Cyber security the cybersecurity kill chan - myth or threat
-
Upload
sogetilabs -
Category
Documents
-
view
44 -
download
2
Transcript of Cyber security the cybersecurity kill chan - myth or threat
![Page 1: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/1.jpg)
![Page 2: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/2.jpg)
Today’s Menu
Few words on backgroundAnd of course… a disclaimer!
Moving from IT Security to CybersecurityIs it just a “wording” change?
The Cybersecurity Kill ChainWhat’s this?
So… Threat or Myth?Obvious answer?
If threats there are…what are the scariest ones? Trends / Tendencies?!?!... Not really!
To counter-attack you have to think like…You already know the answer! Or maybe…
![Page 3: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/3.jpg)
Background
And Disclaimer!
![Page 4: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/4.jpg)
I express my own opinion as a Cybersecurity expert!
&My legal department did not review my slides!
&Yes, I know “a bit” about Cybersecurity!
butI learn everyday so please… give me inputs!
![Page 5: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/5.jpg)
From IT Security to…
Cybersecurity
![Page 6: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/6.jpg)
What was IT Security
![Page 7: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/7.jpg)
Cybersecurity = Paradigm shift
![Page 8: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/8.jpg)
Cybersecurity Kill ChainDefinition
Hackers’ way!
![Page 9: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/9.jpg)
Exploitation“Hacking”
Post exploitation & maintaining access
Reconnaissance ScanningCovering
tracks
Cyber kill chain
![Page 10: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/10.jpg)
Exploitation“Hacking”
Post exploitation & maintaining access
Reconnaissance ScanningCovering
tracks
Cyber kill chain
Evaluate TreatIdentify AnalyzeMonitor and
communicate
IT & Information Risks chain
![Page 11: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/11.jpg)
The Kill Chain - 101
![Page 12: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/12.jpg)
So… Threat or Myth?
I know, it’s an obvious one!
![Page 13: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/13.jpg)
![Page 14: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/14.jpg)
“About 110 million Americans — equivalent to about 50% of U.S. adults — have had their personal data exposed in some form in the past year”
Tim Pawlenty, president of the Financial Services Roundtable and the former governor of Minnesota.
![Page 15: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/15.jpg)
The Truth is out there!But it’s bigger than you think…
![Page 16: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/16.jpg)
APT Silent but…
EVIL
![Page 17: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/17.jpg)
Future targets or just Hackers’ dreams?
![Page 18: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/18.jpg)
Counter-attack?!?!
Develop new approaches!
![Page 19: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/19.jpg)
Fear as a toolis going blunt rapidly
Think once, act manyCreate practices inherently more
secure
![Page 20: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/20.jpg)
Have your people win the gameEducation,
gamification, out-of-the-
box creativity
![Page 21: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/21.jpg)
![Page 22: Cyber security the cybersecurity kill chan - myth or threat](https://reader033.fdocuments.net/reader033/viewer/2022042716/55c36339bb61eb94498b474d/html5/thumbnails/22.jpg)