1 of 15

Slide Notes

DownloadGo Live

CEO fraud - Kneip 24.11.2016

Published on Nov 18, 2015

No Description

PRESENTATION OUTLINE

Cyber Risks

The Good, The Bad and the Ugly
Photo by wiredforlego

Vulnerability

e.g. greed, love, sorrow, buffer overflow, unpatched system, CSRF...
Photo by misterbisson

Threat

e.g. script kiddie, "hacker", cyber-activist, cyber-criminal, state...
Photo by umezy12

Impact

e.g. money loss, data loss, fraud, service loss, reputation loss...
Photo by Domiriel

RISK = VULNERABILITY * THREAT * IMPACT

Photo by GotCredit

JOsef W. - CHAIRMAN, OCTOPUS GROUP

slowly recovers from a heart attack

discover what happened!

LIVE DEMO

CYBER Threat Landscape

Luxembourg
Photo by Furryscaly

Statistics 2014 (CIRCL)

Motivations

banking/presidential fraud

  • malware, phishing or social engineering (via phone) to access mailboxes
  • banking details changed / transactions executed
  • extreme cases: dedicated malware targeting corporate banking systems
  • targets: mainly huge invoice processing organisations
Photo by epSos.de

PREVENTION...

  • PEOPLE (awareness, training, competences...)
  • TECHNOLOGY (AV, WAF, IPS, SIEM, SUS...)
  • ORGANISATION (policies, procedures, responsabilities...)
  • COMPLIANCE (privacy, IP...)
Photo by Bods

...IS NOT ENOUGH

  • be organised, have a CISO
  • you are already compromised
  • be proactive, detect and handle (CERT)
  • prepare for a crisis
  • get an insurance
Photo by Reiterlied

DON'T SUFFER IN SILENCE

Pascal Steichen
SECURITY
MADEIN.LU