afiia 2017
play

AFIIA 2017 Cyber Attack Demonstration Overview of Information - PowerPoint PPT Presentation

5/30/2017 Presentation Outline Cyber Security - Safeguarding your IT Environment Cyber Attack Demonstration Overview of Information Security Situational Analysis of Current Attacks Wednesday, May 17, 2017 @ AFIIA Conference, 2017


  1. 5/30/2017 Presentation Outline Cyber Security - Safeguarding your IT Environment  Cyber Attack Demonstration  Overview of Information Security  Situational Analysis of Current Attacks Wednesday, May 17, 2017 @ AFIIA Conference, 2017  Vulnerabilities & Risk Factors  Countermeasures & Best Practices By: Albert Antwi-Boasiako Principal Consultant, e-Crime Bureau AFIIA 2017 Cyber Attack Demonstration Overview of Information Security  Information Security – Basic Concepts Ransomware Modus Operandi Information Security involves ‘processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption’. 1

  2. 5/30/2017 Overview of Information Security Situational Analysis of Current Attacks  Information Security – Basic Concepts Current State of Cybercrime in Africa AFIIA 2017 Situational Analysis of Current Attacks Vulnerabilities & Risk Factors Wanna-Cry Ransomware Attacks Recorded in over 150 Countries. LARGEST SCALE ATTACK IN MODERN TIMES 2

  3. 5/30/2017 Vulnerabilities & Risk Factors Vulnerabilities & Risk Factors Information Security Vulnerabilities Information Security Vulnerabilities Technology vulnerabilities: Human vulnerabilities:  Changing nature of technology.  Lack of awareness.  Any existing technology has its inherent weaknesses.  Compliance issues.  Complex technologies create problems sometimes.  Lack of due diligence.  Technological solutions sometimes create other problems.  Over reliance on technology, etc.  No technology is 100% reliable! AFIIA 2017 Countermeasures and Best Practices Countermeasures and Best Practices Security Awareness Education and Employee Governance: Training  Information security governance structure Information Incident Security Monitoring Policy and Reporting  Information Security and Data Protection Policy Information Security Framework Cyber Security Risk Information Management Security & Audits Identification of Key Risks 3

  4. 5/30/2017 Countermeasures and Best Practices Countermeasures and Best Practices Technology Solutions: Cyber Security Best Practices:  Adopt the right technology  Patch and Update all Systems and Applications  Invest in Firewalls, Intrusion Prevention and  Backup & Collect Detailed Logs  Audit Emails & Attachments Detection Systems, etc.  Install Anti-malware Solutions  Create a Data Breach Response Plan  Encryption technology AFIIA 2017 Countermeasures and Best Practices Training & Awareness: QUESTIONS???  Employee Awareness Training  Re-training and employee assessment (example through Mystery Shopping) 4

  5. 5/30/2017 CONTACT INFORMATION e-Crime Bureau P. O. Box DT 2703 Adenta - Accra Telephone: +233 (0302) 960397/ (020) 7131646 Email: info@e-crimebureau.com Website: www.e-crimebureau.com AFIIA 2017 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend