cfa cyberconf
play

CFA CyberConf A.C.Slashopt ltd Nikos Tsarouchas Constantinos - PowerPoint PPT Presentation

CFA CyberConf A.C.Slashopt ltd Nikos Tsarouchas Constantinos Gakopoulos Constantinos Gakopoulos Greece Kastoria 1974 Landed in Cyprus 1995 20 years in the scene of IT 10 Years messing up with security Love PlayStation


  1. CFA CyberConf A.C.Slashopt ltd Nikos Tsarouchas – Constantinos Gakopoulos

  2. Constantinos Gakopoulos  Greece Kastoria 1974  Landed in Cyprus 1995  20 years in the scene of IT  10 Years messing up with security  Love PlayStation  In Love with Zelda

  3. Nikos Tsarouchas  Thessaloniki1973  In Cyprus since 2011  HP since 2008  More than 20 years in the scene of IT  Love Rum

  4. Do You Feel Secure? • What Is Security? • What is IT Security • What is Cyber Threat?

  5. Do You Feel Secure? • What Is Security? • What is IT Security • What is Cyber Threat?

  6. Do You Feel Secure? • What Is Security? • What is IT Security • What is Cyber Threat?

  7. I m under Attack

  8. I m under Attack A technical a non technical attack • What is a virus? • What is a Phishing attack? • What is Ransomware? •

  9. Non Technical Attacks Social Engineering Dumpster Diving Phishing

  10. Technical Attacks DDOS – DOS Attack Virus, Trojan, Worms

  11. Ransomware/ Locky/Cerber  Ransomware is a computer malware that installs covertly on a victim's device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid.  From Wikipedia, the free encyclopedia

  12. Virus / Mallware  Malware , short for malicious software , is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising  Malware may be stealthy, intended to steal information or spy on computer users for an extended period without their knowledge.  From Wikipedia, the free encyclopedia

  13. Phishing  Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.  Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter personal information at a fake website, the look and feel of which are almost identical to the legitimate one. Communications purporting to be from social web sites, auction sites, banks, online payment processors or IT administrators are often used to lure victims. Phishing emails may contain links to websites that are infected with malware.

  14. Major breaches in 2016

  15. “ As a kid, I had this great idea to be secure. I could build a big titanium room that would not be accessible from the outside. Then again, I thought…this will only give the intruder infinite time to find a myriad ways to find a way in. ” Andreas Papamichael. Co-Founder A.C.Slashopt ltd

  16. Statistics BlackHat Conf 2016 BlackHat Conf 2016

  17. Microsoft phishing scam

  18. …The evil Link

  19. Vulnerabilities On our IT Environment Internet itself • If we communicate with other people, there’s a hole • BYOD • The a-virus myth • BOX, Drobox, OneDrive, Google Drive, iCloud • Whatever the IT policies, users are not aware of the danger • Doing it from the inside •

  20. Why Do Businesses Fail To Protect Themselves And Their Customer’s Data They don’t believe there is an actual danger They think they are already secure I have a friend…I know someone….My best man told me… THIS WILL NEVER HAPPEN TO ME

  21. Investment. Choose Wisely

  22. IT Department Vs Management Dep IT Department Management  New Technologies  Cost of the investment  Upgrades. OS – H/W  But it works  Data integrity – Security  Come on. We are too small  IT Budged for this year  IT…. What? LoooL  Training for IT  Google IT  New Software cost  Find it on Pirate bay  How Much???  DRS  Cloud  I Don’t trust them

  23. 28 Days Later… ( Not the Movie) Disaster Issues Measures To take  Data loss, Files Encrypted  Evaluation. Know how, what, when and how many  Servers, Client Pc’s, Phone  Isolation Compromised?  Who? Why?  Human Factor (Happiness, Salary, Education, )  Cannot restore files. Backup failed and is corrupted  Backups Backups Backups  Weak firewall. No logging  Carefully pick your sec consultant

  24. Who do I trust for the job Everybody knows (or at least say they do) how to protect you • Have they done this before? • Can they explain the steps to you? • Is it cheap? Can you afford this? •

  25. They attacked. What now? • Is it all gone? • What is a backup? • Can the Police help me?

  26. If none of the above worked…  There is always a final and more radical solution and way to fix the issues caused by the security compromise

  27. God Is Always The Answer

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend