SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
30 Days CTIP Infection Map 1-30 September 2017
Belgium Overview
Belgium Overview 1-30 September 2017
Charleroi Overview 1-30 September 2017
Belgium Top 25 Cities by Threat 9-15 October 2017
Unique IPs by Threat by Day in Belgium 01 – 16 October 2017
June 2014
Malware using Dynamic DNS
for command. It involved
password and identity theft,
webcam and other privacy
invasions.
Over 200 different types of
malware impacted by the take
down.
Identity Theft /
Financial Fraud /
Privacy Invasion
Bladabindi &
Jenxcus
4 482
Conficker
5 205
February 2010
Botnet Worm
Sirefef
483
December 2013
ZeroAccess hijacked search
results, taking victims to
dangerous sites. It costs
online advertisers upwards of
$2.7 million each month.
Advertising Click Fraud
Most Common CTIP Malware Threats in
Belgium 1-30 September 2017
https://www.gov.uk/government/news/two-thirds-of-large-uk-businesses-hit-by-cyber-breach-or-attack-in-past-year
https://www.gov.uk/government/publications/cyber-security-breaches-survey-2016
The Cyber Security Breaches Survey
found that while one in four large
firms experiencing a breach did
so at least once a month, only
half of all firms have taken any
recommended actions to identify
and address vulnerabilities. Even
fewer, about a third of all firms, had
formal written cyber security
policies and only 10% had an
incident management plan in
place.
Our survey reveals that 57% have had a recent significant cybersecurity incident.
Nearly half (48%) cited outdated information security controls or architecture as their
highest vulnerability – an increase from 34% in the 2015 survey.
http://www.ey.com/gl/en/services/advisory/ey-global-information-security-survey-2016
http://www.ey.com/gl/en/newsroom/news-releases/news-global-organizations-better-prepared-to-predict-and-resist-cyber-attacks-
but-struggle-to-recover-from-them-ey-survey-finds
Maturity levels are still too low in many
critical areas.
Percentage who would rate these
information security management
processes as mature:
•Software security: 29%
•Security monitoring: 38%
•Incident management: 38%
•Identity and Access Management: 38%
•Network security: 52%
https://www.microsoft.com/security/sir/default.aspx
36 datacenter locations worldwide1
Central US
West US
East US
North Central US
Brazil South
West Europe
Japan East
South India
SE Asia
Australia South East
Australia East
India Central
West India
Japan West
East Asia
China West*
North Europe Germany
Northeast**
Canada East
Canada Central
South Central US
China East*
Germany Central**
West US 2
Korea South
East US 2
Korea Central
100 + datacenters
One of 3 largest networks in the world
United Kingdom West
United Kingdom
South
West Central US
Chile
Asia
Vienna
Finland
United
States
IndustryRegional
ISO
27001
PCI DSS
Level 1
SOC 1
Type 2
SOC 2
Type 2
ISO
27018
Cloud Controls
Matrix v3.0.1
Content Delivery and
Security Association
Shared
Assessments
SOC 3 MPAA
Singapore
MTCS Level 3
United Kingdom
G-Cloud
Australian Signals
Directorate
New Zealand
GCIO
China GB
18030
European Union
Model Clauses
Argentine Data
Protection Act 25.326
China
TRUCS
Canadian
Privacy Laws
FISMAHIPAA /
HITECH
FIPS
140-2
DISA
Level 2
(DIACAP)
FERPAFedRAMP
JAB
P-ATO
21 CFR
Part 11
IRS
1075
Section
508
VPATs
NIST
800-171
MARS-E GxP DIACAP
Japan My
Number Act
Japan
Financial Services
ENISA
IAF
Cloud Security
Mark Gold
Spain
ENS
FACT EU-US
Privacy Shield
ISO/IEC
27017
China Multi Layer
Protection Scheme
ISO 22301
Germany IT
Grundschutz
workbook
Compliance assurances
Third party validation, Azure
https://www.rsaconference.com/events/us16/agenda/sessions/2532/machine-learning-and-the-cloud-disrupting-threat
A cloud you
can trust
“Businesses and users are
going to embrace technology
only if they can trust it.”
At Microsoft, we never take your
trust for granted
• We are serious about our
commitment to protect customers
in a cloud first world.
• We live by standards and practices
designed to earn your confidence.
• We collaborate with industry and
governments to build trust in the
cloud ecosystem. – Satya Nadella
Cybercriminalité, statut, risques et prévention

Contenu connexe

Tendances

NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...North Texas Chapter of the ISSA
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Business Days
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016ColloqueRISQ
 
$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!Xirrus
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Business Days
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...IJNSA Journal
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewJohn D. Haden
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
GDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the NumbersGDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the NumbersBlack Duck by Synopsys
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security EconomyBehnaz Aria
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FuturePriyanka Aash
 
Cyber crime final
Cyber crime finalCyber crime final
Cyber crime finalHIRA BARLAS
 

Tendances (20)

NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
NTXISSACSC3 - Evolution of Cyber Threats and Defense Approaches by Antony Abr...
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
 
$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!$4 Million Average Cost to an Organisation For a Data Breach!
$4 Million Average Cost to an Organisation For a Data Breach!
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
GDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the NumbersGDPR and Open Source: Security by the Numbers
GDPR and Open Source: Security by the Numbers
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, FutureCyberterrorism. Past, Present, Future
Cyberterrorism. Past, Present, Future
 
My presentation
My presentationMy presentation
My presentation
 
Why Cisco-for-Security
Why Cisco-for-SecurityWhy Cisco-for-Security
Why Cisco-for-Security
 
Cyber crime final
Cyber crime finalCyber crime final
Cyber crime final
 

Similaire à Cybercriminalité, statut, risques et prévention

Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOisc2-hellenic
 
cloudThing GDPR Information Guide - Scott Jenkins
cloudThing GDPR Information Guide - Scott JenkinscloudThing GDPR Information Guide - Scott Jenkins
cloudThing GDPR Information Guide - Scott JenkinsCloud Thing
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
KPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscapeKPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscapeHerman Kienhuis
 
KPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment LandscapeKPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment Landscapekpnventures
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019Ulf Mattsson
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud SecurityDatapipe
 
Information Security – Review Of 2008 And 2009 97 2003
Information Security – Review Of 2008 And 2009 97 2003Information Security – Review Of 2008 And 2009 97 2003
Information Security – Review Of 2008 And 2009 97 2003Graeme Payne
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUlf Mattsson
 
Module 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptxModule 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptxaaronpham13
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien DNUG e.V.
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Leonardo
 

Similaire à Cybercriminalité, statut, risques et prévention (20)

Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
The evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISOThe evolving threats and the challenges of the modern CISO
The evolving threats and the challenges of the modern CISO
 
cloudThing GDPR Information Guide - Scott Jenkins
cloudThing GDPR Information Guide - Scott JenkinscloudThing GDPR Information Guide - Scott Jenkins
cloudThing GDPR Information Guide - Scott Jenkins
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
KPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscapeKPN Ventures research series: cyber security investment landscape
KPN Ventures research series: cyber security investment landscape
 
KPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment LandscapeKPN Ventures Research Series: Cyber Security Investment Landscape
KPN Ventures Research Series: Cyber Security Investment Landscape
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Information Security – Review Of 2008 And 2009 97 2003
Information Security – Review Of 2008 And 2009 97 2003Information Security – Review Of 2008 And 2009 97 2003
Information Security – Review Of 2008 And 2009 97 2003
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
 
Module 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptxModule 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptx
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
 

Plus de Forums financiers de Wallonie

Investissements durables : quels sont les principaux défis pour le secteur fi...
Investissements durables : quels sont les principaux défis pour le secteur fi...Investissements durables : quels sont les principaux défis pour le secteur fi...
Investissements durables : quels sont les principaux défis pour le secteur fi...Forums financiers de Wallonie
 
2023_01_31_Forum_Financier Finances Region wallonne.pdf
2023_01_31_Forum_Financier Finances Region wallonne.pdf2023_01_31_Forum_Financier Finances Region wallonne.pdf
2023_01_31_Forum_Financier Finances Region wallonne.pdfForums financiers de Wallonie
 
Prix de l’énergie, inflation et indexation automatique quelles conséquences.pdf
Prix de l’énergie, inflation et indexation automatique  quelles conséquences.pdfPrix de l’énergie, inflation et indexation automatique  quelles conséquences.pdf
Prix de l’énergie, inflation et indexation automatique quelles conséquences.pdfForums financiers de Wallonie
 
Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...
Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...
Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...Forums financiers de Wallonie
 
Un nouveau monde, de nouveaux risques: AG & Ethias.pdf
Un nouveau monde, de nouveaux risques: AG & Ethias.pdfUn nouveau monde, de nouveaux risques: AG & Ethias.pdf
Un nouveau monde, de nouveaux risques: AG & Ethias.pdfForums financiers de Wallonie
 
L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...
L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...
L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...Forums financiers de Wallonie
 
L'investissement responsable ne sauvera pas le monde ... mais
L'investissement  responsable ne sauvera pas le monde ... maisL'investissement  responsable ne sauvera pas le monde ... mais
L'investissement responsable ne sauvera pas le monde ... maisForums financiers de Wallonie
 
L'accroissement des pouvoirs de l'administration fiscale
L'accroissement des pouvoirs de l'administration fiscaleL'accroissement des pouvoirs de l'administration fiscale
L'accroissement des pouvoirs de l'administration fiscaleForums financiers de Wallonie
 

Plus de Forums financiers de Wallonie (20)

FOFI 20230216.pdf
FOFI 20230216.pdfFOFI 20230216.pdf
FOFI 20230216.pdf
 
Que nous réserve la prochaine réforme fiscale?
Que nous réserve la prochaine réforme fiscale?Que nous réserve la prochaine réforme fiscale?
Que nous réserve la prochaine réforme fiscale?
 
Investissements durables : quels sont les principaux défis pour le secteur fi...
Investissements durables : quels sont les principaux défis pour le secteur fi...Investissements durables : quels sont les principaux défis pour le secteur fi...
Investissements durables : quels sont les principaux défis pour le secteur fi...
 
2023_01_31_Forum_Financier Finances Region wallonne.pdf
2023_01_31_Forum_Financier Finances Region wallonne.pdf2023_01_31_Forum_Financier Finances Region wallonne.pdf
2023_01_31_Forum_Financier Finances Region wallonne.pdf
 
Prix de l’énergie, inflation et indexation automatique quelles conséquences.pdf
Prix de l’énergie, inflation et indexation automatique  quelles conséquences.pdfPrix de l’énergie, inflation et indexation automatique  quelles conséquences.pdf
Prix de l’énergie, inflation et indexation automatique quelles conséquences.pdf
 
Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...
Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...
Bruxelles est-elle une métropole performante, compétitive et attractive en Eu...
 
La réforme du Code des sociétés FF.pdf
La réforme du Code des sociétés FF.pdfLa réforme du Code des sociétés FF.pdf
La réforme du Code des sociétés FF.pdf
 
conference IDEA Forum financier Mons.pdf
conference IDEA Forum financier Mons.pdfconference IDEA Forum financier Mons.pdf
conference IDEA Forum financier Mons.pdf
 
Un nouveau monde, de nouveaux risques: AG & Ethias.pdf
Un nouveau monde, de nouveaux risques: AG & Ethias.pdfUn nouveau monde, de nouveaux risques: AG & Ethias.pdf
Un nouveau monde, de nouveaux risques: AG & Ethias.pdf
 
The European Green Deal - Forum Financier Namur.pdf
The European Green Deal - Forum Financier Namur.pdfThe European Green Deal - Forum Financier Namur.pdf
The European Green Deal - Forum Financier Namur.pdf
 
duo sur vision Wallonie - Borsus De Geest.pdf
duo sur vision Wallonie - Borsus De Geest.pdfduo sur vision Wallonie - Borsus De Geest.pdf
duo sur vision Wallonie - Borsus De Geest.pdf
 
Fofi Charleroi plan relance Wallon slides UWE.pdf
Fofi Charleroi plan relance Wallon slides UWE.pdfFofi Charleroi plan relance Wallon slides UWE.pdf
Fofi Charleroi plan relance Wallon slides UWE.pdf
 
L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...
L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...
L’évolution du secteur hospitalier vers les bassins de soins : l’exemple de E...
 
La forêt mosaïque.pdf
La forêt mosaïque.pdfLa forêt mosaïque.pdf
La forêt mosaïque.pdf
 
Perspectives économiques: Hilgers Namur 2022.pdf
Perspectives économiques:  Hilgers Namur 2022.pdfPerspectives économiques:  Hilgers Namur 2022.pdf
Perspectives économiques: Hilgers Namur 2022.pdf
 
L'investissement responsable ne sauvera pas le monde ... mais
L'investissement  responsable ne sauvera pas le monde ... maisL'investissement  responsable ne sauvera pas le monde ... mais
L'investissement responsable ne sauvera pas le monde ... mais
 
Projections économiques pour la Belgique
Projections économiques pour la BelgiqueProjections économiques pour la Belgique
Projections économiques pour la Belgique
 
L'accroissement des pouvoirs de l'administration fiscale
L'accroissement des pouvoirs de l'administration fiscaleL'accroissement des pouvoirs de l'administration fiscale
L'accroissement des pouvoirs de l'administration fiscale
 
ForumFinancierMons (1).pdf
ForumFinancierMons (1).pdfForumFinancierMons (1).pdf
ForumFinancierMons (1).pdf
 
Presentation Mottet Fofi Namur 11.05.22.pdf
Presentation Mottet Fofi Namur 11.05.22.pdfPresentation Mottet Fofi Namur 11.05.22.pdf
Presentation Mottet Fofi Namur 11.05.22.pdf
 

Dernier

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 

Dernier (20)

How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 

Cybercriminalité, statut, risques et prévention

  • 1.
  • 2. 30 Days CTIP Infection Map 1-30 September 2017 Belgium Overview
  • 3.
  • 4. Belgium Overview 1-30 September 2017
  • 5. Charleroi Overview 1-30 September 2017
  • 6. Belgium Top 25 Cities by Threat 9-15 October 2017
  • 7. Unique IPs by Threat by Day in Belgium 01 – 16 October 2017
  • 8. June 2014 Malware using Dynamic DNS for command. It involved password and identity theft, webcam and other privacy invasions. Over 200 different types of malware impacted by the take down. Identity Theft / Financial Fraud / Privacy Invasion Bladabindi & Jenxcus 4 482 Conficker 5 205 February 2010 Botnet Worm Sirefef 483 December 2013 ZeroAccess hijacked search results, taking victims to dangerous sites. It costs online advertisers upwards of $2.7 million each month. Advertising Click Fraud Most Common CTIP Malware Threats in Belgium 1-30 September 2017
  • 9. https://www.gov.uk/government/news/two-thirds-of-large-uk-businesses-hit-by-cyber-breach-or-attack-in-past-year https://www.gov.uk/government/publications/cyber-security-breaches-survey-2016 The Cyber Security Breaches Survey found that while one in four large firms experiencing a breach did so at least once a month, only half of all firms have taken any recommended actions to identify and address vulnerabilities. Even fewer, about a third of all firms, had formal written cyber security policies and only 10% had an incident management plan in place.
  • 10. Our survey reveals that 57% have had a recent significant cybersecurity incident. Nearly half (48%) cited outdated information security controls or architecture as their highest vulnerability – an increase from 34% in the 2015 survey. http://www.ey.com/gl/en/services/advisory/ey-global-information-security-survey-2016 http://www.ey.com/gl/en/newsroom/news-releases/news-global-organizations-better-prepared-to-predict-and-resist-cyber-attacks- but-struggle-to-recover-from-them-ey-survey-finds Maturity levels are still too low in many critical areas. Percentage who would rate these information security management processes as mature: •Software security: 29% •Security monitoring: 38% •Incident management: 38% •Identity and Access Management: 38% •Network security: 52%
  • 12.
  • 13. 36 datacenter locations worldwide1 Central US West US East US North Central US Brazil South West Europe Japan East South India SE Asia Australia South East Australia East India Central West India Japan West East Asia China West* North Europe Germany Northeast** Canada East Canada Central South Central US China East* Germany Central** West US 2 Korea South East US 2 Korea Central 100 + datacenters One of 3 largest networks in the world United Kingdom West United Kingdom South West Central US Chile Asia Vienna Finland
  • 14.
  • 15. United States IndustryRegional ISO 27001 PCI DSS Level 1 SOC 1 Type 2 SOC 2 Type 2 ISO 27018 Cloud Controls Matrix v3.0.1 Content Delivery and Security Association Shared Assessments SOC 3 MPAA Singapore MTCS Level 3 United Kingdom G-Cloud Australian Signals Directorate New Zealand GCIO China GB 18030 European Union Model Clauses Argentine Data Protection Act 25.326 China TRUCS Canadian Privacy Laws FISMAHIPAA / HITECH FIPS 140-2 DISA Level 2 (DIACAP) FERPAFedRAMP JAB P-ATO 21 CFR Part 11 IRS 1075 Section 508 VPATs NIST 800-171 MARS-E GxP DIACAP Japan My Number Act Japan Financial Services ENISA IAF Cloud Security Mark Gold Spain ENS FACT EU-US Privacy Shield ISO/IEC 27017 China Multi Layer Protection Scheme ISO 22301 Germany IT Grundschutz workbook Compliance assurances Third party validation, Azure
  • 17. A cloud you can trust “Businesses and users are going to embrace technology only if they can trust it.” At Microsoft, we never take your trust for granted • We are serious about our commitment to protect customers in a cloud first world. • We live by standards and practices designed to earn your confidence. • We collaborate with industry and governments to build trust in the cloud ecosystem. – Satya Nadella