SlideShare a Scribd company logo
1 of 21
Create Awareness against Cyber Attacks!
5
Question!
Keepnet Labs
6
95% of successful attacks on corporations are based on phishing e-mails!
97%
The percentage of
those who do not
notice a complicated
phishing e-mail
3%
The percentage
of those who
notice phishing
e-mails and
inform their
management
2.1 trillion $
Total cost of sectors of cybercrime
and data leakage forecast for 2019
STATISTICS
Keepnet Labs
7
Institutions’ Expenditure on Security
HUMAN FACTOR
Keepnet Labs
12%
The percentage
to strenghen the
«HUMAN» layer
88%
The percentage
to strenghen
«other» layers
8
“Phishing e-mails will continue to be the primary method
used by advanced attacks until 2020.
Gartner
9
First, focus should be on the "human"
factor. Institutions should teach the
employees to be more conscious
against the cyber attacks by using
practicality, attention and
consciousness, by analyzing their
behavior as well as creating a change in
behavior.
institutions should periodically test
themselves against the new generation of
threats based on organization's cultural
background, technical infrastructure and the
risks. By measuring results, organisations
measure the root causes of problems, the
efficiency of investments, and the ability to
resist potential risks.
To prevent leaks, institutions should
regularly test Antispam, Antivirus,
Content Filtering, DLP, Zero Day
protection mechanisms against new
types of malware and improve against
missing or incorrect configurations.
PEOPLE PROCESS TECHNOLOGY
SOLUTION FORMULA
Keepnet Labs
10
WHAT DO WE DO DIFFERENT?
Keepnet Labs
Email Threat Simulation Service
Cyber Intelligence Service
Educational Integration Modules with third Party Systems (eg game)
On-Premise Version
Cyber Security Awareness Process Management System
Integrating with CRM Applications
Analysis and Detection of Phishing Attacks with Artificial Intelligence (client and server side)
Harmful Email Analysis and Integrated Attack Prevention System
People, Process, Technology-focused holistic approach
11
WHAT DO WE DO DIFFERENT?
Keepnet Labs
PEOPLE
Phishing Simulator
Education
Suspicious Activity
Reporting
PROCESS
Annual Plan
Monthly Newsletter
and Notifications
Development Chart
TECHNOLOGY
On Premise
Cyber Intelligence
Artificial Intelligence
Support
Threat Simulation
12
KEEPNET LABS MODULES
Keepnet Labs
13
Keepnet Labs allows you to run phishing tests with different phishing scenarios and create
campaigns that will increase awareness.
PHISHING SIMULATOR
Phishing Module
14
By learning new generation phishing attacks, we can test the new generation APT products (Fireeye, Deep Security etc.) and the
anomaly detection systems (SIEM) along with traditional protection mechanisms (Antispam, Antivirus, Content Filter etc.) and
configure the protection options you observe.
EMAIL THREAT SIMULATION
ETS Module
15
User GroupsData Breach
Chat RoomsActivist Forums
Social Media
Search Engines
CYBER INTELLIGENCE
Cyber Intelligence Support
This option allows you to take action against the attacks and its effects early by learning sensitive data
belonging to the company (e-mail address, password, domains similar to domain name, etc.) from leaked data
and anonymous sources
Dark Web
BotNet Systems
Intelligence Resources
CMS Systems
16
SUSPICIOUS EMAIL REPORTER AND ANALYSIS TOOL
Outlook Plugin Support for Users
It provides suspicious email notification and analysis tools to turn users into active intrusion detection sensors and
reduce risky actions.
17
HTML5 Based
Video
Exam
Survey
EDUCATION MODULE
Special training solutions for institutional needs
Game
Newsletter
Monthly Notifications
Posters
Tips & Suggestions
Caricature
E-mail Signature
Screen Savers
18
Campaign
Based
User, Department
Based
Development
Chart
REPORTING
Your campaigns are best reported
Clicking, Reading
Based
Retrospective
Comparison
OS and
Browser Based
It develops targeted, focused trainings and provides
detailed statistics by increasing knowledge / awareness
and attention by making education a part of work
experience. In order to develop technical measures,
the existing system will also report on technical status
of current systems against malwares, phishing attacks,
and ensure that it is sustainable.
19
OUR TEAM
Our experts and their tasks
Founder
Business Development Manager
Financial Manager
Sales Manager
Project Manager
Developer
Senior Developer
UK Manager
USA Manager
Account Manager
Advisor
20
TRUSTED BY
47 Technology 39 Financial Services 29 Production 23 Banks 17 Informatics
307+ others7 E-commerce9 Holding11 Education11 Energy
Social Media
facebook.com/keepnetlabs
twitter.com/keepnetlabs
Thanks
Information Security Awareness Solution!

More Related Content

What's hot

Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_SurveyTripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
Melloney Jewell
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
Eric Zhuo
 

What's hot (20)

The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
 
Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018 Proofpoint Understanding Email Fraud in 2018
Proofpoint Understanding Email Fraud in 2018
 
6 Most Popular Threat Modeling Methodologies
 6 Most Popular Threat Modeling Methodologies 6 Most Popular Threat Modeling Methodologies
6 Most Popular Threat Modeling Methodologies
 
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_SurveyTripwire_UK_Executive_Cybersecurity_Literacy_Survey
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
51 phishing attacks
51 phishing attacks51 phishing attacks
51 phishing attacks
 
51 phishing attacks
51 phishing attacks51 phishing attacks
51 phishing attacks
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 

Similar to Keepnet Labs. Cybersecurity Awareness 5min. Presentation

InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 

Similar to Keepnet Labs. Cybersecurity Awareness 5min. Presentation (20)

Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using ML
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
Security (Ignorance) Isn't Bliss: 5 Ways to Advance Security Decisions with T...
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
Understanding Advanced Cybersecurity Threats for the In-House Counsel
Understanding Advanced Cybersecurity Threats for the In-House CounselUnderstanding Advanced Cybersecurity Threats for the In-House Counsel
Understanding Advanced Cybersecurity Threats for the In-House Counsel
 
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docxPhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Keepnet Labs. Cybersecurity Awareness 5min. Presentation

  • 1. Create Awareness against Cyber Attacks!
  • 2.
  • 3.
  • 4.
  • 6. 6 95% of successful attacks on corporations are based on phishing e-mails! 97% The percentage of those who do not notice a complicated phishing e-mail 3% The percentage of those who notice phishing e-mails and inform their management 2.1 trillion $ Total cost of sectors of cybercrime and data leakage forecast for 2019 STATISTICS Keepnet Labs
  • 7. 7 Institutions’ Expenditure on Security HUMAN FACTOR Keepnet Labs 12% The percentage to strenghen the «HUMAN» layer 88% The percentage to strenghen «other» layers
  • 8. 8 “Phishing e-mails will continue to be the primary method used by advanced attacks until 2020. Gartner
  • 9. 9 First, focus should be on the "human" factor. Institutions should teach the employees to be more conscious against the cyber attacks by using practicality, attention and consciousness, by analyzing their behavior as well as creating a change in behavior. institutions should periodically test themselves against the new generation of threats based on organization's cultural background, technical infrastructure and the risks. By measuring results, organisations measure the root causes of problems, the efficiency of investments, and the ability to resist potential risks. To prevent leaks, institutions should regularly test Antispam, Antivirus, Content Filtering, DLP, Zero Day protection mechanisms against new types of malware and improve against missing or incorrect configurations. PEOPLE PROCESS TECHNOLOGY SOLUTION FORMULA Keepnet Labs
  • 10. 10 WHAT DO WE DO DIFFERENT? Keepnet Labs Email Threat Simulation Service Cyber Intelligence Service Educational Integration Modules with third Party Systems (eg game) On-Premise Version Cyber Security Awareness Process Management System Integrating with CRM Applications Analysis and Detection of Phishing Attacks with Artificial Intelligence (client and server side) Harmful Email Analysis and Integrated Attack Prevention System People, Process, Technology-focused holistic approach
  • 11. 11 WHAT DO WE DO DIFFERENT? Keepnet Labs PEOPLE Phishing Simulator Education Suspicious Activity Reporting PROCESS Annual Plan Monthly Newsletter and Notifications Development Chart TECHNOLOGY On Premise Cyber Intelligence Artificial Intelligence Support Threat Simulation
  • 13. 13 Keepnet Labs allows you to run phishing tests with different phishing scenarios and create campaigns that will increase awareness. PHISHING SIMULATOR Phishing Module
  • 14. 14 By learning new generation phishing attacks, we can test the new generation APT products (Fireeye, Deep Security etc.) and the anomaly detection systems (SIEM) along with traditional protection mechanisms (Antispam, Antivirus, Content Filter etc.) and configure the protection options you observe. EMAIL THREAT SIMULATION ETS Module
  • 15. 15 User GroupsData Breach Chat RoomsActivist Forums Social Media Search Engines CYBER INTELLIGENCE Cyber Intelligence Support This option allows you to take action against the attacks and its effects early by learning sensitive data belonging to the company (e-mail address, password, domains similar to domain name, etc.) from leaked data and anonymous sources Dark Web BotNet Systems Intelligence Resources CMS Systems
  • 16. 16 SUSPICIOUS EMAIL REPORTER AND ANALYSIS TOOL Outlook Plugin Support for Users It provides suspicious email notification and analysis tools to turn users into active intrusion detection sensors and reduce risky actions.
  • 17. 17 HTML5 Based Video Exam Survey EDUCATION MODULE Special training solutions for institutional needs Game Newsletter Monthly Notifications Posters Tips & Suggestions Caricature E-mail Signature Screen Savers
  • 18. 18 Campaign Based User, Department Based Development Chart REPORTING Your campaigns are best reported Clicking, Reading Based Retrospective Comparison OS and Browser Based It develops targeted, focused trainings and provides detailed statistics by increasing knowledge / awareness and attention by making education a part of work experience. In order to develop technical measures, the existing system will also report on technical status of current systems against malwares, phishing attacks, and ensure that it is sustainable.
  • 19. 19 OUR TEAM Our experts and their tasks Founder Business Development Manager Financial Manager Sales Manager Project Manager Developer Senior Developer UK Manager USA Manager Account Manager Advisor
  • 20. 20 TRUSTED BY 47 Technology 39 Financial Services 29 Production 23 Banks 17 Informatics 307+ others7 E-commerce9 Holding11 Education11 Energy

Editor's Notes

  1. 95 percent of all attacks on enterprise networks are the result of successful spear phishing. (Source: SANS Institute) 97 percent of people around the world cannot identify a sophisticated phishing email. (Source: Intel) Only three percent of targeted users report malicious emails to management. (Source: Verizon) By 2019, the cost of cybercrime and data breaches will rise to $2.1 trillion. (Source: Juniper Research 2016) After your company is breached, 60 percent of your customers will think about moving and 30 percent actually do. (Source: Aviva) -- bunu yazmadım, istersen sözlü söyle, ya da ekleyelim mi? In 2015, 736 million records were exposed due to a record-setting 3,930 data breaches. (Source: CSO online) The average cost of a data breach increased 15 percent in 2015 to $3.8 million. (Source: Ponemon) By 2020, more than 1.5 billion people (one-quarter of the world’s population) will be affected by data breaches. (Source: IDC) The cost incurred for each lost or stolen record containing sensitive and confidential information increased six percent in 2015, from $145 to $154. (Source: IBM) One-third of consumers said they would stop dealing with a business following a cyber-security breach, even if they do not suffer a material loss. (Source: Deloitte)
  2. Burada slide da yazanları okursun, sonra da aşağıdaki cümle ile devam edersin. Başarılı saldırıların kaynağının %95 ile olatama saldırılarını açıp, linkleri tıklayan ya da dosyaları indiren çalışanlar olduğu düşünülürse, siber saldırganlara karşı neden kaybettiğimiz ortaada değil mi?.
  3. Keepnet Labs is an integrated cyber security awareness platform, adopts a holistic defense approach focused on "people, process and technology". It possesses a training method and a new generation of educational materials aimed at changing human behavior. With the cyber intelligence network, it warns the potential infiltrations and security breaches early It turn users into active intrusion detection sensors and reduce risky actions.