for irregularities in heartbeats and deliver life-saving corrective jolts of electricity on a regular basis to correct poor heart function. Unfortunately, the devices are easily tricked by a special command to give up their serial numbers and other info needed to authenticate into them and control those transmitters; and, worse, they often have backdoors that allow the wireless signals to be hijacked even without the credentials. So, either way, a hacker with a commanding laptop can take control and deliver a deadly shock, from up to 50 feet away the range of many of these vulnerable devices.
18 Your Not In Kansas any More Current equipment in the labs is critical. Internships and COOPs working with latest technology is critical Subject Matter Experts On Campus are critical Participation on advisory boards is critical.
19 Cybersecurity is a Hands On Learning Experience: Not just theory if the system is broken fix it & harden it- Capitol College: CYBER BATTLE LAB
20 Beyond Mobile Computing What will the cybersecurity workforce of the future look like? Globally, the cyber security workforce will grow by 2.0 million new workers between now and 2017 A diverse set of skills beyond technical skills in information security are needed to be successful: Business acumen Communication Skills Legal Knowledge Able to handle asymmetrical threat environment. The age of The Security analyst Booz, Allen, Hamilton. Critical Times Demand Critical Skills. A Whitepaper derived from ISC2 Global Information Security Workforce Study. 2013
21 Job Market Intelligence: Report on the Growth of Cybersecurity Jobs: Burning Glass Education Certifications Experience The greater Washington D.C. area has thousands of unfilled cyber security jobs! #2 Virginia #6 Maryland Virginia Maryland #2 Virginia Source:
22 Cyber Security must be multidisciplinary Post survey student comments: I never included security into my mission planning Satellite data should be protected from acquisition to storage I am now looking for phishing s at work because of the threat Using the STK software opened my eyes to how much fun and complicated these missions can be to plan More Questions to answer: How do sensors work with drones? How do we secure the video feed? Last spring semester Capitol ran a hybrid course matching 6 Astronautical Engineering (AE) with 6 Computer Science (CS) and Information Assurance (IA) students. Students were taught by AE and IA Professors. Students learned to use STK, the systems engineering approach, system lifecycle and network modeling tools and cyber security principles. Students formed 2 teams to plan a secure satellite mission (AE lead). The CS/IA student designed the ground segment and networks; AE student designed the space segment. They switched roles during the presentation (surprise). Next Spring semester hybrid courses will again pair AE/IA students to study integrating sensors with drones and protecting that data. EE/IA students will study integrating sensors with Raspberry pies and Adreno boards as payloads for satellites and drone missions. What Big data analysis tools are available?
23 What Makes Capitol Unique? Full Spectrum Study: BS, MS, DSc National Recognition DHS/NSA Designated Nat l Center of Academic Excellence in Information Assurance Education Mapped to six national IA training standards at advanced levels - 1 of 3 academic institutions in U.S. with this distinction The government & government-related companies are the #1 employer of Capitol alumni
24 Contact info Professor William Butler Director, Critical Infrastructures and Cyber Protection Center (CICPC)
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Cyber-Security Risk in the Global Organization:
Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Building the Next Generation of Computer Security Professionals. Chris Simpson
Building the Next Generation of Computer Security Professionals Chris Simpson Overview Why teach computer security to high school students Deciding what to teach What I taught Community Support Lessons
The Information Security Problem
Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee
Web 2.0 and Data Protection Paul Tsang Security Consultant McAfee Criminal Motivators For Profit Targeted Attacks Cyber Warfare (Credit Cards, PII, Criminal Infrastructure) (Nation-State Secrets, Trade
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks Alex Leemon, Sr. Manager 1 The New Cyber Battleground: Inside Your Network Over 90% of organizations have been breached
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Enterprise Mobile Threat Report
Enterprise Mobile Threat Report The State of ios and Android Security Threats to Enterprise Mobility I. Introduction This report examines enterprise security threats for ios and Android. While Android
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Protecting Android Mobile Devices from Known Threats
Protecting Android Mobile Devices from Known Threats Android OS A Popular Target for Hacks White Paper Zero Trust Mobile Security An Introduction to the BETTER Mobile Security Platform BETTER at work.
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS
CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon ([email protected]) EY Professor of Managerial Accounting and Information Assurance Affiliate
The Trend Toward Convergence of Physical and Logical (Cyber) Security
The Trend Toward Convergence of Physical and Logical (Cyber) Security Fred S. Roberts Director Command, Control, and Interoperability Center for Advanced Data Analysis (CCICADA)* Rutgers University *A
Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016
Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious
Brief self-introduction
Brief self-introduction Name: Yaokai Feng Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan Bachelor and Master degrees Tianjin University, China,
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
Can We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals
CHECK POINT Mobile Security Revolutionized [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 1 Rapidly Expanding Mobile Threats MOBILE THREATS are ESCALATING
Surviving the Era of Hack Attacks Cyber Security on a Global Scale
Surviving the Era of Hack Attacks Cyber Security on a Global Scale Dr. Adriana Sanford ASU Lincoln Professor of Global Corporate Compliance and Ethics Clinical Associate Professor of Law and Ethics This
Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security
Next-Generation Penetration Testing Benjamin Mossé, MD, Mossé Security About Me Managing Director of Mossé Security Creator of an Mossé Cyber Security Institute - in Melbourne +30,000 machines compromised
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
Top 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Evolution Of Cyber Threats & Defense Approaches
Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution
OVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
Teaching Information Security to Engineering Managers
Teaching Information Security to Engineering Managers Julie Ryan Assistant Professor The George Washington University Washington, DC http://www.seas.gwu.edu/~infosec/ 1 Why Bother? Lots of CS and EE programs
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Unified Security Management and Open Threat Exchange
13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the
UNM Information Assurance Scholarship for Service (SFS) Program
UNM Information Assurance Scholarship for Service (SFS) Program What is Information Assurance? Committee on National Security Systems (CNSS) defines information assurance (IA): Measures that protect and
Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013
Encryption and Tokenization: Protecting Customer Data Your Payments Universally Amplified Tia D. Ilori Sue Zloth September 18, 2013 Agenda Global Threat Landscape Real Cost of a Data Breach Evolution of
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
An New Approach to Security. Chris Ellis McAfee Senior System Engineer [email protected]
An New Approach to Security Chris Ellis McAfee Senior System Engineer [email protected] Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Security Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
The Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
One Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
IT Security Risks & Trends
IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health
Advanced Persistent Threats
Advanced Persistent Threats Craig Harwood Channel Manager SADC and Indian Ocean Islands 1 Agenda Introduction Today s Threat landscape What is an Advance persistent Threat How are these crimes perpetrated
