can organizations survive a poli cyber breach
play

CAN ORGANIZATIONS SURVIVE A POLI-CYBER BREACH ? K e y n o t e b y - PowerPoint PPT Presentation

CAN ORGANIZATIONS SURVIVE A POLI-CYBER BREACH ? K e y n o t e b y K h a l e d F a t t a l MLi Group, C h a i r m a n ( @ ) M L i G r p ( d o t ) c o m 1 WHAT IS A POLI-CYBER ? CYBER ATTACKS PERPETRATED OR INSPIRED BY EXTREMIST


  1. CAN ORGANIZATIONS SURVIVE A POLI-CYBER BREACH ? K e y n o t e b y K h a l e d F a t t a l MLi Group, C h a i r m a n ( @ ) M L i G r p ( d o t ) c o m 1

  2. WHAT IS A POLI-CYBER ™ ? CYBER ATTACKS PERPETRATED OR INSPIRED BY EXTREMIST ORGANIZATIONN GROUPS LIKE ISIS/ DAESH AND ROGUE STATES. 2

  3. KEY DIFFERENCE BETWEEN CONVENTIONAL CYBER ATTACKS VS A POLI-CYBER™ THREATS? M O T I V A T I O N 3

  4. DO YOU THINK WE ARE SCAREMONGERING? T h i s i s w h a t e x p e r t s s a y a n d t h e m e d i a r e p o r t e d : 4

  5. 5

  6. In his book titled: Islamic State: The Digital Caliphate, author and journalist Abdel-Bari Atwan, the man who also interviewed Osama Bin Laden in 96, describes ISIS as having a: " Cyber Caliphate Division that successfully attacked the US governments Central Command”. 6

  7. Robert Hannigan GCHQ director: “Determined hackers can get in. They can cause damage. Can the business or public service keep going?”  Ian West who heads up NATO’s cyber- security services said:  “The threat landscape is vast, from malware and hacktivists to organised criminals and state-sponsored attacks. Things that we thought impossible can be done.”

  8. 8

  9. 9

  10. 10

  11. 11

  12. LETS LOOK AT SOME PUBLICLY KNOWN BREACHES & THEIR HARD COST / DAMAGE 12

  13. 13

  14. 14

  15. 15

  16. WITH ALL THIS INFO WHY ARE TOP DECISION MAKERS (CHAIRMEN, CEOS & BOARD MEMBERS) STILL NOT LISTENING? 16

  17. CAN ORGANIZATIONS SURVIVE A POLI-CYBER BREACH? ANSWER! & Q & A. 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend