2016 conect_v1.1
Transcription
2016 conect_v1.1
THE WEAKEST LINK A PEAK INTO MODERN DAY CYBER CRIME COGNOSEC WHO WE ARE • IT Security Advisor & Provider • Penetration Test and Application Security Specialist • Implementation of holistic security solutions • PCI DSS Services (QSA, ASV, PA DSS and P2PE) • Extensive Experience in the e-Commerce, Payment, Gaming and Education Industry • Originated in Vienna, now we have offices around the world. COGNOSEC WORLDWIDE Stockholm, Sweden 7 13 Global Locations Vienna, Austria London, UK Dubai, UAE Global Technology Partners Nairobi, Kenya Lagos, Nigeria 4 Global Industry Certifications Johannesburg, South Africa South Africa – Dynamic Recovery Services (DRS) Trading As Cognosec Kenya - Professional Technologies Limited (Protec) Trading As Cognosec STATISTICS THE RISING THREAT OF CYBER CRIME Source: 2014 Verizon Data Breach Report STATISTICS THE HIGH COST OF DATA BREACHES Source: 2014 Cost of Data Breach Study: Global Analysis 2014 WAS CALLED “THE YEAR OF THE HACK” BUT… 2015 WAS WORSE! • Ashley Madison :: 32 million accounts stolen • Anthem :: 78 million accounts stolen • Fiat Chrysler :: car remotely hacked, 1,4 million cars recalled • IRS :: 334.000 accounts compromised • US Office Of Personnel Management :: 18 million accounts stolen • Premera Blue Cross :: 11 million accounts stolen • LastPass :: Systems compromised, no exact data exists • UCLA Health :: 4,5 million accounts stolen MUCH WORSE! • Carphone Warehouse :: 2,4 million accounts stolen • Vtech :: personal information of 6,4 million children exposed • Stagefright Android Vulnerability :: 1 billion devices affected • DYLD exploit :: OSX Zero day • T-Mobile (through Experian):: 15 million accounts stolen • Juniper Network Netscreen firewalls:: 2 backdoors in firewalls • Gemalto :: systems compromised, sim crypto keys in 85 countries at risk • Kaspersky Labs :: systems compromised MUCH MUCH WORSE! • Hacking Team :: systems compromised, data leaked, FBI Portal accessed • CIA Director John Brennan :: email account compromised, data leaked • TalkTalk :: 157.000 accounts compromised • Vodaphone :: only 2000 accounts compromised • Samsung :: Looppay compromised • Hilton Worldwide :: Systems compromised • Xcode Ghost :: fake Apple apps AND IT IS ONLY GOING TO GET WORSE THE GROWNING CYBERATTACK SURFACE AND IT IS ONLY GOING TO GET WORSE NEW DEVICE TYPES THE SECURITY CHAIN PEOPLE, PROCESSES AND TECHNOLOGY ALTERNATIVE ATTACK VECTORS TECHNOLOGY • Malware • QR Codes • Key logging Devices • Infecting Service Providers • Arduino-Based Attack (False USB Sticks) • Wireless Network/AP Spoofing (Evil AP) • And Many More ALTERNATIVE ATTACK VECTORS PEOPLE • Social Engineering • QR Codes • Spear Phishing • Keylogging Devices • Telephone Spoofing • “Bad” USB • SMS Spoofing • Evil AP • Watering Holes • And Many More • Malware ALTERNATIVE ATTACK VECTORS PROCESSES • Hacked Apple iCloud • Password reset process • Keycard replacement • And Many More NEXT-GENERATION CYBERDEFENSE AXIOMS SERVICE OVERVIEW Assurance Services Security Services GRC Services PCI Services •Penetration Testing •Application Security Testing •Social Engineering •IS Audits •Data Leakage & Loss Prevention •Security Monitoring •Application Security •Incident Response •Network Security •Compliance Gap Assessment •Risk Assessment •GRC Solutions •Information Security Management (incl. ISMS) •PCI ASV Security Scan •PCI QSA On-Site Assessment •PCI Gap Assessment •Remediation •Security Awareness Programme WE WANT YOUR FEEDBACK! Please complete your session evaluation within the MRC mobile app or return a paper evaluation on your way out. **Insert session title here** Speakers: Name, Company THANKS FOR LISTENING Key Takeaways 1) Takeaway 1 2) Takeaway 2 3) Takeaway 3 4) Takeaway 4 SINCERELY, YOUR CYBER GUARDIANS