SlideShare una empresa de Scribd logo
1 de 11
The Reading Room, 14th December 2013
Drew Graham, CTO
drew@evtech.asia
www.evantage-technology.com +65 6592 5450
“eVantage Technology allows me to sleep
sounder at night.”
- Mike Meade, CEO, M3 Marine
Office 365 migrations and services
Microsoft hybrid cloud solutions
Contract support and outsourced CTO
“IT is the 4th utility service. The eVantage
Technology team are proactive in their
approach and allow our staff to focus on their
business.”
- Andy Currie, CIO, Swire OS
Singapore - Hong Kong - Myanmar
www.evantage-technology.com +65 6592 5450
1. Evolution of Cybercrime
2. Future of Cybercrime
3. Mass “Consumer” Attacks
4. Targeted Attacks
www.evantage-technology.com +65 6592 5450
1980s
Bedroom hackers
Annoying viruses
1990s
Commercial hackers
Viruses winning
2000s
Hugely profitable
Botnets
2010s
State hacking
Information stealing
www.evantage-technology.com +65 6592 5450
State
Cyber ”crime”
Lower
Threshold For
Targeted Attacks
Mass Social
Engineering
www.evantage-technology.com +65 6592 5450
Why do Nigerian “419” scammers
say that they’re from Nigeria?
Cormac Herley, Microsoft Research
www.evantage-technology.com +65 6592 5450
“You don’t have to run faster than
the bear to get away. You just have
to run faster than the guy next to
you.”
Jim Butcher, Author
www.evantage-technology.com +65 6592 5450
“If you protect your paper clips and
diamonds with equal vigour, you’ll
soon have more paper clips and
fewer diamonds.”
Dean Rusk, US Secretary of State, 1961-1969
www.evantage-technology.com +65 6592 5450
“Why do I rob banks? Because that’s
where the money is.”
Willie Sutton, Bank Robber
www.evantage-technology.com +65 6592 5450
Paper Clips
• User education
• Centralised anti-virus
software
• Keep software patched
• Firewalls
Diamonds
• Isolate your networks
• Secondary access
requirements
• Two factor
authentication
• Encrypt your diamonds
www.evantage-technology.com +65 6592 5450
Singapore - Hong Kong - Myanmar
Drew Graham, CTO
drew@evtech.asia
www.evantage-technology.com +65 6592 5450

Más contenido relacionado

La actualidad más candente

Michael curry security
Michael curry securityMichael curry security
Michael curry security
MassTLC
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015
Antoine Chaya
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2016
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

La actualidad más candente (20)

Michael curry security
Michael curry securityMichael curry security
Michael curry security
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015Trends in Information Technology Spending in 2015
Trends in Information Technology Spending in 2015
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Trend Micro 10 Minute Overview
Trend Micro 10 Minute OverviewTrend Micro 10 Minute Overview
Trend Micro 10 Minute Overview
 
L123
L123L123
L123
 
Location: Trends, Ethics & Diversity
Location: Trends, Ethics & DiversityLocation: Trends, Ethics & Diversity
Location: Trends, Ethics & Diversity
 
Cloud computing fact or fiction
Cloud computing fact or fictionCloud computing fact or fiction
Cloud computing fact or fiction
 
Secrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the sceneSecrets of getting Legacy to Cloud - setting the scene
Secrets of getting Legacy to Cloud - setting the scene
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Innovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart SecurityInnovation & Business Acquisitions of Smart Security
Innovation & Business Acquisitions of Smart Security
 
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary SingularityThe Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
The Next Tsunami AI Blockchain IOT and Our Swarm Evolutionary Singularity
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
festival ICT 2013: L’evoluzione della sicurezza verso la nuova era della Smar...
 
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & TechnologyThe Cloud: Insurance Aggregation, Cloud Contracts & Technology
The Cloud: Insurance Aggregation, Cloud Contracts & Technology
 
Top Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart InfrastructureTop Ten Challenges of Securing Smart Infrastructure
Top Ten Challenges of Securing Smart Infrastructure
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 

Destacado

Meaning and concept of ict
Meaning and concept of ictMeaning and concept of ict
Meaning and concept of ict
Suresh Kumar
 
A Power Supply (Complete)
A Power Supply (Complete)A Power Supply (Complete)
A Power Supply (Complete)
Arif Nazeer
 
Power Supply Project
Power Supply ProjectPower Supply Project
Power Supply Project
usmanhadi91
 
Processor powerpoint
Processor powerpointProcessor powerpoint
Processor powerpoint
brennan_jame
 

Destacado (17)

Internal hardware
Internal hardwareInternal hardware
Internal hardware
 
Basic ICT Myanmar
Basic ICT MyanmarBasic ICT Myanmar
Basic ICT Myanmar
 
Meaning and concept of ict
Meaning and concept of ictMeaning and concept of ict
Meaning and concept of ict
 
Internal hardware
Internal hardwareInternal hardware
Internal hardware
 
Power supply
Power supplyPower supply
Power supply
 
Jireh ict
Jireh ictJireh ict
Jireh ict
 
Operating system 11.10.2016 adarsh bang
Operating system 11.10.2016 adarsh bangOperating system 11.10.2016 adarsh bang
Operating system 11.10.2016 adarsh bang
 
Comp hardware Introduction
Comp hardware IntroductionComp hardware Introduction
Comp hardware Introduction
 
Basic computer hardware and software
Basic computer hardware and softwareBasic computer hardware and software
Basic computer hardware and software
 
My presentation on 'computer hardware component' {hardware}
My presentation on 'computer hardware component' {hardware}My presentation on 'computer hardware component' {hardware}
My presentation on 'computer hardware component' {hardware}
 
A Power Supply (Complete)
A Power Supply (Complete)A Power Supply (Complete)
A Power Supply (Complete)
 
Power Supply
Power SupplyPower Supply
Power Supply
 
Power Supply Project
Power Supply ProjectPower Supply Project
Power Supply Project
 
Processor powerpoint
Processor powerpointProcessor powerpoint
Processor powerpoint
 
Intel I3,I5,I7 Processor
Intel I3,I5,I7 ProcessorIntel I3,I5,I7 Processor
Intel I3,I5,I7 Processor
 
Computer Software & its Types
Computer Software & its Types Computer Software & its Types
Computer Software & its Types
 
Power supply
Power supplyPower supply
Power supply
 

Similar a Evantage Technology Cybersecurity presentation

Similar a Evantage Technology Cybersecurity presentation (20)

Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence Analyst
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
Cyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never ForgetCyber Security in UAE - Trends That You Should Never Forget
Cyber Security in UAE - Trends That You Should Never Forget
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
Digital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration DatasheetDigital Shadows and Palo Alto Networks Integration Datasheet
Digital Shadows and Palo Alto Networks Integration Datasheet
 
Disrupt or be disrupted
Disrupt or be disruptedDisrupt or be disrupted
Disrupt or be disrupted
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
E magazine april 2018
E magazine april 2018E magazine april 2018
E magazine april 2018
 
The Hand That Strikes, Also Blocks
The Hand That Strikes, Also BlocksThe Hand That Strikes, Also Blocks
The Hand That Strikes, Also Blocks
 
The 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdfThe 10 Most Influential Women In Cyber Security,2023.pdf
The 10 Most Influential Women In Cyber Security,2023.pdf
 
The future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act nowThe future work force in the ICT industry and why you need to act now
The future work force in the ICT industry and why you need to act now
 
E- magazine May-2017
E- magazine May-2017E- magazine May-2017
E- magazine May-2017
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 

Más de Reading Room

Más de Reading Room (20)

National Archives - C is for Content Event
National Archives - C is for Content EventNational Archives - C is for Content Event
National Archives - C is for Content Event
 
C is for content final happy hour
C is for content final happy hourC is for content final happy hour
C is for content final happy hour
 
4 reading room presentation kingspan content
4  reading room presentation kingspan content4  reading room presentation kingspan content
4 reading room presentation kingspan content
 
3 mark b catalyst social content presentation
3   mark b catalyst   social content presentation3   mark b catalyst   social content presentation
3 mark b catalyst social content presentation
 
Digital Branding
Digital BrandingDigital Branding
Digital Branding
 
Digital Branding
Digital BrandingDigital Branding
Digital Branding
 
The next level in personalisation
The next level in personalisationThe next level in personalisation
The next level in personalisation
 
An introduction to multi channel content strategy
An introduction to multi channel content strategyAn introduction to multi channel content strategy
An introduction to multi channel content strategy
 
Creating exceptional experiences in a multi-devices world
Creating exceptional experiences in a multi-devices worldCreating exceptional experiences in a multi-devices world
Creating exceptional experiences in a multi-devices world
 
3 myths about digital conversion
3 myths about digital conversion3 myths about digital conversion
3 myths about digital conversion
 
Dating a millennial – the path to purchase model
Dating a millennial – the path to purchase modelDating a millennial – the path to purchase model
Dating a millennial – the path to purchase model
 
Digital Readiness - Get your business ready for digital change
Digital Readiness - Get your business ready for digital changeDigital Readiness - Get your business ready for digital change
Digital Readiness - Get your business ready for digital change
 
Inside Consumers' Mind - A whitepaper by Reading Room
Inside Consumers' Mind - A whitepaper by Reading RoomInside Consumers' Mind - A whitepaper by Reading Room
Inside Consumers' Mind - A whitepaper by Reading Room
 
Developing seamless consumer experiences across multichannel platforms
Developing seamless consumer experiences across multichannel platformsDeveloping seamless consumer experiences across multichannel platforms
Developing seamless consumer experiences across multichannel platforms
 
Why the humble whiteboard will trump technology in 2015
Why the humble whiteboard will trump technology in 2015Why the humble whiteboard will trump technology in 2015
Why the humble whiteboard will trump technology in 2015
 
Enough Psycho- Babble ... Show me
Enough Psycho- Babble ... Show meEnough Psycho- Babble ... Show me
Enough Psycho- Babble ... Show me
 
Sitecore: Web psychology and customer experience
Sitecore:  Web psychology and customer experienceSitecore:  Web psychology and customer experience
Sitecore: Web psychology and customer experience
 
The importance of behavioural psychology on digital strategy
The importance of behavioural psychology on digital strategyThe importance of behavioural psychology on digital strategy
The importance of behavioural psychology on digital strategy
 
Choice in digital – Can you have too much of a good thing?
Choice in digital – Can you have too much of a good thing?Choice in digital – Can you have too much of a good thing?
Choice in digital – Can you have too much of a good thing?
 
Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...Agile for enterprise - Architecting digital change using agile as a strategy ...
Agile for enterprise - Architecting digital change using agile as a strategy ...
 

Último

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 

Evantage Technology Cybersecurity presentation

  • 1. The Reading Room, 14th December 2013 Drew Graham, CTO drew@evtech.asia www.evantage-technology.com +65 6592 5450
  • 2. “eVantage Technology allows me to sleep sounder at night.” - Mike Meade, CEO, M3 Marine Office 365 migrations and services Microsoft hybrid cloud solutions Contract support and outsourced CTO “IT is the 4th utility service. The eVantage Technology team are proactive in their approach and allow our staff to focus on their business.” - Andy Currie, CIO, Swire OS Singapore - Hong Kong - Myanmar www.evantage-technology.com +65 6592 5450
  • 3. 1. Evolution of Cybercrime 2. Future of Cybercrime 3. Mass “Consumer” Attacks 4. Targeted Attacks www.evantage-technology.com +65 6592 5450
  • 4. 1980s Bedroom hackers Annoying viruses 1990s Commercial hackers Viruses winning 2000s Hugely profitable Botnets 2010s State hacking Information stealing www.evantage-technology.com +65 6592 5450
  • 5. State Cyber ”crime” Lower Threshold For Targeted Attacks Mass Social Engineering www.evantage-technology.com +65 6592 5450
  • 6. Why do Nigerian “419” scammers say that they’re from Nigeria? Cormac Herley, Microsoft Research www.evantage-technology.com +65 6592 5450
  • 7. “You don’t have to run faster than the bear to get away. You just have to run faster than the guy next to you.” Jim Butcher, Author www.evantage-technology.com +65 6592 5450
  • 8. “If you protect your paper clips and diamonds with equal vigour, you’ll soon have more paper clips and fewer diamonds.” Dean Rusk, US Secretary of State, 1961-1969 www.evantage-technology.com +65 6592 5450
  • 9. “Why do I rob banks? Because that’s where the money is.” Willie Sutton, Bank Robber www.evantage-technology.com +65 6592 5450
  • 10. Paper Clips • User education • Centralised anti-virus software • Keep software patched • Firewalls Diamonds • Isolate your networks • Secondary access requirements • Two factor authentication • Encrypt your diamonds www.evantage-technology.com +65 6592 5450
  • 11. Singapore - Hong Kong - Myanmar Drew Graham, CTO drew@evtech.asia www.evantage-technology.com +65 6592 5450