WBA Secur-IT Conference The Art of Human Hacking You can trust me. - - PowerPoint PPT Presentation

wba secur it conference the art of human hacking you can
SMART_READER_LITE
LIVE PREVIEW

WBA Secur-IT Conference The Art of Human Hacking You can trust me. - - PowerPoint PPT Presentation

WBA Secur-IT Conference The Art of Human Hacking You can trust me. WHAT ARE THE EFFECTS? The global cost of cybercrime will reach $6 trillion by 2021, twelve times increase from the 2016 estimate of $450 billion. May only be tip


slide-1
SLIDE 1

WBA Secur-IT Conference The Art of Human Hacking “You can trust me.”

slide-2
SLIDE 2
slide-3
SLIDE 3

WHAT ARE THE EFFECTS?

 The global cost of cybercrime will reach $6 trillion by 2021, twelve times increase from the 2016 estimate of $450 billion.

 May only be tip of the iceberg.

 Of the 419 organizations surveyed that suffered at least one breach in 2016, the average cost per breach was $3.62 million. That figure rose to $7.35 million in the U.S.  Cost per record stolen averages $141 globally, but tops $225 in the U.S.

 More than 4.2 billion records were exposed in 4,149 publicized breaches

 The costs per breach to organizations in the health care ($380) and financial services ($245) sectors top all other industry groups.  50 percent of small and midsized organizations reported suffering at least one cyberattack in the last 12 months.  The average cost of a data breach involving theft of assets totaled $879,582 for these SMBs. They spent another $955,429 to restore normal business in the wake of successful attacks.  57% of businesses say finding and recruiting talented IT security staff is a large challenge

slide-4
SLIDE 4

WHO ARE THE VICTIMS?

  • 2017 Data Breach Investigations Report, Verizon
  • f incidents affected

financial organizations

24%

  • f incidents affected the

accommodations industry

10%

  • f incidents affected the

information industry

5%

Incidents of confirmed data loss:

slide-5
SLIDE 5

DOES THIS REALLY AFFECT US?

You may be thinking:

slide-6
SLIDE 6

WHY US?

Small town, big trust.

slide-7
SLIDE 7

HOW DO WE PROTECT OURSELVES?

You may be thinking:

slide-8
SLIDE 8

DEFENSE IN DEPTH

MCCUMBER CUBE

The use of people, process, and technology to ensure the confidentiality, integrity, and availability of information while it is transmitted, stored, and processed.

slide-9
SLIDE 9
slide-10
SLIDE 10

TALKING STRATEGY

Every con artist needs a game plan.

slide-11
SLIDE 11

“Social engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology.”

– Kevin Mitnick, Notorious Hacker and Author of The Art of Deception

slide-12
SLIDE 12

“The weakest link in the security chain is the human element.” “..in more than half of his successful network exploits he gained information about the network, sometimes including access to the network, through social engineering.”

  • Kevin Mitnick, Notorious Hacker and Author of The Art of Deception
slide-13
SLIDE 13

THE BIG THREE

1) In-Person 2) Email 3) Phone

slide-14
SLIDE 14

IN-PERSON METHODS

slide-15
SLIDE 15

WALK RIGHT IN

Step on up.

Video.

slide-16
SLIDE 16

WALK WITH A PURPOSE

I belong here.

slide-17
SLIDE 17

TAILGATING

I’m with this guy.

slide-18
SLIDE 18

BAITING

Free Stuff!

slide-19
SLIDE 19

DUMPSTER DIVING

It’s mine now.

slide-20
SLIDE 20

IMPERSONATION

Who, me?

slide-21
SLIDE 21

SEEKING EMPLOYMENT

I’d like a job please.

slide-22
SLIDE 22

DEVICE MODIFICATION

It looks fine to me.

slide-23
SLIDE 23

MALICIOUS DEVICES

Look what I found.

slide-24
SLIDE 24

HOW CAN WE PREVENT THIS?

  • Security Awareness Training
  • Be Aware of the Environment
  • Clean Desk\Workspace Policies
  • Security Policy
  • Periodic Testing
slide-25
SLIDE 25

EMAIL PHISHING

slide-26
SLIDE 26

YOU HAVE BEEN TAGGED!

Your credentials are recorded and you are re- directed to Facebook’s homepage….Gotcha.

slide-27
SLIDE 27

HOW CAN WE PREVENT THIS?

  • Security Awareness Training
  • Security Policy
  • Periodic Testing
slide-28
SLIDE 28

PHONE PHISHING

slide-29
SLIDE 29

THEY’LL NEVER KNOW!

slide-30
SLIDE 30

LET ME HELP YOU.

slide-31
SLIDE 31

UNSOLICITED SALES

slide-32
SLIDE 32

SHORT MESSAGE SERVICE (SMS)

You've been selected for a free $1000 giftcard!

Enter the code 'FREE' at yourfavestore.com.s hop.biz to get it now. Only 112 left! Text OUT to stop.

slide-33
SLIDE 33

HOW CAN WE PREVENT THIS?

  • Security Awareness Training
  • Security Policy
  • Periodic Testing
slide-34
SLIDE 34

CUI BONO?

  • For Whose Benefit
  • For What Purpose
slide-35
SLIDE 35

REGULATORY REQUIREMENTS

  • Incident Response
  • Assessments
  • Training
  • Top Down Accountability
slide-36
SLIDE 36

WINNING THE GAME

 Don’t Assume Anything  Know Your Attacker  Identify Your Weaknesses  Lock Down and Secure  Educate Your Employees  Audit Your Network  Understand Security is an Asset, not an Expense  Subscribe to Security Alerts  Cross Your Fingers  Use Outside Resources  Rinse, Lather, and Repeat

slide-37
SLIDE 37

Questions?

slide-38
SLIDE 38

VPS PROFILE

We combine professional engineering, technical expertise and extensive regulatory knowledge to design the most technically advanced and economically viable solutions customized for our clients. Progressive thinking makes Vantage Point well-known and respected in the industry. At VPS we tailor each project to fit the individual needs of the client. With over 400 clients in more than 40 states and 8 foreign countries, VPS has the vast experience necessary to understand the best solution for any company.

slide-39
SLIDE 39

OUR SERVICES

Vantage Point has professionals with credit review expertise to help with loan policy formation, underwriting, risk management, routine monitoring, and problem loan

  • resolution. We will help you face the challenges of greater

borrower sophistication, regulatory scrutiny, and a constantly changing economic environment. Vantage Point has in-house regulatory expertise to help you face the challenges of increasing and more complex regulations affecting the financial industry. We will help you customize and streamline your programs and processes.

Credit Reviews Regulatory Compliance & Risk Management

slide-40
SLIDE 40

OUR SERVICES

Vantage Point’s security consultants stay abreast of emerging IT risks to help you face the increasing challenge to stay current as business operations continue relying more heavily

  • n electronic communication.

Vantage Point’s team can assist in making decisions about “cloud” strategies, network infrastructure, security and virtualization; ensuring business operations run smoothly

  • n a daily basis.

Information Security Technology

slide-41
SLIDE 41

THANK YOU!