AFIIA 2017 Cyber Attack Demonstration Overview of Information - - PowerPoint PPT Presentation

afiia 2017
SMART_READER_LITE
LIVE PREVIEW

AFIIA 2017 Cyber Attack Demonstration Overview of Information - - PowerPoint PPT Presentation

5/30/2017 Presentation Outline Cyber Security - Safeguarding your IT Environment Cyber Attack Demonstration Overview of Information Security Situational Analysis of Current Attacks Wednesday, May 17, 2017 @ AFIIA Conference, 2017


slide-1
SLIDE 1

5/30/2017 1

Wednesday, May 17, 2017 @ AFIIA Conference, 2017

Cyber Security - Safeguarding your IT Environment

By: Albert Antwi-Boasiako Principal Consultant, e-Crime Bureau

Presentation Outline  Cyber Attack Demonstration  Overview of Information Security  Situational Analysis of Current Attacks  Vulnerabilities & Risk Factors  Countermeasures & Best Practices Cyber Attack Demonstration

Ransomware Modus Operandi

Overview of Information Security

Information Security involves ‘processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption’.

 Information Security – Basic Concepts

AFIIA 2017

slide-2
SLIDE 2

5/30/2017 2

Overview of Information Security Information Security – Basic Concepts Situational Analysis of Current Attacks

Current State of Cybercrime in Africa

Situational Analysis of Current Attacks

Wanna-Cry Ransomware Attacks Recorded in over 150 Countries. LARGEST SCALE ATTACK IN MODERN TIMES

Vulnerabilities & Risk Factors

AFIIA 2017

slide-3
SLIDE 3

5/30/2017 3

Vulnerabilities & Risk Factors Information Security Vulnerabilities

Technology vulnerabilities:

Changing nature of technology. Any existing technology has its inherent weaknesses. Complex technologies create problems sometimes. Technological solutions sometimes create other problems. No technology is 100% reliable!

Vulnerabilities & Risk Factors Information Security Vulnerabilities

Human vulnerabilities: Lack of awareness. Compliance issues. Lack of due diligence. Over reliance on technology, etc.

Countermeasures and Best Practices

Information Security Framework

Security Awareness Education and Employee Training Incident Monitoring and Reporting Cyber Security Risk Management & Identification
  • f Key Risks
Information Security Audits Information Security Policy

Countermeasures and Best Practices Governance:  Information security governance structure  Information Security and Data Protection Policy

AFIIA 2017

slide-4
SLIDE 4

5/30/2017 4

Countermeasures and Best Practices Technology Solutions:  Adopt the right technology  Invest in Firewalls, Intrusion Prevention and Detection Systems, etc.  Install Anti-malware Solutions  Encryption technology Countermeasures and Best Practices Cyber Security Best Practices: Patch and Update all Systems and Applications Backup & Collect Detailed Logs Audit Emails & Attachments  Create a Data Breach Response Plan Countermeasures and Best Practices Training & Awareness: Employee Awareness Training Re-training and employee assessment (example through Mystery Shopping)

QUESTIONS???

AFIIA 2017

slide-5
SLIDE 5

5/30/2017 5

e-Crime Bureau

  • P. O. Box DT 2703

Adenta - Accra Telephone: +233 (0302) 960397/ (020) 7131646 Email: info@e-crimebureau.com Website: www.e-crimebureau.com

CONTACT INFORMATION

AFIIA 2017