SlideShare una empresa de Scribd logo
1 de 53
WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK”
www.cyberwiser.eu @cyberwiser
Co-funded by the European Commission
Horizon 2020 – Grant # 653321
Antonio Álvarez Romero
Atos Spain
Tackling today's cyber security challenges -
WISER Services & Solutions
Riga – 27th October, 2016
Presentation at DSS ITSEC
1
Outline
Business on the Internet: Cyber landscape
Cyber security as a challenge
CyberWISER as a solution
CyberWISER services portfolio
Conclusions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 2
Outline
Business on the Internet: Cyber landscape
Cyber security as a challenge
CyberWISER as a solution
CyberWISER services portfolio
Conclusions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 3
Business on the Internet: Cyber landscape
The global adoption of the Internet
© WISER 2016 www.cyberwiser.eu - @cyberwiser
4
World population (2016 est.) 7,340,093,380
Internet users (as of 30/06) 3,611,375,813
% Penetration (world) 49.2
Internet users (end 2000) 360,993,184
% growth 2000-2016 900.4
Being on the Internet means to have near 4000
million of potential customers!
internetworldstats.com
Business on the Internet: Cyber landscape
Internet as a mean to make business
© WISER 2016 www.cyberwiser.eu - @cyberwiser 5
According to a study from McAfee, Internet
economy generates between $2 and $3 trillion
a year.
The share of the global economy is expected to grow
rapidly
The U.S. e-commerce economy is worth $349
billion while China´s is worth $562 billion
https://hostingfacts.com/internet-facts-stats-2016/Very huge turnover directly related to the Internet
Business on the Internet: Cyber landscape
Internet as a mean to make business
© WISER 2016 www.cyberwiser.eu - @cyberwiser 6
Very huge turnover directly related to the Internet
B2C e-commerce sales worldwide from 2012 to 2018
(in billion U.S. dollars)
Business on the Internet: Cyber landscape
Internet as a mean to make business
© WISER 2016 www.cyberwiser.eu - @cyberwiser
7
40% of Internet users (more than 1 billion
people) have bought products or goods online
8 out of 10 consumers will shop online if
offered free shipping
Internet is not only about accessing huge amounts of information, it is
transforming the consumption habits
Business on the Internet: Cyber landscape
Internet as a mean to make business
© WISER 2016 www.cyberwiser.eu - @cyberwiser 8
There are around 966 million websites in the world today
The average e-commerce site takes
7.12 seconds avg to load in Internet Explorer 9
7.15 seconds avg to load in Firefox 7
7.59 seconds avg to load in Google Chrome
40% of web users will abandon a website if it takes longer than 3 seconds to load
and 60% will not return to the site
51% of U.S. online shoppers say slow site loading is a top reason to abandon a
purchase
Slow loading websites cost the U.S. e-commerce market more than $500 billion annually.
38% of British consumers say social media interaction was one of the reasons for
visiting a retailer website
The competition is fierce:
websites must be reliable, visible and highly responsive
Business on the Internet: cyber landscape
Internet as a mean to make business
© WISER 2016 www.cyberwiser.eu - @cyberwiser
9
Call centers Chat centers
Trading
companies
Retail
businesses
Service firms
Financial
institutions
News Media Restaurants
Internet
Marketing
Web hosting
companies
Insurance
providers
Medical
centers
Several kinds of businesses are 100% dependent on the Internet
The dependence is sort of dramatic
VoIP dependent
No Internet, no reps working
Long wait time, angry clients
No Internet, no agents working
Quick loss of business
Clients get no feedback
Based on speed
Bad latency means no business
Loss of trading opportunities
Sales software dependent
Real-time access for inventory
Credit card payments rely on terminals
Teams cannot work together
No access to repositories
No interraction with clients
Dependent on central systems
Branches need reliable connection
No connection, no data, no biz
Need to be the first for storytelling
Pictures taken on-site and live feeds
No Internet impacts competitiveness
Need Internet for payments
Need Internet for ordering
On-line or phone orders management
Social media management
Viral campaigns management
Communication with clients
Need to minimize downtimes
Downtimes means losses
Clients´web must be live Access to claims database
Access to history info for pricing
Management of clients
Patient information management
Online format replaces physical
Critical patients care
https://www.mushroomnetworks.com/blog/2015/12/03/is-your-business-internet-dependent-15-businesses
Business on the Internet: Cyber landscape
Internet as a mean to make business
© WISER 2016 www.cyberwiser.eu - @cyberwiser 10
So… Internet is one of the biggest successes ever
But, as everything, there is a flip side or, in this case…
an evil side
Outline
Business on the Internet: Cyber landscape
Cyber security as a challenge
CyberWISER as a solution
CyberWISER services portfolio
Conclusions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 11
Cybersecurity as a challenge
What is cybercrime?
© WISER 2016 www.cyberwiser.eu - @cyberwiser 12
Definition of cybercrime
Cybercrime is the use of a computer as an
instrument to further illegal ends, such as
committing fraud, trafficking in child pornography
and intellectual property, stealing identities or
violating privacy
Enciclopaedia Britannica
Cybersecurity as a challenge
Some facts about cybercrime
© WISER 2016 www.cyberwiser.eu - @cyberwiser
13
An estimated 37,000 websites are hacked every day.
Cyber insurance market has grown from $1 billion to $2.5 billion over the
last two years
Very focused on the U.S
Measuring the annual cost of cybercrime worldwide is a major challenge.
McAfee dared to do that: they say that the losses are of $445 billion per year,
what means around 20% of the Internet economy value
http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf
Lloyd´s estimated $400 billion per year.
http://fortune.com/2015/01/23/cyber-attack-insurance-lloyds/
Cybercrime costs are kind of a very high tax paid to criminals that
hinders the growth of the global economy
Cybersecurity as a challenge
Some facts about cybercrime
© WISER 2016 www.cyberwiser.eu - @cyberwiser 14
Biggest online data breaches worldwide
Cybersecurity as a challenge
Some facts about cybercrime
© WISER 2016 www.cyberwiser.eu - @cyberwiser 15
Cyber attackers´ preferred targets are large corporate businesses, critical
infrastructures and small enterprises
Research shows that small businesses were on average the victims of around 7 million
cybercrimes a year in 2014 and 2015
UK Federation of Small Businesses: Cyber Resilience: How To Protect Small Firms In The Digital
Economy (June 2016)
The University of Oxford tries to profile the cyber criminal
Internal disgruntled technical employee
Interested in theft of personal information, money and intellectual property
Interested in extorting the company and clients
Profiling the Cyber criminal, University of Oxford, https://www.sbs.ox.ac.uk/cybersecurity-
capacity/content/profiling-cybercriminal
Cybersecurity as a challenge
Some facts about cybercrime
© WISER 2016 www.cyberwiser.eu - @cyberwiser 16
Cyber threats have evolved from targeting and
harming computer, networks and
smartphones, to targeting people, cars,
railways, planes, powergrids and anything
with a heartbeat or an electronic pulse
The more connected the world is,
the more varied the targets for cyber attacks become
Cybersecurity as a challenge
Cyberattacks among the top global risks
(according to 2016 Global Risk Report by the World Economic Forum)
Cybersecurity as a challenge
Cyberattacks connections to other kinds of risks
(according to 2016 Global Risk Report by the World Economic Forum)
Cyberattacks Ilicit trade
State collapse
or crisis
Data frauds or
theft
Interstate
conflict
Failure of financial
mechanism or
institution
Terrorist
attacks
Failure of national
governance
Failure of critical
infrastructure
© WISER 2016 www.cyberwiser.eu - @cyberwiser
Background
© WISER 2016 www.cyberwiser.eu - @cyberwiser 19
Cybercrime in press
Cybersecurity as a challenge
The unbalanced battle: hackers vs institutions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 20
Black-Hat hackers are motivated by money,
espionage, notoriety and malicious intent. They
are faster, more daring and more experienced
than White-Hats, who are constrained by
boundaries and rules
Putting in place the appropriate barriers to
prevent attackers from succeeding is currently
expensive in terms of time, skills, hardware and
software resources needed
EU Legislation & National Strategies
WISER EU National Strategies watch
Tracking capacity building & business
initiatives: Important updates to ENISA
interactive map & BSA Dashboard (data
collected in 2014)
Analysis & interviews with CERTs/National
Cyber Security Centres
Identification of best practices & innovative
approaches
Interactive free tool available online at:
www.cyberwiser.eu/cartography
21
© WISER 2016 www.cyberwiser.eu - @cyberwiser
How EU is addressing Cyber Crime
Cybersecurity as a challenge
The unbalanced battle: failing solutions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 22
Sophisticated solutions do exist, but they usually
combine an IT side with a risk management framework
strategy.
Only large companies can afford it
The risk management methodologies and framework
fail to address increasingly complex security needs
The IT monitoring systems fail to offer useful decision
support to decision makers
Cybersecurity as a challenge
The unbalanced battle: lack of resources to draw an strategy
© WISER 2016 www.cyberwiser.eu - @cyberwiser 23
Despite the fact that more and more
companies start searching for solutions to
strengthen their cyber resilience, they struggle
to draw their own cyber security strategy due
to the lack of economic and human resources
This is particularly true for SMEs, which constitute
the backbone of the European economy
Cybersecurity as a challenge
The unbalanced battle: lack of awareness
© WISER 2016 www.cyberwiser.eu - @cyberwiser 24
Despite abundance of security products,
breach response typically takes months
2 out of 3 organizations don´t define and update
their breach response plans to account for
changing threat landscape
With proper technology and expertise, detection
to response times may be reduced by 90%.
And many, many companies simply don´t have a clue of this
They are completely unaware of what is threatening them!
Cybersecurity as a challenge
The unbalanced battle: bad performance as for cyber resilience
© WISER 2016 www.cyberwiser.eu - @cyberwiser 25
Enterprises having a formally defined ICT security policy
Cybersecurity as a challenge
Loss of revenues
Damage to valuable assets
Intellectual property
Critical infrastructure
Job losses
Loss of investment confidence
Damage to brand image and company reputation
Closure of companies
Loss of well-being of the population
Moral damage (child pornography)
Human casualties
© WISER 2016 www.cyberwiser.eu - @cyberwiser 26
Some cybercrime likely consequences
Cybersecurity as a challenge
A stronger and stronger problem against a weak solution
Strong problem Weak solution
Cybercrime is a flourishing business
Cybercriminals are using ever more sophisticated methods
Cybercrime slows down the growth of the Digital Single Market
Cybercrime is a clear obstacle for European economies to strive
Cybercrime targets sensitive information and critical
infrastructures
Cyberterrorists are cybercriminals capable of performing attacks
that may lead to loss of human lives
Cyber risk detection and assessment is usually a manual process
Cyber risk detection and assessment is mostly a process
performed periodically.
Current approach is static and iterative
Cyber risk detection and assessment usually focus on the ICT side,
not considering business or societal impact
No support for decision-making of mitigating measures
Stronger solutions are not in place yet due to the lack of
awareness on the issue.
© WISER 2016 www.cyberwiser.eu - @cyberwiser 27
Cybersecurity as a challenge
© WISER 2016 www.cyberwiser.eu - @cyberwiser 28
The challenge is clear…
How can we contribute to solve the problem?
Outline
Business on the Internet: cyber landscape
Cyber security as a challenge
CyberWISER as a solution
CyberWISER services portfolio
Conclusions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 29
CyberWISER as a solution
What is CyberWISER?
© WISER 2016 www.cyberwiser.eu - @cyberwiser 30
CyberWISER is a framework of resilient cyber security risk assessment
services providing the following features
Multi-level cyber risk assessment, focusing not only on ICT systems, but also on the
meaning they have for the corporate business processes
Real-time cyber risk assessment providing an updated view of the risk level
Real-time cyber risk monitoring tool supporting decision-making to manage risks
Decision support tools to facilitate selection of mitigation options to face
unacceptable risks
The CyberWISER Risk Management Framework will put your company
in control with a smart ‘DYI’ approach and will ensure that cyber
security becomes part of the business process
CyberWISER as a solution
Our consortium
© WISER 2016 www.cyberwiser.eu - @cyberwiser 31
CyberWISER as a solution
How CyberWISER meets the requirements
© WISER 2016 www.cyberwiser.eu - @cyberwiser 32
Cybersecurity challenge CyberWISER answer
The risk management methodologies and framework fail to address
increasingly complex security needs
CyberWISER sensoring techniques are able to detect a wide spectrum of
incidents as well as vulnerabilities in the ICT infrastructure likely to be
exploited by attackers
The IT monitoring systems fail to offer useful decision support to
decision makers
CyberWISER direct language is aimed to ease the decision-making
support. CyberWISER provides decision-making tools
Cybersecurity is unaffordable and restricted to large companies CyberWISER offers an agile and easy-to-implement risk management
methodology, without the need of high security budget, complex and
time-consuming procedures, or dedicated teams of external consultants
Lack of awareness CyberWISER considers the prevention and the creation of a
cybersecurity culture with user-friendly services
CyberWISER main objective is the democratisation of cybersecurity,
with a strong focus on SMEs
CyberWISER as a solution
The WISER approach
© WISER 2016 www.cyberwiser.eu - @cyberwiser 33
CyberWISER as a solution
The WISER approach: configuration inputs
© WISER 2016 www.cyberwiser.eu - @cyberwiser 34
Some examples of configuration inputs
Industry sector to which the company belongs
Organization size
Yearly revenues
Geographical area where the company has offices
Geographical area where the company makes business
Internal organization of the company: roles and responsibilities
Cyber security corporate culture
Volume of sensitive information handled by the company
Business impact analysis:
Focused on the value the information stored by the digital assets have
CyberWISER as a solution
The WISER approach: monitoring inputs
© WISER 2016 www.cyberwiser.eu - @cyberwiser 35
The monitoring infrastructure has two layers
The resource layer
It consists of collectors installed on the client´s infrastructure
The collectors continuously observe numerous network and application-level parameters
The collectors are able to detect several types of attacks and anomalies in the network
infrastructure and in applications installed on the client´s premises
This information is sent to the provider layer
The provider layer
It has a Monitoring Engine that filters and correlates information coming from the
collectors, producing alarms which are part of the inputs received by the Risk Assessment
Engine
CyberWISER as a solution
The WISER approach: monitoring inputs
© WISER 2016 www.cyberwiser.eu - @cyberwiser 36
Some examples of attack types detected by CyberWISER monitoring
capabilities
Monitoring of DNS requests to detect patterns of traffic potentially
belonging to botnets
Network reconnaissance attempts
Malware signatures
Denial of Service attacks
Viruses
Anomalies in operation of core OS services and user applications
Honeypots are also used to attract attackers and detect their
presence
CyberWISER as a solution
The WISER approach: testing inputs
© WISER 2016 www.cyberwiser.eu - @cyberwiser 37
The testing information is collected by means of an
automatic vulnerability scanning service which helps to
identify security vulnerabilities in the client´s ICT
infrastructure
CyberWISER as a solution
The WISER approach: modelling inputs and Risk Assessment Engine
© WISER 2016 www.cyberwiser.eu - @cyberwiser 38
Models are machine-readable risk asessment algorithms
Such algorithms are composed by a set of modelling rules
Modelling rules establish associations among the different
types of information presented before
Configuration information, obtained from the user
Monitoring information, network layer, obtained from the collectors
Monitoring information, application layer, obtained from the collectors
Testing information, obtained from the vulnerability scanners
The models can be qualitative or quantitative
The model algorithms are executed by the Risk Assessment
Engine
CyberWISER as a solution
The WISER approach: support to decision-making
© WISER 2016 www.cyberwiser.eu - @cyberwiser 39
CyberWISER not only evaluates the cyber risk faced
by the company, it also proposes mitigation
measures
Since budgets are limited, WISER offers the user support
to prioritize the measures to be actually applied
The comparison, ranking and prioritisation of measures is
done basing on cost-benefit analysis with data provided
by the user by filling out a template
CyberWISER as a solution
The WISER risk management cycle
© WISER 2016 www.cyberwiser.eu - @cyberwiser 40
CyberWISER as a solution
CyberWISER pragmatic vision for cybersecurity
STEP 1 – Acquire awareness through self-assessment of
your cyber risks and vulnerabilities of your IT system.
STEP 2 - Evaluate your exposure levels (€€€ + reputation)
STEP 3 - Evaluate cyber insurance.
STEP 4 – Develop a mitigation plan.
STEP 5 – Monitor in real-time.
Higher cyber security levels are directly connected to greater awareness
and effectiveness of data protection & privacy
© WISER 2016 www.cyberwiser.eu - @cyberwiser 41
Cyber WISER as a solution
© WISER 2016 www.cyberwiser.eu - @cyberwiser 42
Cyber resilience is a journey, not a destination
How can CyberWISER help you to become more cyber resilient?
Let´s take a look to CyberWISER Services
Outline
Business on the Internet: cyber landscape
Cyber security as a challenge
CyberWISER as a solution
CyberWISER services portfolio
Conclusions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 43
CyberWISER services portfolio
© WISER 2016 www.cyberwiser.eu - @cyberwiser 44
 Registration and basic data
required to Clients
 WISER tests
vulnerabilities from
the outside
 Provides basic
benchmarking
 Detailed business and IT
infrastructure data required
 Model selection based on
WISER suggestion or tailored
 Sensors installation at the
network layer level
 Real time exposure
calculation
 Monitoring
 Mitigation options
considered
 WISER team limited support
 Detailed business and IT
infrastructure data required
 Possibility to implement Client’s
models
 Possibility to perform cost/benefit
analysis on the base of Client’s
indications
 Sensors installation at the
application layer level
Required
Interaction
 Real time exposure calculation
 Monitoring
 Mitigation cost benefit
calculations
 WISER team full involvement
Complexity of WISER
Operating Model
CyberWISER services portfolio
© WISER 2016 www.cyberwiser.eu - @cyberwiser 45
Non-intrusive mode
No need to install anything on the
client´s infrastructure
Offers a very early assessment of the situation of the client´s IT infrastructure with respect
to cyber risk
The client fills a short questionnaire, and basing on the answers, a first evaluation is done
by means of a simple algorithm
No need to register
Optionally, the client can run a vulnerability scanner against the IT infrastructure in a not
intrusive way
This needs registration
Quick feedback
Report easy to understand and aimed especially at top managers
Main areas of improvement are highlighted
No need for external assistance and minimum time investment
CyberWISER services portfolio
© WISER 2016 www.cyberwiser.eu - @cyberwiser 46
Incorporates real-time
monitoring
Sensors are deployed on the target infrastructure
Sensors only gather information belonging to the network layer
Enhanced vulnerability scan feature
More detailed and specific questionnaires to gather configuration
information
Modelling techniques incorporated to assess the cyber risk
Mitigation measures suggested along with the cyber risk assessment
It incorporates a tool to evaluate the societal impact of the cyber risk
faced by the company
Complete dashboard to show the results
Limited consulting service offered by WISER Service provider
CyberWISER services portfolio
© WISER 2016 www.cyberwiser.eu - @cyberwiser 47
Most complex and advanced CyberWISER service
Sensors scope is expanded and
application layer information is also gathered
More detailed configuration questionnaires to be answered by the client
Larger quantity and variety of data available for analysis
Possibility of putting in place customized sensors adapted to client´s
infrastructure peculiarities
Possibility of integrating sensors brought by the client
Mitigation measures suggestion is supplemented with a cost-benefit
analysis in order to prioritize which measure actually apply
Complete dashboard to show the results
Further involvement of CyberWISER consultants
Outline
Business on the Internet: cyber landscape
Cyber security as a challenge
CyberWISER as a solution
CyberWISER services portfolio
Conclusions
© WISER 2016 www.cyberwiser.eu - @cyberwiser 48
Innovation elements brought in by WISER
It is not simply about monitoring cyber incidents, it is about assessing the risks present
within a company
The risk assessment considers the potential damage to the ICT infrastructure and the
damage to the business of the company, including various aspects, such as reputational
implications – a multi-level assessment
This risk evaluation evolves with the rapid dynamics that are inherent with the cyber
“climate”
This evaluation is performed by means of a novel methodology, to be elaborated in the
project
Modelling cyber risk, using patterns
Definition of mitigation measures according to the threats and attacks and ranking
based on different criteria
Ultimate goal: Make cyber risk assessment affordable, especially to SMEs
Going beyond the state of art
49© WISER 2016 www.cyberwiser.eu - @cyberwiser
Innovative capabilities and features
Cyber risk assessment
follow-up
Monitoring: events and
alarms detection and
follow-up
Testing: vulnerabilities
scanning and follow-up
Modelling
Decision Support
The WISER framework delivers capabilities that are unparalleled with respect
to current offering. SMEs are enticed by means of “freemium” services
(i.e. the “CyberWISER-Light”)
Basic and detailed visualization of reports
Graphic dashboard with analytical features
Configurable alerts
Periodical execution of vulnerability scans
Basic and detailed information of vulnerabilities
found
Assistance to derive model rules from risk
models
Assistance to decide the most suitable risk model
according to the business and ICT profile of the
company
Cost-benefit analysis of mitigation measures
Quality Criteria Assessment of risks
50
© WISER 2016 www.cyberwiser.eu - @cyberwiser
What next?
Start using CyberWISER Light today
Register on www.cyberwiser.eu
Take the questionnaire & download your
personalised report.
Take the vulnerability test to identify threats.
Get the final full report.
Take action to make cyber security part of your
business processes
Need tech support or advice?
Contact us at support@cyberwiser.eu
Want to get involved?
Contact us at info@cyberwiser.eu
Start your cybersecurity journey today with CyberWISER Light
51
© WISER 2016 www.cyberwiser.eu - @cyberwiser
Join our community and stay up to
date with new WISER releases:
@cyberwiser
www.linkedin.com/in/cyber-wiser
References
© WISER 2016 www.cyberwiser.eu - @cyberwiser 52
http://www.internetworldstats.com/stats.htm
http://www.infodocket.com/2013/05/30/cisco-releases-latest-internet-usage-and-data-forecast-nearly-half-the-worlds-population-will-be-connected-to-the-internet-by-2017/
http://www2.deloitte.com/us/en/pages/consumer-business/articles/navigating-the-new-digital-divide-retail.html?id=us:2el:3dp:diginf15:awa:retail:051315:dd
http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/
http://www.statista.com/topics/779/mobile-internet/
http://www.convinceandconvert.com/mobile/7-mobile-marketing-stats-that-will-blow-your-mind/
http://www.internetlivestats.com/total-number-of-websites/
http://www.speedawarenessmonth.com/slow-websites-cost-the-us-ecommerce-market-504-billion-in-2011/
https://econsultancy.com/blog/10936-site-speed-case-studies-tips-and-tools-for-improving-your-conversion-rate/
https://econsultancy.com/blog/66224-11-staggering-stats-from-around-the-digital-world/
http://research.domaintools.com/statistics/tld-counts/
http://w3techs.com/technologies/overview/top_level_domain/all
https://en.wikipedia.org/wiki/List_of_most_expensive_domain_names
http://www.internetlivestats.com/
http://www.statista.com/statistics/261245/b2c-e-commerce-sales-worldwide/
http://www.statista.com/markets/413/e-commerce/
http://www.remarkety.com/global-ecommerce-sales-trends-and-statistics-2015
https://en.wikipedia.org/wiki/List_of_Internet_top-level_domains
http://www3.weforum.org/docs/GRR/WEF_GRR16.pdf
https://www.mushroomnetworks.com/blog/2015/12/03/is-your-business-internet-dependent-15-businesses-that-need-reliable-internet/
https://www.statista.com/statistics/261245/b2c-e-commerce-sales-worldwide/
http://www.forbes.com/sites/stevemorgan/2015/10/16/the-business-of-cybersecurity-2015-market-size-cyber-crime-employment-and-industry-statistics/2/#c3a6df84e683
https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf
http://fortune.com/2015/01/23/cyber-attack-insurance-lloyds/
UK Federation of Small Businesses: Cyber Resilience: How To Protect Small Firms In The Digital Economy (June 2016)
Profiling the Cyber criminal, University of Oxford, https://www.sbs.ox.ac.uk/cybersecurity-capacity/content/profiling-cybercriminal
www.cyberwiser.eu
@cyberwiser
Thank you for your attentions! Questions?
Contact
Antonio Álvarez Romero
Atos Spain
antonio.alvarez@atos.net

Más contenido relacionado

La actualidad más candente

Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270Dario
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityCristian Garcia G.
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Cristian Garcia G.
 
cyber security
cyber securitycyber security
cyber securitykm. nahid
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
A new way to prevent Botnet Attack
A new way to prevent Botnet AttackA new way to prevent Botnet Attack
A new way to prevent Botnet Attackyennhi2812
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesS.E. CTS CERT-GOV-MD
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceIBM Security
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemMarketingArrowECS_CZ
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Cloud
 

La actualidad más candente (20)

Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
El Futuro de la Cibersegu
El Futuro de la CiberseguEl Futuro de la Cibersegu
El Futuro de la Cibersegu
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
 
cyber security
cyber securitycyber security
cyber security
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
A new way to prevent Botnet Attack
A new way to prevent Botnet AttackA new way to prevent Botnet Attack
A new way to prevent Botnet Attack
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 

Destacado

UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security Bill Gibbs
 
WISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurityWISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurityCYBERWISER .eu
 
Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Adam Ziaja
 
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?PwC Polska
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04kevin_donovan
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessGeorgian
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNeha Gupta
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsGoutama Bachtiar
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And SecurityShaheda Afreen
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (20)

UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
 
ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security ERAU webinar november 2016 cyber security
ERAU webinar november 2016 cyber security
 
Path of Cyber Security
Path of Cyber SecurityPath of Cyber Security
Path of Cyber Security
 
WISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurityWISER: the European innovative framework on cybersecurity
WISER: the European innovative framework on cybersecurity
 
Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)Cyberprzestępczość 2.0 (TAPT 2014)
Cyberprzestępczość 2.0 (TAPT 2014)
 
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
Dlaczego polskie firmy są tak łatwym celem dla cyberprzestępców?
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04Information security fasit-cait-20150129_v04
Information security fasit-cait-20150129_v04
 
Security First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your BusinessSecurity First: What it is and What it Means for Your Business
Security First: What it is and What it Means for Your Business
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Cyber Crime And Security
Cyber Crime And SecurityCyber Crime And Security
Cyber Crime And Security
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Tackling today's cyber security challenges - WISER Services & Solutions

Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorldDWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorldIDATE DigiWorld
 
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 Berwin Leighton Paisner
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosFrancesca Valente
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar CyberattacksPanda Security
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951N0b10111
 
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...Paul Brody
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publicationGlenn Peake
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
4th industrial in Banking Sector.pptx
4th industrial in Banking Sector.pptx4th industrial in Banking Sector.pptx
4th industrial in Banking Sector.pptxnoyeem
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glanceCYBERWISER .eu
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutionsLaurent Pacalin
 

Similar a Tackling today's cyber security challenges - WISER Services & Solutions (20)

Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorldDWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
DWS16 - Fintech forum - Yves Gassot, IDATE DigiWorld
 
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
 
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951http://www.slideshare.net/slideshow/embed_code/28627951
http://www.slideshare.net/slideshow/embed_code/28627951
 
Take Down
Take DownTake Down
Take Down
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
The Golden Age of Wearables:
 Personal Networks, Smart Things & Intimate Know...
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
4th industrial in Banking Sector.pptx
4th industrial in Banking Sector.pptx4th industrial in Banking Sector.pptx
4th industrial in Banking Sector.pptx
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
The WISER Project at a glance
The WISER Project at a glanceThe WISER Project at a glance
The WISER Project at a glance
 
La Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las AplicacionesLa Seguridad en la Economía de las Aplicaciones
La Seguridad en la Economía de las Aplicaciones
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
New fraud protection solutions
New fraud protection solutionsNew fraud protection solutions
New fraud protection solutions
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 

Último

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 

Último (11)

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 

Tackling today's cyber security challenges - WISER Services & Solutions

  • 1. WISER “WIDE-IMPACT CYBER SECURITY RISK FRAMEWORK” www.cyberwiser.eu @cyberwiser Co-funded by the European Commission Horizon 2020 – Grant # 653321 Antonio Álvarez Romero Atos Spain Tackling today's cyber security challenges - WISER Services & Solutions Riga – 27th October, 2016 Presentation at DSS ITSEC 1
  • 2. Outline Business on the Internet: Cyber landscape Cyber security as a challenge CyberWISER as a solution CyberWISER services portfolio Conclusions © WISER 2016 www.cyberwiser.eu - @cyberwiser 2
  • 3. Outline Business on the Internet: Cyber landscape Cyber security as a challenge CyberWISER as a solution CyberWISER services portfolio Conclusions © WISER 2016 www.cyberwiser.eu - @cyberwiser 3
  • 4. Business on the Internet: Cyber landscape The global adoption of the Internet © WISER 2016 www.cyberwiser.eu - @cyberwiser 4 World population (2016 est.) 7,340,093,380 Internet users (as of 30/06) 3,611,375,813 % Penetration (world) 49.2 Internet users (end 2000) 360,993,184 % growth 2000-2016 900.4 Being on the Internet means to have near 4000 million of potential customers! internetworldstats.com
  • 5. Business on the Internet: Cyber landscape Internet as a mean to make business © WISER 2016 www.cyberwiser.eu - @cyberwiser 5 According to a study from McAfee, Internet economy generates between $2 and $3 trillion a year. The share of the global economy is expected to grow rapidly The U.S. e-commerce economy is worth $349 billion while China´s is worth $562 billion https://hostingfacts.com/internet-facts-stats-2016/Very huge turnover directly related to the Internet
  • 6. Business on the Internet: Cyber landscape Internet as a mean to make business © WISER 2016 www.cyberwiser.eu - @cyberwiser 6 Very huge turnover directly related to the Internet B2C e-commerce sales worldwide from 2012 to 2018 (in billion U.S. dollars)
  • 7. Business on the Internet: Cyber landscape Internet as a mean to make business © WISER 2016 www.cyberwiser.eu - @cyberwiser 7 40% of Internet users (more than 1 billion people) have bought products or goods online 8 out of 10 consumers will shop online if offered free shipping Internet is not only about accessing huge amounts of information, it is transforming the consumption habits
  • 8. Business on the Internet: Cyber landscape Internet as a mean to make business © WISER 2016 www.cyberwiser.eu - @cyberwiser 8 There are around 966 million websites in the world today The average e-commerce site takes 7.12 seconds avg to load in Internet Explorer 9 7.15 seconds avg to load in Firefox 7 7.59 seconds avg to load in Google Chrome 40% of web users will abandon a website if it takes longer than 3 seconds to load and 60% will not return to the site 51% of U.S. online shoppers say slow site loading is a top reason to abandon a purchase Slow loading websites cost the U.S. e-commerce market more than $500 billion annually. 38% of British consumers say social media interaction was one of the reasons for visiting a retailer website The competition is fierce: websites must be reliable, visible and highly responsive
  • 9. Business on the Internet: cyber landscape Internet as a mean to make business © WISER 2016 www.cyberwiser.eu - @cyberwiser 9 Call centers Chat centers Trading companies Retail businesses Service firms Financial institutions News Media Restaurants Internet Marketing Web hosting companies Insurance providers Medical centers Several kinds of businesses are 100% dependent on the Internet The dependence is sort of dramatic VoIP dependent No Internet, no reps working Long wait time, angry clients No Internet, no agents working Quick loss of business Clients get no feedback Based on speed Bad latency means no business Loss of trading opportunities Sales software dependent Real-time access for inventory Credit card payments rely on terminals Teams cannot work together No access to repositories No interraction with clients Dependent on central systems Branches need reliable connection No connection, no data, no biz Need to be the first for storytelling Pictures taken on-site and live feeds No Internet impacts competitiveness Need Internet for payments Need Internet for ordering On-line or phone orders management Social media management Viral campaigns management Communication with clients Need to minimize downtimes Downtimes means losses Clients´web must be live Access to claims database Access to history info for pricing Management of clients Patient information management Online format replaces physical Critical patients care https://www.mushroomnetworks.com/blog/2015/12/03/is-your-business-internet-dependent-15-businesses
  • 10. Business on the Internet: Cyber landscape Internet as a mean to make business © WISER 2016 www.cyberwiser.eu - @cyberwiser 10 So… Internet is one of the biggest successes ever But, as everything, there is a flip side or, in this case… an evil side
  • 11. Outline Business on the Internet: Cyber landscape Cyber security as a challenge CyberWISER as a solution CyberWISER services portfolio Conclusions © WISER 2016 www.cyberwiser.eu - @cyberwiser 11
  • 12. Cybersecurity as a challenge What is cybercrime? © WISER 2016 www.cyberwiser.eu - @cyberwiser 12 Definition of cybercrime Cybercrime is the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities or violating privacy Enciclopaedia Britannica
  • 13. Cybersecurity as a challenge Some facts about cybercrime © WISER 2016 www.cyberwiser.eu - @cyberwiser 13 An estimated 37,000 websites are hacked every day. Cyber insurance market has grown from $1 billion to $2.5 billion over the last two years Very focused on the U.S Measuring the annual cost of cybercrime worldwide is a major challenge. McAfee dared to do that: they say that the losses are of $445 billion per year, what means around 20% of the Internet economy value http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf Lloyd´s estimated $400 billion per year. http://fortune.com/2015/01/23/cyber-attack-insurance-lloyds/ Cybercrime costs are kind of a very high tax paid to criminals that hinders the growth of the global economy
  • 14. Cybersecurity as a challenge Some facts about cybercrime © WISER 2016 www.cyberwiser.eu - @cyberwiser 14 Biggest online data breaches worldwide
  • 15. Cybersecurity as a challenge Some facts about cybercrime © WISER 2016 www.cyberwiser.eu - @cyberwiser 15 Cyber attackers´ preferred targets are large corporate businesses, critical infrastructures and small enterprises Research shows that small businesses were on average the victims of around 7 million cybercrimes a year in 2014 and 2015 UK Federation of Small Businesses: Cyber Resilience: How To Protect Small Firms In The Digital Economy (June 2016) The University of Oxford tries to profile the cyber criminal Internal disgruntled technical employee Interested in theft of personal information, money and intellectual property Interested in extorting the company and clients Profiling the Cyber criminal, University of Oxford, https://www.sbs.ox.ac.uk/cybersecurity- capacity/content/profiling-cybercriminal
  • 16. Cybersecurity as a challenge Some facts about cybercrime © WISER 2016 www.cyberwiser.eu - @cyberwiser 16 Cyber threats have evolved from targeting and harming computer, networks and smartphones, to targeting people, cars, railways, planes, powergrids and anything with a heartbeat or an electronic pulse The more connected the world is, the more varied the targets for cyber attacks become
  • 17. Cybersecurity as a challenge Cyberattacks among the top global risks (according to 2016 Global Risk Report by the World Economic Forum)
  • 18. Cybersecurity as a challenge Cyberattacks connections to other kinds of risks (according to 2016 Global Risk Report by the World Economic Forum) Cyberattacks Ilicit trade State collapse or crisis Data frauds or theft Interstate conflict Failure of financial mechanism or institution Terrorist attacks Failure of national governance Failure of critical infrastructure © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 19. Background © WISER 2016 www.cyberwiser.eu - @cyberwiser 19 Cybercrime in press
  • 20. Cybersecurity as a challenge The unbalanced battle: hackers vs institutions © WISER 2016 www.cyberwiser.eu - @cyberwiser 20 Black-Hat hackers are motivated by money, espionage, notoriety and malicious intent. They are faster, more daring and more experienced than White-Hats, who are constrained by boundaries and rules Putting in place the appropriate barriers to prevent attackers from succeeding is currently expensive in terms of time, skills, hardware and software resources needed
  • 21. EU Legislation & National Strategies WISER EU National Strategies watch Tracking capacity building & business initiatives: Important updates to ENISA interactive map & BSA Dashboard (data collected in 2014) Analysis & interviews with CERTs/National Cyber Security Centres Identification of best practices & innovative approaches Interactive free tool available online at: www.cyberwiser.eu/cartography 21 © WISER 2016 www.cyberwiser.eu - @cyberwiser How EU is addressing Cyber Crime
  • 22. Cybersecurity as a challenge The unbalanced battle: failing solutions © WISER 2016 www.cyberwiser.eu - @cyberwiser 22 Sophisticated solutions do exist, but they usually combine an IT side with a risk management framework strategy. Only large companies can afford it The risk management methodologies and framework fail to address increasingly complex security needs The IT monitoring systems fail to offer useful decision support to decision makers
  • 23. Cybersecurity as a challenge The unbalanced battle: lack of resources to draw an strategy © WISER 2016 www.cyberwiser.eu - @cyberwiser 23 Despite the fact that more and more companies start searching for solutions to strengthen their cyber resilience, they struggle to draw their own cyber security strategy due to the lack of economic and human resources This is particularly true for SMEs, which constitute the backbone of the European economy
  • 24. Cybersecurity as a challenge The unbalanced battle: lack of awareness © WISER 2016 www.cyberwiser.eu - @cyberwiser 24 Despite abundance of security products, breach response typically takes months 2 out of 3 organizations don´t define and update their breach response plans to account for changing threat landscape With proper technology and expertise, detection to response times may be reduced by 90%. And many, many companies simply don´t have a clue of this They are completely unaware of what is threatening them!
  • 25. Cybersecurity as a challenge The unbalanced battle: bad performance as for cyber resilience © WISER 2016 www.cyberwiser.eu - @cyberwiser 25 Enterprises having a formally defined ICT security policy
  • 26. Cybersecurity as a challenge Loss of revenues Damage to valuable assets Intellectual property Critical infrastructure Job losses Loss of investment confidence Damage to brand image and company reputation Closure of companies Loss of well-being of the population Moral damage (child pornography) Human casualties © WISER 2016 www.cyberwiser.eu - @cyberwiser 26 Some cybercrime likely consequences
  • 27. Cybersecurity as a challenge A stronger and stronger problem against a weak solution Strong problem Weak solution Cybercrime is a flourishing business Cybercriminals are using ever more sophisticated methods Cybercrime slows down the growth of the Digital Single Market Cybercrime is a clear obstacle for European economies to strive Cybercrime targets sensitive information and critical infrastructures Cyberterrorists are cybercriminals capable of performing attacks that may lead to loss of human lives Cyber risk detection and assessment is usually a manual process Cyber risk detection and assessment is mostly a process performed periodically. Current approach is static and iterative Cyber risk detection and assessment usually focus on the ICT side, not considering business or societal impact No support for decision-making of mitigating measures Stronger solutions are not in place yet due to the lack of awareness on the issue. © WISER 2016 www.cyberwiser.eu - @cyberwiser 27
  • 28. Cybersecurity as a challenge © WISER 2016 www.cyberwiser.eu - @cyberwiser 28 The challenge is clear… How can we contribute to solve the problem?
  • 29. Outline Business on the Internet: cyber landscape Cyber security as a challenge CyberWISER as a solution CyberWISER services portfolio Conclusions © WISER 2016 www.cyberwiser.eu - @cyberwiser 29
  • 30. CyberWISER as a solution What is CyberWISER? © WISER 2016 www.cyberwiser.eu - @cyberwiser 30 CyberWISER is a framework of resilient cyber security risk assessment services providing the following features Multi-level cyber risk assessment, focusing not only on ICT systems, but also on the meaning they have for the corporate business processes Real-time cyber risk assessment providing an updated view of the risk level Real-time cyber risk monitoring tool supporting decision-making to manage risks Decision support tools to facilitate selection of mitigation options to face unacceptable risks The CyberWISER Risk Management Framework will put your company in control with a smart ‘DYI’ approach and will ensure that cyber security becomes part of the business process
  • 31. CyberWISER as a solution Our consortium © WISER 2016 www.cyberwiser.eu - @cyberwiser 31
  • 32. CyberWISER as a solution How CyberWISER meets the requirements © WISER 2016 www.cyberwiser.eu - @cyberwiser 32 Cybersecurity challenge CyberWISER answer The risk management methodologies and framework fail to address increasingly complex security needs CyberWISER sensoring techniques are able to detect a wide spectrum of incidents as well as vulnerabilities in the ICT infrastructure likely to be exploited by attackers The IT monitoring systems fail to offer useful decision support to decision makers CyberWISER direct language is aimed to ease the decision-making support. CyberWISER provides decision-making tools Cybersecurity is unaffordable and restricted to large companies CyberWISER offers an agile and easy-to-implement risk management methodology, without the need of high security budget, complex and time-consuming procedures, or dedicated teams of external consultants Lack of awareness CyberWISER considers the prevention and the creation of a cybersecurity culture with user-friendly services CyberWISER main objective is the democratisation of cybersecurity, with a strong focus on SMEs
  • 33. CyberWISER as a solution The WISER approach © WISER 2016 www.cyberwiser.eu - @cyberwiser 33
  • 34. CyberWISER as a solution The WISER approach: configuration inputs © WISER 2016 www.cyberwiser.eu - @cyberwiser 34 Some examples of configuration inputs Industry sector to which the company belongs Organization size Yearly revenues Geographical area where the company has offices Geographical area where the company makes business Internal organization of the company: roles and responsibilities Cyber security corporate culture Volume of sensitive information handled by the company Business impact analysis: Focused on the value the information stored by the digital assets have
  • 35. CyberWISER as a solution The WISER approach: monitoring inputs © WISER 2016 www.cyberwiser.eu - @cyberwiser 35 The monitoring infrastructure has two layers The resource layer It consists of collectors installed on the client´s infrastructure The collectors continuously observe numerous network and application-level parameters The collectors are able to detect several types of attacks and anomalies in the network infrastructure and in applications installed on the client´s premises This information is sent to the provider layer The provider layer It has a Monitoring Engine that filters and correlates information coming from the collectors, producing alarms which are part of the inputs received by the Risk Assessment Engine
  • 36. CyberWISER as a solution The WISER approach: monitoring inputs © WISER 2016 www.cyberwiser.eu - @cyberwiser 36 Some examples of attack types detected by CyberWISER monitoring capabilities Monitoring of DNS requests to detect patterns of traffic potentially belonging to botnets Network reconnaissance attempts Malware signatures Denial of Service attacks Viruses Anomalies in operation of core OS services and user applications Honeypots are also used to attract attackers and detect their presence
  • 37. CyberWISER as a solution The WISER approach: testing inputs © WISER 2016 www.cyberwiser.eu - @cyberwiser 37 The testing information is collected by means of an automatic vulnerability scanning service which helps to identify security vulnerabilities in the client´s ICT infrastructure
  • 38. CyberWISER as a solution The WISER approach: modelling inputs and Risk Assessment Engine © WISER 2016 www.cyberwiser.eu - @cyberwiser 38 Models are machine-readable risk asessment algorithms Such algorithms are composed by a set of modelling rules Modelling rules establish associations among the different types of information presented before Configuration information, obtained from the user Monitoring information, network layer, obtained from the collectors Monitoring information, application layer, obtained from the collectors Testing information, obtained from the vulnerability scanners The models can be qualitative or quantitative The model algorithms are executed by the Risk Assessment Engine
  • 39. CyberWISER as a solution The WISER approach: support to decision-making © WISER 2016 www.cyberwiser.eu - @cyberwiser 39 CyberWISER not only evaluates the cyber risk faced by the company, it also proposes mitigation measures Since budgets are limited, WISER offers the user support to prioritize the measures to be actually applied The comparison, ranking and prioritisation of measures is done basing on cost-benefit analysis with data provided by the user by filling out a template
  • 40. CyberWISER as a solution The WISER risk management cycle © WISER 2016 www.cyberwiser.eu - @cyberwiser 40
  • 41. CyberWISER as a solution CyberWISER pragmatic vision for cybersecurity STEP 1 – Acquire awareness through self-assessment of your cyber risks and vulnerabilities of your IT system. STEP 2 - Evaluate your exposure levels (€€€ + reputation) STEP 3 - Evaluate cyber insurance. STEP 4 – Develop a mitigation plan. STEP 5 – Monitor in real-time. Higher cyber security levels are directly connected to greater awareness and effectiveness of data protection & privacy © WISER 2016 www.cyberwiser.eu - @cyberwiser 41
  • 42. Cyber WISER as a solution © WISER 2016 www.cyberwiser.eu - @cyberwiser 42 Cyber resilience is a journey, not a destination How can CyberWISER help you to become more cyber resilient? Let´s take a look to CyberWISER Services
  • 43. Outline Business on the Internet: cyber landscape Cyber security as a challenge CyberWISER as a solution CyberWISER services portfolio Conclusions © WISER 2016 www.cyberwiser.eu - @cyberwiser 43
  • 44. CyberWISER services portfolio © WISER 2016 www.cyberwiser.eu - @cyberwiser 44  Registration and basic data required to Clients  WISER tests vulnerabilities from the outside  Provides basic benchmarking  Detailed business and IT infrastructure data required  Model selection based on WISER suggestion or tailored  Sensors installation at the network layer level  Real time exposure calculation  Monitoring  Mitigation options considered  WISER team limited support  Detailed business and IT infrastructure data required  Possibility to implement Client’s models  Possibility to perform cost/benefit analysis on the base of Client’s indications  Sensors installation at the application layer level Required Interaction  Real time exposure calculation  Monitoring  Mitigation cost benefit calculations  WISER team full involvement Complexity of WISER Operating Model
  • 45. CyberWISER services portfolio © WISER 2016 www.cyberwiser.eu - @cyberwiser 45 Non-intrusive mode No need to install anything on the client´s infrastructure Offers a very early assessment of the situation of the client´s IT infrastructure with respect to cyber risk The client fills a short questionnaire, and basing on the answers, a first evaluation is done by means of a simple algorithm No need to register Optionally, the client can run a vulnerability scanner against the IT infrastructure in a not intrusive way This needs registration Quick feedback Report easy to understand and aimed especially at top managers Main areas of improvement are highlighted No need for external assistance and minimum time investment
  • 46. CyberWISER services portfolio © WISER 2016 www.cyberwiser.eu - @cyberwiser 46 Incorporates real-time monitoring Sensors are deployed on the target infrastructure Sensors only gather information belonging to the network layer Enhanced vulnerability scan feature More detailed and specific questionnaires to gather configuration information Modelling techniques incorporated to assess the cyber risk Mitigation measures suggested along with the cyber risk assessment It incorporates a tool to evaluate the societal impact of the cyber risk faced by the company Complete dashboard to show the results Limited consulting service offered by WISER Service provider
  • 47. CyberWISER services portfolio © WISER 2016 www.cyberwiser.eu - @cyberwiser 47 Most complex and advanced CyberWISER service Sensors scope is expanded and application layer information is also gathered More detailed configuration questionnaires to be answered by the client Larger quantity and variety of data available for analysis Possibility of putting in place customized sensors adapted to client´s infrastructure peculiarities Possibility of integrating sensors brought by the client Mitigation measures suggestion is supplemented with a cost-benefit analysis in order to prioritize which measure actually apply Complete dashboard to show the results Further involvement of CyberWISER consultants
  • 48. Outline Business on the Internet: cyber landscape Cyber security as a challenge CyberWISER as a solution CyberWISER services portfolio Conclusions © WISER 2016 www.cyberwiser.eu - @cyberwiser 48
  • 49. Innovation elements brought in by WISER It is not simply about monitoring cyber incidents, it is about assessing the risks present within a company The risk assessment considers the potential damage to the ICT infrastructure and the damage to the business of the company, including various aspects, such as reputational implications – a multi-level assessment This risk evaluation evolves with the rapid dynamics that are inherent with the cyber “climate” This evaluation is performed by means of a novel methodology, to be elaborated in the project Modelling cyber risk, using patterns Definition of mitigation measures according to the threats and attacks and ranking based on different criteria Ultimate goal: Make cyber risk assessment affordable, especially to SMEs Going beyond the state of art 49© WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 50. Innovative capabilities and features Cyber risk assessment follow-up Monitoring: events and alarms detection and follow-up Testing: vulnerabilities scanning and follow-up Modelling Decision Support The WISER framework delivers capabilities that are unparalleled with respect to current offering. SMEs are enticed by means of “freemium” services (i.e. the “CyberWISER-Light”) Basic and detailed visualization of reports Graphic dashboard with analytical features Configurable alerts Periodical execution of vulnerability scans Basic and detailed information of vulnerabilities found Assistance to derive model rules from risk models Assistance to decide the most suitable risk model according to the business and ICT profile of the company Cost-benefit analysis of mitigation measures Quality Criteria Assessment of risks 50 © WISER 2016 www.cyberwiser.eu - @cyberwiser
  • 51. What next? Start using CyberWISER Light today Register on www.cyberwiser.eu Take the questionnaire & download your personalised report. Take the vulnerability test to identify threats. Get the final full report. Take action to make cyber security part of your business processes Need tech support or advice? Contact us at support@cyberwiser.eu Want to get involved? Contact us at info@cyberwiser.eu Start your cybersecurity journey today with CyberWISER Light 51 © WISER 2016 www.cyberwiser.eu - @cyberwiser Join our community and stay up to date with new WISER releases: @cyberwiser www.linkedin.com/in/cyber-wiser
  • 52. References © WISER 2016 www.cyberwiser.eu - @cyberwiser 52 http://www.internetworldstats.com/stats.htm http://www.infodocket.com/2013/05/30/cisco-releases-latest-internet-usage-and-data-forecast-nearly-half-the-worlds-population-will-be-connected-to-the-internet-by-2017/ http://www2.deloitte.com/us/en/pages/consumer-business/articles/navigating-the-new-digital-divide-retail.html?id=us:2el:3dp:diginf15:awa:retail:051315:dd http://www.smartinsights.com/mobile-marketing/mobile-marketing-analytics/mobile-marketing-statistics/ http://www.statista.com/topics/779/mobile-internet/ http://www.convinceandconvert.com/mobile/7-mobile-marketing-stats-that-will-blow-your-mind/ http://www.internetlivestats.com/total-number-of-websites/ http://www.speedawarenessmonth.com/slow-websites-cost-the-us-ecommerce-market-504-billion-in-2011/ https://econsultancy.com/blog/10936-site-speed-case-studies-tips-and-tools-for-improving-your-conversion-rate/ https://econsultancy.com/blog/66224-11-staggering-stats-from-around-the-digital-world/ http://research.domaintools.com/statistics/tld-counts/ http://w3techs.com/technologies/overview/top_level_domain/all https://en.wikipedia.org/wiki/List_of_most_expensive_domain_names http://www.internetlivestats.com/ http://www.statista.com/statistics/261245/b2c-e-commerce-sales-worldwide/ http://www.statista.com/markets/413/e-commerce/ http://www.remarkety.com/global-ecommerce-sales-trends-and-statistics-2015 https://en.wikipedia.org/wiki/List_of_Internet_top-level_domains http://www3.weforum.org/docs/GRR/WEF_GRR16.pdf https://www.mushroomnetworks.com/blog/2015/12/03/is-your-business-internet-dependent-15-businesses-that-need-reliable-internet/ https://www.statista.com/statistics/261245/b2c-e-commerce-sales-worldwide/ http://www.forbes.com/sites/stevemorgan/2015/10/16/the-business-of-cybersecurity-2015-market-size-cyber-crime-employment-and-industry-statistics/2/#c3a6df84e683 https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/ http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf http://fortune.com/2015/01/23/cyber-attack-insurance-lloyds/ UK Federation of Small Businesses: Cyber Resilience: How To Protect Small Firms In The Digital Economy (June 2016) Profiling the Cyber criminal, University of Oxford, https://www.sbs.ox.ac.uk/cybersecurity-capacity/content/profiling-cybercriminal
  • 53. www.cyberwiser.eu @cyberwiser Thank you for your attentions! Questions? Contact Antonio Álvarez Romero Atos Spain antonio.alvarez@atos.net

Notas del editor

  1. Internet Economy Cybercrime
  2. Internet Economy Cybercrime
  3. Call centers They rely almost exclusively on VoIP Slow connection with frequent downtimes prevent the reps from doing their jobs Longer wait times means unhappy customers, therefore unreliable Internet means loss of contracts 2. Chat centers They are dedicated to provide chat-based online support to businesses around the world If Internet does not work well, agents are unable to respond to client and the center will lose business very quickly 3. Trading companies They rely on the ability of their agents to quickly move assets Speed is paramount Bad latency of the network might mean loss of millions 4. Retail businesses They depend on their sales software, terminals to accept credit card payments and real-time data access for sales, pricing and inventory If there is a lack of Internet connection and this applications cannot be accessed, the store is paralysed. 5. Service firms like web design and development firms Without reliable Internet connection, the team cannot work together for larger projects, the repositories cannot be accessed and even the communication with clients becomes impossible Internet outages would seriously damage the business 6. Financial institutions They depend heavily on centralized systems for operation These centralized systems must be accessed by the local branches via the Internet 7. News media Need to be the first to tell the story Need to support that story with pictures taken on-site Need to provide live feeds on the ground Slow or downed Internet connectivity damages the competitiveness of the news agency 8. Restaurants They use the Internet for payments They use the Internet for ordering They use the Internet to keep track of production They use the Internet to manage orders made online or over the phone 9. Internet marketing They rely on the Internet to manage ad campaigns They rely on the Internet to manage social media They rely on the Internet to create viral campaigns They rely on the Internet to communicate with clients 10. Web hosting companies They need their servers to stay connected and live constantly Downtimes have to be minimized, otherwise the web hosting business would be seriously damaged 11. Insurance providers They need to access various databases to handle claims and decide on the cost of coverage for clients They also need the Internet for the general management of clients. 12. Medical centers Needs Internet for storage, access and sharing of patient information Physical documentation dissapearing
  4. Impact measured in millions of data records stolen
  5. Cybercrime is also in press. There are some shocking news like this one saying that Obama ordered speed up wave of Cyberattacks against Iran. It is frightening to check that nuclear reactors can be hit by a cyber attack or steel works can be massively damaged by hack attacks.
  6. All of this brings several consequences such those ones indicated here that cover not only the economical factor but also the human or the moral one.
  7. This is a slide to sum up the current situation, with a strong problem that so far has been offered weak solutions
  8. This is our consortium, composed by 7 companies representing 7 countries, with the presence of both large and small companies, and the contribution of a non-profit research partner. All the companies have relevant roles according to their resource allocation.
  9. A monitor dashboard just say: your machine 192.168.2.34 is suffering a Denial of Service attack WISER says: your risk exposure is very high because this is the main entry point to your on-line shop and it is going to be shut down WISER does not know this in its own, it has to be configured to know it.
  10. Some parts of this presentation have involved some research and these are the references