ACAMS
Cybersecurity Risk We All Face
Jerry Craft| August 2017
ACAMS Cybersecurity Risk We All Face Jerry Craft| August 2017 - - PowerPoint PPT Presentation
ACAMS Cybersecurity Risk We All Face Jerry Craft| August 2017 About Your Speaker About Nth Generation Computing Ransomware Attacks & Extortion Hacking 101 Website Hacking 101 Phishing, Smishing and Lying Nation State Attacks
Cybersecurity Risk We All Face
Jerry Craft| August 2017
Cybersecurity
Jerry Craft – Nth Generation Computing
Cybersecurity
Jerry Craft – Nth Generation Computing
environments.
breach, and get law enforcement involved when necessary.
breaches-hacks/
Nth Generation Computing, Inc.
About Nth
Nth Generation is a 26 year old solution provider that has access to the latest technology, and performs security engagements using highly skilled ethical hackers, and former CISO’s.
Founded in 1991 Southern-California focused Offices in San Diego (HQ) and Irvine HP Security Partner of the Year 2015 Cylance Security Partner of the Year 2017
Nth Generation
Consulting Engagements
→ Ethical Hacking → Red Team (Physical Security) → Risk Assessments → Social Engineering → Security Roadmaps → Cloud Computing Assessments → Virtual CISO → Security Consulting
Nth Generation
Ransomware 1989-2017 AIDS Trojan to Cryptolocker
Nth Generation
Ransomware 1989-2017 AIDS Trojan to Cryptolocker
Nth Generation
Ransomware 1989-2017 AIDS Trojan to Cryptolocker
money from the victim.
messages, and force the user to pay ransom via an online payment system.
2016.
Nth Generation
Ransomware 1989-2017 AIDS Trojan to Cryptolocker
https://en.wikipedia.org/wiki/Ransomware
Nth Generation
Ransomware 2017
https://www.fincen.gov/news/news-releases/fincen-fines-btc-e-virtual-currency- exchange-110-million-facilitating-ransomware
Nth Generation
Ransomware 2017
Cryptolocker – Hollywood Presbyterian Medical Center Computer access was blocked and not restored until payment was made. http://www.latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin- 20160217-story.html
Nth Generation
Ransomware 2017
Nth Generation
Virus/Worm 2008 -- Conficker
connection to a remote computer
https://en.wikipedia.org/wiki/Conficker
Nth Generation
Attack / Ransomware -- EternalBlue
https://en.wikipedia.org/wiki/EternalBlue
Nth Generation
What do hackers look for to find vulnerabilities?
What if I type HELO 1000 times?
Nth Generation
Blue screen of death!
Nth Generation
Computer memory for the win!
Nth Generation
Blue screen of death!
Hacked for the win!
Nth Generation
Attack / Ransomware -- EternalBlue
Nth Generation
Website Compromises…
Nth Generation
Phishing
Nth Generation
Phishing
Nth Generation
Whaling…
Nth Generation
Whaling…
Nth Generation
Catfishing
technology firms in Israel, Saudi Arabia, India, US and Iraq.
companies computer networks.
inclined to trust others on the site. http://money.cnn.com/2017/07/27/technology/business/cobalt-gypsy-oilrig- linkedin-photographer/index.html?iid=ob_homepage_tech_pool
Nth Generation
Whaling…
Nth Generation
Who are the attackers?
Nth Generation
Office of Personnel Management
Nth Generation
Who are the attackers?
Nth Generation
What can be done?
Nth Generation
What can be done?
Nth Generation
What can be done?