the future of crypto crime
play

The Future of Crypto Crime and the Threat it Poses to - PowerPoint PPT Presentation

The Future of Crypto Crime and the Threat it Poses to Organizational Security CHARLES STOCKWELL | THE SECURITY STRONGHOLD CRYPTO CRIME IS STARING US IN THE FACE...and its just a child CRYPTO CRIME EXPEDITION FUTURE PAST PRESENT (my


  1. The Future of Crypto Crime and the Threat it Poses to Organizational Security CHARLES STOCKWELL | THE SECURITY STRONGHOLD

  2. CRYPTO CRIME IS STARING US IN THE FACE...and it’s just a child

  3. CRYPTO CRIME EXPEDITION FUTURE PAST PRESENT (my utopian city where there is no crypto crime)

  4. CRYPTOPIA ● Free Of All Crypto Crime ● Runs On Blockchain & AI ● ICO Next Week For CryptoCoin Cryptocurrency - “The World’s Most Redundant Cryptocurrency”

  5. CRYP·TO CRIME /krip-toh, kr ī m/ noun noun: crypto-crime criminal activities carried out by means of systems or programs related to cryptography

  6. CRYPTO PHISHING RANSOMWARE CRYPTOJACKING ICO SCAMS CRYPTO THEFT MONEY LAUNDERING HONORABLE MENTION: Cryptographic Attacks

  7. PAST

  8. IN RETROSPECT

  9. A RECURRING TREND TECHNOLOGY ADVANCEMENT DEVELOPMENT AND USE OF TECHNOLOGY TIME MOORE’S LAW GARTNER HYPE CYCLE

  10. RANSOMWARE THE INCEPTION AIDS TROJAN - 1989

  11. IMPACTS ● PATIENT ZERO ● THEFT ● SYSTEM COMPROMISE

  12. MITIGATION ● ANTIVIRUS ● UPDATES ● BACKUPS

  13. PRESENT

  14. UNDERSTAND THE ADVERSARY

  15. THREAT ACTORS Nation States Criminals VS. APT

  16. RANSOMWARE THE RISE 2009 - PRESENT

  17. EVOLUTION FIRST RANSOMWARE BITCOIN WAS ATTACK INVENTED 1989 2009 2005 2013+ ARCHIEVUS RAPID GROWTH

  18. ADAPTATIONS ● INFECTION ● COMMUNICATION + ENCRYPTION ● EXTORTION

  19. EXAMPLES POWERWARE CERBER RYUK BADRABBIT GRANDCRAB

  20. IMPACTS ● LOSS OF DATA ● DISRUPTED OPERATIONS ● FINANCIAL LOSS ● POTENTIAL HARM TO COMPANY REPUTATION

  21. MITIGATION ● BACKUPS ● SECURE NETWORK DESIGN ● SECURITY AWARENESS TRAINING ● DISASTER RECOVERY

  22. CRYPTOJACKING THE NEW KID ON THE BLOCK CRYPTOCURRENCY GOLD RUSH

  23. ADAPTATIONS ● MORE MONEY | LESS RISK ● A BETTER BUSINESS MODEL ● EASE

  24. EXAMPLES ● FACEXWORM ● WinstarNssmMiner ● GITHUB

  25. IMPACTS ● DECREASED PERFORMANCE ● INCREASED ELECTRICITY USE ● EXCESSIVE HEAT

  26. MITIGATION ● RESOURCE MONITORING ● AD BLOCKING | ANTI-CRYPTOMINING ● SECURITY AWARENESS TRAINING

  27. MONEY LAUNDERING A NEW BATTLEFRONT THE GREAT RACE CONTINUES

  28. ADAPTATIONS ● ALTCOINS AND ZERO-PROOF ● MIXING SERVICES ● CURRENCY FLIPPING

  29. EXAMPLES ● DRUGS ● MORPHEUS TITANIA ● ISRAEL

  30. IMPACTS ● EASIER TO WASH MONEY ● FUNDING MALICIOUS ACTORS ● REGULATIONS

  31. MITIGATION ● ANOMALY DETECTION ● COORDINATED EFFORTS ● REGULATIONS

  32. FUTURE

  33. WELCOME TO CRYPTOPIA

  34. I HAVE A CONFESSION TO MAKE

  35. USING PAST EXPERIENCES TO PREDICT THE FUTURE PARADIGM

  36. THE FUTURE OF CRYPTO CRIME PREDICTIONS KNOWN UNKNOWNS UNKNOWN UNKNOWNS

  37. RANSOMWARE

  38. RANSOMWARE OUTLOOK CREATIVITY DOXING IOT OPERATIONAL SMART TECHNOLOGY TRANSPORTATION

  39. FUTURE RANSOMWARE IMPACTS INCREASING THREAT SURFACE RESOURCES FOR REPUTATION MANAGEMENT ADAPT OR DIE MENTALITY A NEED TO UNDERSTAND YOUR ECOSYSTEM PREPARE TO BE COMPROMISED

  40. CRYPTOJACKING

  41. CRYPTOJACKING OUTLOOK INSIDER LEGITIMATE GROWTH THREATS USES

  42. FUTURE CRYPTOJACKING IMPACTS HARDER TO DETECT MORE PREVALENT VOLATILITY

  43. MONEY LAUNDERING

  44. MONEY LAUNDERING OUTLOOK GREATER CHANGING FACILITATION COMPLEXITY FOCUS

  45. FUTURE MONEY LAUNDERING IMPACTS COLLABORATION A NEW FRONT INVESTING IN SKILLS

  46. FUTURE CRYPTO CRIME MITIGATION FORMULA

  47. THE SECRET SAUCE APPLIED UNDERSTAND FOCUS ON THE FUNDAMENTALS YOUR ADVERSARY BIG WINS

  48. “MOTIVATING THOUGHTS”

  49. THANK YOU CHARLES THESECURITYSTRONGHOLD.COM STOCKWELL ● Security Awareness Training ● Security Assessments ● Incident Response ● Managed Services CEO charles@ thesecuritystronghold.com THE SECURITY STRONGHOLD

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend