CFA CyberConf A.C.Slashopt ltd Nikos Tsarouchas Constantinos - - PowerPoint PPT Presentation

cfa cyberconf
SMART_READER_LITE
LIVE PREVIEW

CFA CyberConf A.C.Slashopt ltd Nikos Tsarouchas Constantinos - - PowerPoint PPT Presentation

CFA CyberConf A.C.Slashopt ltd Nikos Tsarouchas Constantinos Gakopoulos Constantinos Gakopoulos Greece Kastoria 1974 Landed in Cyprus 1995 20 years in the scene of IT 10 Years messing up with security Love PlayStation


slide-1
SLIDE 1

CFA CyberConf

A.C.Slashopt ltd Nikos Tsarouchas – Constantinos Gakopoulos

slide-2
SLIDE 2

Constantinos Gakopoulos

 Greece Kastoria 1974  Landed in Cyprus 1995  20 years in the scene of IT  10 Years messing up with security  Love PlayStation  In Love with Zelda

slide-3
SLIDE 3

Nikos Tsarouchas

 Thessaloniki1973  In Cyprus since 2011  HP since 2008  More than 20 years in the scene of IT  Love Rum

slide-4
SLIDE 4
slide-5
SLIDE 5

Do You Feel Secure?

  • What Is Security?
  • What is IT Security
  • What is Cyber Threat?
slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8
slide-9
SLIDE 9
slide-10
SLIDE 10
slide-11
SLIDE 11
slide-12
SLIDE 12
slide-13
SLIDE 13
slide-14
SLIDE 14
slide-15
SLIDE 15
slide-16
SLIDE 16
slide-17
SLIDE 17

Do You Feel Secure?

  • What Is Security?
  • What is IT Security
  • What is Cyber Threat?
slide-18
SLIDE 18
slide-19
SLIDE 19

Do You Feel Secure?

  • What Is Security?
  • What is IT Security
  • What is Cyber Threat?
slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23
slide-24
SLIDE 24
slide-25
SLIDE 25
slide-26
SLIDE 26

I m under Attack

slide-27
SLIDE 27

I m under Attack

  • A technical a non technical attack
  • What is a virus?
  • What is a Phishing attack?
  • What is Ransomware?
slide-28
SLIDE 28

Non Technical Attacks

Social Engineering Dumpster Diving Phishing

slide-29
SLIDE 29
slide-30
SLIDE 30

Technical Attacks

DDOS – DOS Attack Virus, Trojan, Worms

slide-31
SLIDE 31

Ransomware/ Locky/Cerber

Ransomware is a computer malware that installs covertly on a victim's device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid. From Wikipedia, the free encyclopedia

slide-32
SLIDE 32
slide-33
SLIDE 33

Virus / Mallware

Malware, short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising Malware may be stealthy, intended to steal information or spy on computer users for an extended period without their knowledge. From Wikipedia, the free encyclopedia

slide-34
SLIDE 34

Phishing

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website, the look and feel of which are almost identical to the legitimate one. Communications purporting to be from social web sites, auction sites, banks, online payment processors or IT administrators are often used to lure victims. Phishing emails may contain links to websites that are infected with malware.

slide-35
SLIDE 35
slide-36
SLIDE 36

Major breaches in 2016

slide-37
SLIDE 37

“ ”

As a kid, I had this great idea to be secure. I could build a big titanium room that would not be accessible from the outside. Then again, I thought…this will only give the intruder infinite time to find a myriad ways to find a way in.

Andreas Papamichael. Co-Founder A.C.Slashopt ltd

slide-38
SLIDE 38

Statistics

BlackHat Conf 2016 BlackHat Conf 2016

slide-39
SLIDE 39
slide-40
SLIDE 40
slide-41
SLIDE 41
slide-42
SLIDE 42
slide-43
SLIDE 43
slide-44
SLIDE 44

Microsoft phishing scam

slide-45
SLIDE 45

…The evil Link

slide-46
SLIDE 46
slide-47
SLIDE 47

Vulnerabilities On our IT Environment

  • Internet itself
  • If we communicate with other people, there’s a hole
  • BYOD
  • The a-virus myth
  • BOX, Drobox, OneDrive, Google Drive, iCloud
  • Whatever the IT policies, users are not aware of the danger
  • Doing it from the inside
slide-48
SLIDE 48

Why Do Businesses Fail To Protect Themselves And Their Customer’s Data

They don’t believe there is an actual danger They think they are already secure I have a friend…I know someone….My best man told me…

THIS WILL NEVER HAPPEN TO ME

slide-49
SLIDE 49
  • Investment. Choose Wisely
slide-50
SLIDE 50

IT Department Vs Management Dep

IT Department

 New Technologies  Upgrades. OS – H/W  Data integrity – Security  IT Budged for this year  Training for IT  New Software cost  DRS  Cloud

Management

 Cost of the investment  But it works  Come on. We are too small  IT…. What? LoooL  Google IT  Find it on Pirate bay  How Much???  I Don’t trust them

slide-51
SLIDE 51
slide-52
SLIDE 52

28 Days Later… ( Not the Movie)

Disaster Issues

 Data loss, Files Encrypted  Servers, Client Pc’s, Phone Compromised?  Who? Why?  Cannot restore files. Backup failed and is corrupted  Weak firewall. No logging

Measures To take

 Evaluation. Know how, what, when and how many  Isolation  Human Factor (Happiness, Salary, Education, )  Backups Backups Backups  Carefully pick your sec consultant

slide-53
SLIDE 53
slide-54
SLIDE 54

Who do I trust for the job

  • Everybody knows (or at least say they do) how to protect you
  • Have they done this before?
  • Can they explain the steps to you?
  • Is it cheap? Can you afford this?
slide-55
SLIDE 55

They attacked. What now?

  • Is it all gone?
  • What is a backup?
  • Can the Police help me?
slide-56
SLIDE 56

If none of the above worked…

 There is always a final and more radical solution and way to fix the issues caused by the security compromise

slide-57
SLIDE 57

God Is Always The Answer

slide-58
SLIDE 58