SlideShare une entreprise Scribd logo
1  sur  36
Digital Transformation
On-premises /
Private cloud
devices datausers apps
THE WORLD BEFORE
MOBILITY & CLOUD
On-premises /
Private cloud
CLOUD APPS & SAAS SERVICES
THE WORLD
TODAY
On-premises /
Private cloud
MOBILE AND PERSONAL DEVICES
On-premises /
Private cloud
ORGANIZATION & SOCIAL IDENTITIES
On-premises /
Private cloud
GDPR
Compliance
The Fear
Economic Crimes in the World
TOP FOUR
Cybercrime is Now One of the
Who is looking to attack you?
Script kiddie
Hacktivist
Malicious insiders
Hackers
Cybercrime Syndicates
Nation state sponsored hackers
1. The Basics: security hygiene
➢ Cyber security Awareness for end users
➢ Asset & Software management
➢ Vulnerability & patch management
➢ Multi-Factor Authentication (MFA)
➢ Privileged Access Management (PAM)
Top 5 Threats today
User browses to a
website
Phishing
mail
Opens
attachment
Clicks on a URL
+
Exploitation
&
Installation
Command
&
Control
Brute force account or
use stolen account credentials
User account
is compromised
Privileged
account
compromised
Domain
compromised
Attacker accesses
sensitive data
Exfiltrate data
Phishing kill chain -
Attacker
performs
Reconnaissance
sabrina@in-deed.be
6 people @ customer
CASE: Phase 1: Initial User compromise through Phishing
Person 1
Phase 1: Initial User compromise through Phishing
• Person1







 9990
Phase 2: Use compromised User for further phishing
Phase 2: timeline Phish campaign
0
200
400
600
800
1000
1200
1400
1600
1800
Phase 3: Further compromise other users clicking Phish URL
(+ 100)
0
1
2
3
4
5
6
7
8
9
10
11:09
13:05
13:06
13:07
13:08
13:09
13:10
13:11
13:12
13:13
13:14
13:15
13:16
13:17
13:18
13:19
13:20
13:21
13:22
13:23
13:24
13:25
13:26
13:27
13:28
13:29
13:30
13:32
13:33
13:34
13:37
13:38
13:39
13:41
13:48
13:49
14:01
14:04
14:05
14:09
14:16
14:37
(blank)
Click rate to phishing URL
•

•
• Person 1

•

•

•
•
Response Actions
MOBILE AND PERSONAL DEVICES
2. Advanced Endpoint Security
3. Cover all bases: Advanced Threat Protection
➢ ‘Defense-in-depth’ versus ‘Cover the kill chain’
➢ Next generation AI & Machine Learning
➢ Contextual Analysis
➢ Behavioural Analytics
➢ …
Azure ATPMicrosoft Defender ATP
Identity protectionEnd Point protection
Office 365 ATP
Windows Defender AV
User browses to a
website
Phishing
mail
Opens
attachment
Clicks on a URL
+
Exploitation
&
Installation
Command
&
Control
Brute force account or
use stolen account credentials
User account
is compromised
Attacker
attempts
lateral
movement
Privileged
account
compromised
Domain
compromised
Attacker accesses
sensitive data
Exfiltrate data
Phishing kill chain -
Attacker
performs
Reconnaissance
Next Gen AV
Email protection
Cloud App Security
Extends protection & conditional
access to other cloud apps
Azure AD Identity Protection
Identity protection &
conditional access
4. Disaster Recovery Plan
➢ What if…?
➢ Design & test the disaster recovery plan
➢ Back-up management
➢ Multiple back-up strategy (cloud, on & off site)
5. Don’t be shy -
Request help
Accidental Architecture
▪ Routers
▪ Switches
▪ Wireless Access
NETWORK
TEAM
MESSAGING
TEAM
SECURITY
TEAM
OS
TEAM
▪ Firewall
▪ IPS
▪ Web Application
▪ Desktop OS
▪ Antivirus
▪ Mobile Device Mgmt
▪ Email
▪ Instant Messaging
▪ Voice
▪ Unified Communication
Many Isolated teams & shattered knowledge
The security resources challenge
Too Few Resources
58% of companies get more than 5,000
alerts per month.
< 500
5%
500 – 1,000 1,001– 5,0005,001– 10,00010,001– 15,000 15,000+
10%
27%
28%
21%
9%
Too Many Alerts
One cyber analyst can handle roughly 10 alerts
per day, on one alert at a time
Security staff spends 80 % of their time in keeping
security tooling up and running, not in analysis…
Contact us:
cloudsecurity@secwise.be
Gaston Geenslaan 311 - B4
3000 – Leuven
www.SecWise.be
Koen Jacobs
Koen.Jacobs@secwise.be
M: +32 473/ 784 295
THANK YOU!

Contenu connexe

Tendances

Security is Hard
Security is HardSecurity is Hard
Security is Hard
Mike Murray
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 

Tendances (20)

Cambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacksCambodia CERT Seminar: Incident response for ransomeware attacks
Cambodia CERT Seminar: Incident response for ransomeware attacks
 
Cyber Security Services
Cyber Security ServicesCyber Security Services
Cyber Security Services
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Black fogdatasheet feb_2019
Black fogdatasheet feb_2019Black fogdatasheet feb_2019
Black fogdatasheet feb_2019
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
Top Cloud Security Risks of 2020
Top Cloud Security Risks of 2020Top Cloud Security Risks of 2020
Top Cloud Security Risks of 2020
 
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 Cyber Ethics: Cyber Security Services | VAPT and WAPT Cyber Ethics: Cyber Security Services | VAPT and WAPT
Cyber Ethics: Cyber Security Services | VAPT and WAPT
 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
 
Cyber Security Challenges and Strategies
Cyber Security Challenges and StrategiesCyber Security Challenges and Strategies
Cyber Security Challenges and Strategies
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
 
NormShieldBrochure
NormShieldBrochureNormShieldBrochure
NormShieldBrochure
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
eSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform SimplifiedeSentinel™ – 360° Cybersecurity Platform Simplified
eSentinel™ – 360° Cybersecurity Platform Simplified
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 

Similaire à Openbar Leuven // Top 5 focus areas in cyber security linked to you digital transformation - Koen Jacobs

Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 

Similaire à Openbar Leuven // Top 5 focus areas in cyber security linked to you digital transformation - Koen Jacobs (20)

"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Information Security
Information SecurityInformation Security
Information Security
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
ASMC 2017 - Martin Vliem - Security &lt; productivity &lt; security: syntax ...
ASMC 2017 - Martin Vliem -  Security &lt; productivity &lt; security: syntax ...ASMC 2017 - Martin Vliem -  Security &lt; productivity &lt; security: syntax ...
ASMC 2017 - Martin Vliem - Security &lt; productivity &lt; security: syntax ...
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Make Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your FavorMake Every Spin Count: Putting the Security Odds in Your Favor
Make Every Spin Count: Putting the Security Odds in Your Favor
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
LIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR OverviewLIFT OFF 2017: Ransomware and IR Overview
LIFT OFF 2017: Ransomware and IR Overview
 

Plus de Openbar

Openbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert WaltnielOpenbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar
 

Plus de Openbar (20)

Openbar Kontich Online // The Competences of the future: how we applied AI to...
Openbar Kontich Online // The Competences of the future: how we applied AI to...Openbar Kontich Online // The Competences of the future: how we applied AI to...
Openbar Kontich Online // The Competences of the future: how we applied AI to...
 
Openbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
Openbar Kontich Online // The Legal reality of VR and AR - Kris SeyenOpenbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
Openbar Kontich Online // The Legal reality of VR and AR - Kris Seyen
 
Openbar Leuven Online // Launching in Digital Space - Seb De Roover
Openbar Leuven Online // Launching in Digital Space - Seb De RooverOpenbar Leuven Online // Launching in Digital Space - Seb De Roover
Openbar Leuven Online // Launching in Digital Space - Seb De Roover
 
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
Openbar Leuven Online // How to Build and maintain your Agile Data Hub - Jona...
 
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
Openbar Leuven // Omnicannel chatbots in Retail - Sam Hendrickx en Michiel Va...
 
Openbar Kontich // The key to successful entrepreneurship
Openbar Kontich // The key to successful entrepreneurshipOpenbar Kontich // The key to successful entrepreneurship
Openbar Kontich // The key to successful entrepreneurship
 
Openbar Leuven // Science fiction and AI
Openbar Leuven // Science fiction and AIOpenbar Leuven // Science fiction and AI
Openbar Leuven // Science fiction and AI
 
Openbar Leuven // Ethics in technology - Laurens Somers
Openbar Leuven // Ethics in technology - Laurens Somers Openbar Leuven // Ethics in technology - Laurens Somers
Openbar Leuven // Ethics in technology - Laurens Somers
 
Openbar Kontich // How to create intelligent & personal conversational AI - W...
Openbar Kontich // How to create intelligent & personal conversational AI - W...Openbar Kontich // How to create intelligent & personal conversational AI - W...
Openbar Kontich // How to create intelligent & personal conversational AI - W...
 
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van BeeckOpenbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
Openbar Kontich // Unified e-commerce with Netsuite - Roger Van Beeck
 
Openbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
Openbar Leuven // Edge-Computing: On-device AI // Nick DestryckerOpenbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
Openbar Leuven // Edge-Computing: On-device AI // Nick Destrycker
 
Openbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert WaltnielOpenbar Leuven // What's up with augmented reality // Bert Waltniel
Openbar Leuven // What's up with augmented reality // Bert Waltniel
 
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
Openbar Kontich // Google Cloud: past, present and the (oh so sweet) future b...
 
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram ThysOpenbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
Openbar Kontich // Mobile app automation on a budget by Wim Vervust & Bram Thys
 
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
Openbar Leuven \\ Using API Management to improve developers productivity \\ ...
 
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
Openbar Kontich // Is your AI plotting to kill you? Why AI and Machine Learni...
 
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
Openbar Kontich // Serverless - A view from the business side by Stef Ceyssen...
 
Openbar Leuven // Safety first... in the Cloud by Koen Jacobs
Openbar Leuven // Safety first... in the Cloud by Koen JacobsOpenbar Leuven // Safety first... in the Cloud by Koen Jacobs
Openbar Leuven // Safety first... in the Cloud by Koen Jacobs
 
Openbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
Openbar Leuven // Less is more. Working with less data in NLP by Yves PeirsmanOpenbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
Openbar Leuven // Less is more. Working with less data in NLP by Yves Peirsman
 
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
Openbar Kontich // RPA: A Hype or a Proven Technology? by Tim Vangilbergen & ...
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Openbar Leuven // Top 5 focus areas in cyber security linked to you digital transformation - Koen Jacobs

  • 1.
  • 2.
  • 4.
  • 5.
  • 6. On-premises / Private cloud devices datausers apps THE WORLD BEFORE MOBILITY & CLOUD
  • 7. On-premises / Private cloud CLOUD APPS & SAAS SERVICES THE WORLD TODAY
  • 8. On-premises / Private cloud MOBILE AND PERSONAL DEVICES
  • 12.
  • 13. Economic Crimes in the World TOP FOUR Cybercrime is Now One of the
  • 14. Who is looking to attack you? Script kiddie Hacktivist Malicious insiders Hackers Cybercrime Syndicates Nation state sponsored hackers
  • 15.
  • 16.
  • 17. 1. The Basics: security hygiene ➢ Cyber security Awareness for end users ➢ Asset & Software management ➢ Vulnerability & patch management ➢ Multi-Factor Authentication (MFA) ➢ Privileged Access Management (PAM)
  • 18. Top 5 Threats today
  • 19. User browses to a website Phishing mail Opens attachment Clicks on a URL + Exploitation & Installation Command & Control Brute force account or use stolen account credentials User account is compromised Privileged account compromised Domain compromised Attacker accesses sensitive data Exfiltrate data Phishing kill chain - Attacker performs Reconnaissance
  • 20. sabrina@in-deed.be 6 people @ customer CASE: Phase 1: Initial User compromise through Phishing
  • 21. Person 1 Phase 1: Initial User compromise through Phishing
  • 22. • Person1         9990 Phase 2: Use compromised User for further phishing
  • 23. Phase 2: timeline Phish campaign 0 200 400 600 800 1000 1200 1400 1600 1800
  • 24. Phase 3: Further compromise other users clicking Phish URL (+ 100) 0 1 2 3 4 5 6 7 8 9 10 11:09 13:05 13:06 13:07 13:08 13:09 13:10 13:11 13:12 13:13 13:14 13:15 13:16 13:17 13:18 13:19 13:20 13:21 13:22 13:23 13:24 13:25 13:26 13:27 13:28 13:29 13:30 13:32 13:33 13:34 13:37 13:38 13:39 13:41 13:48 13:49 14:01 14:04 14:05 14:09 14:16 14:37 (blank) Click rate to phishing URL
  • 26. MOBILE AND PERSONAL DEVICES 2. Advanced Endpoint Security
  • 27.
  • 28. 3. Cover all bases: Advanced Threat Protection ➢ ‘Defense-in-depth’ versus ‘Cover the kill chain’ ➢ Next generation AI & Machine Learning ➢ Contextual Analysis ➢ Behavioural Analytics ➢ …
  • 29. Azure ATPMicrosoft Defender ATP Identity protectionEnd Point protection Office 365 ATP Windows Defender AV User browses to a website Phishing mail Opens attachment Clicks on a URL + Exploitation & Installation Command & Control Brute force account or use stolen account credentials User account is compromised Attacker attempts lateral movement Privileged account compromised Domain compromised Attacker accesses sensitive data Exfiltrate data Phishing kill chain - Attacker performs Reconnaissance Next Gen AV Email protection Cloud App Security Extends protection & conditional access to other cloud apps Azure AD Identity Protection Identity protection & conditional access
  • 30. 4. Disaster Recovery Plan ➢ What if…? ➢ Design & test the disaster recovery plan ➢ Back-up management ➢ Multiple back-up strategy (cloud, on & off site)
  • 31. 5. Don’t be shy - Request help
  • 32. Accidental Architecture ▪ Routers ▪ Switches ▪ Wireless Access NETWORK TEAM MESSAGING TEAM SECURITY TEAM OS TEAM ▪ Firewall ▪ IPS ▪ Web Application ▪ Desktop OS ▪ Antivirus ▪ Mobile Device Mgmt ▪ Email ▪ Instant Messaging ▪ Voice ▪ Unified Communication Many Isolated teams & shattered knowledge
  • 33. The security resources challenge Too Few Resources 58% of companies get more than 5,000 alerts per month. < 500 5% 500 – 1,000 1,001– 5,0005,001– 10,00010,001– 15,000 15,000+ 10% 27% 28% 21% 9% Too Many Alerts One cyber analyst can handle roughly 10 alerts per day, on one alert at a time Security staff spends 80 % of their time in keeping security tooling up and running, not in analysis…
  • 34.
  • 35.
  • 36. Contact us: cloudsecurity@secwise.be Gaston Geenslaan 311 - B4 3000 – Leuven www.SecWise.be Koen Jacobs Koen.Jacobs@secwise.be M: +32 473/ 784 295 THANK YOU!